You are on page 1of 571

Cambridge IGCSE

INFORMATION AND COMMUNICATION TECHNOLOGY 0417/12


*4606582192*

Paper 1 Theory February/March 2020


2 hours

You must answer on the question paper.


No additional materials are needed.

INSTRUCTIONS
• Answer all questions.
• Use a black or dark blue pen.
• Write your name, centre number and candidate number in the boxes at the top of the page.
• Write your answer to each question in the space provided.
• Do not use an erasable pen or correction fluid.
• Do not write on any bar codes.
• You may use an HB pencil for any diagrams, graphs or rough working.

INFORMATION
• The total mark for this paper is 100.
• The number of marks for each question or part question is shown in brackets [ ].
• No marks will be awarded for using brand names of software packages or hardware.

This document has 16 pages. Blank pages are indicated.

03_0417_12_2020_1.21
© UCLES 2020 [Turn over
2

1 A list of hardware items is given.

3D printer Actuator LCD monitor Memory stick Mouse


RAM Touch screen Video card Webcam Wide format printer

(a) Identify two input devices from the given list.

1.........................................................................................................................................

2.........................................................................................................................................

[2]

(b) Identify two internal hardware devices from the given list.

1.........................................................................................................................................

2.........................................................................................................................................

[2]

2 Tick (✓) whether the following statements refer to the internet or an intranet.
internet intranet
(✓) (✓)

This type of network is public

This is the more secure type of network

This type of network is global

This type of network is more likely to be monitored

[2]

3 Chess players can use expert systems to help them practise chess moves.

Name two other applications which involve the use of expert systems.

1 ................................................................................................................................................

..................................................................................................................................................

2 ................................................................................................................................................

..................................................................................................................................................

[2]

© UCLES 2020 03_0417_12_2020_1.21


3

4 Smart technology is increasingly being used in everyday life. Many people are now using smart
devices such as smartwatches.

(a) Tick (✓) whether the following statements most appropriately refer to a desktop computer,
a tablet computer or a smartwatch.

desktop tablet
computer computer smartwatch
(✓) (✓) (✓)

A computer made up of separate units

Is an example of wearable technology

A portable device that allows text to be


typed relatively easily

Most easily used for fitness and health


monitoring by runners

[4]

(b) Smartphones are more likely to be used than laptop computers for everyday ICT use.

Describe three advantages of using a smartphone rather than a laptop computer.

1.........................................................................................................................................

...........................................................................................................................................

2.........................................................................................................................................

...........................................................................................................................................

3.........................................................................................................................................

...........................................................................................................................................

[3]

© UCLES 2020 03_0417_12_2020_1.21 [Turn over


4

5 A school examinations officer has set up a spreadsheet of candidates for the IGCSE examinations.

Part of the spreadsheet is shown:

The formula in cell A3 is IF(A2<>'''',VLOOKUP(A2,E3:F6,2),'''')

(a) Explain what the formula in cell A3 does.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [5]

© UCLES 2020 03_0417_12_2020_1.21


5

(b) The examinations officer is planning to change the range E3 to F6 in the formula to a named
range.

(i) Explain why he should do this rather than using the cell references.

................................................................................................................................

................................................................................................................................

................................................................................................................................

................................................................................................................................

................................................................................................................................

................................................................................................................................ [3]

(ii) Give an example of an appropriate name he should give the range.

................................................................................................................................

................................................................................................................................ [1]

(c) A formula has been placed in cell F9. The formula is COUNTIF(A4:A15,''E'')

Explain what the formula in cell F9 does.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [2]

© UCLES 2020 03_0417_12_2020_1.21 [Turn over


6

6 A teacher has created a hierarchical file structure to save the registers and marks of each of her
classes on her laptop computer. Part of the structure is shown:

C:

Work

Class_A1

Examination_Marks

Registers

Class_Reports

(a) Write down the file path to locate a document which is stored in the folder Examination_Marks.

C: ......................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [3]

(b) The teacher could have saved the document as a .txt or an .rtf file format.

Describe what is meant by .txt and .rtf file formats.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [2]

© UCLES 2020 03_0417_12_2020_1.21


7

(c) Explain the differences between the two file formats.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [3]

(d) A master document has been created. The teacher will mail merge the personal details of
each student into the document.

Explain why mail merged documents are used.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [4]

© UCLES 2020 03_0417_12_2020_1.21 [Turn over


8

7 A company is considering developing a laptop computer that only uses biometric methods to
authorise user access to this laptop computer. The developers are considering using facial
recognition.

(a) Explain, giving other examples, why biometric methods are considered to be a more secure
way of authorising access to the laptop computer rather than typing in passwords.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [6]

(b) Describe the disadvantages of using facial recognition to authorise access to the laptop
computer.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [4]

© UCLES 2020 03_0417_12_2020_1.21


9

8 A headteacher plans to use a computer database to keep records of the members of staff that
teach in her school. She must choose between using a flat file database or a relational database.

(a) Explain the differences between a flat file database and a relational database.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [2]

(b) The school keeps details of the teachers in one file and the subjects they teach in another file.
A teacher teaches more than one subject.
Describe the steps the headteacher would need to take to create a relational database from
this data.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [4]

9 Documents use headers, footers and margins.


The statements refer to a header, a footer or a margin. Tick (✓) the most appropriate term for
each statement.
header footer margin
(✓) (✓) (✓)

Text entered that can appear at the top of each page


automatically

An area between the main content of a page and the edge


of the page

An additional space between facing pages

Text entered that can appear at the bottom of each page


automatically

[4]

© UCLES 2020 03_0417_12_2020_1.21 [Turn over


10

10 Arjun is taking a gap year between his studies and will be travelling through Kenya. He needs to
remain in contact with his parents and is considering using either a cell phone or VoIP.

(a) Describe the benefits of using each of these communication methods to stay in contact with
his parents.

Cell phone ........................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

VoIP ..................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

[4]

(b) From time to time Arjun’s parents transfer money from their bank account to his bank account
using online banking.

Identify one type of transaction they cannot do using online banking.

...........................................................................................................................................

........................................................................................................................................... [1]

(c) When Arjun logs onto his online banking he needs to enter his username and password. The
system may also ask him to provide an answer to a security question.

Tick (✓) whether the following are appropriate examples of a security question or not.

Appropriate Not appropriate


(✓) (✓)

How old are you?

What is your mother’s maiden name?

What is your PIN?

Which town were you born in?

[2]

© UCLES 2020 03_0417_12_2020_1.21


11

(d) Give three benefits of Arjun using online banking in this scenario.

1.........................................................................................................................................

...........................................................................................................................................

2.........................................................................................................................................

...........................................................................................................................................

3.........................................................................................................................................

...........................................................................................................................................

[3]

(e) Give two drawbacks of Arjun using online banking in this scenario.

1.........................................................................................................................................

...........................................................................................................................................

2.........................................................................................................................................

...........................................................................................................................................

[2]

© UCLES 2020 03_0417_12_2020_1.21 [Turn over


12

11 Robots are used in many car production lines.

Discuss how their use has affected the nature of employment in the car production industry.

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

.................................................................................................................................................. [6]

12 When people use the internet for shopping and banking it is essential that they use a website that
has a secure server.

(a) Describe the features of a web page that identify it as using a secure server.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [4]

© UCLES 2020 03_0417_12_2020_1.21


13

(b) As more and more people use smartphones as computer systems, security can be breached.
Smishing and pharming are ways in which data can be compromised on a smartphone.

Compare and contrast smishing and pharming.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [6]

© UCLES 2020 03_0417_12_2020_1.21 [Turn over


14

13 A sales representative is planning a presentation about a new product. He is considering whether


to use a multimedia presentation or to give a talk and hand out leaflets.

(a) Discuss the advantages and disadvantages of using a multimedia presentation rather than
printed leaflets.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [8]

© UCLES 2020 03_0417_12_2020_1.21


15

(b) The sales representative decides to create a multimedia presentation and wishes to place an
image of the new product on one of the slides.

Explain the steps he would need to take to do this.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [4]

(c) He searches his company website to find a suitable image for his multimedia presentation.
Part of the markup language from the web page to load the image is shown.

<img src =''New_product.jpg'' alt=''company logo''>

When the markup is run, the words ‘company logo’ are displayed and not the image.

Explain why this may be the case.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [2]

© UCLES 2020 03_0417_12_2020_1.21


16

BLANK PAGE

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable
effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will
be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge Assessment
International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at
www.cambridgeinternational.org after the live examination series.

Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of
Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge.

© UCLES 2020 03_0417_12_2020_1.21


Cambridge IGCSE™

INFORMATION AND COMMUNICATION TECHNOLOGY 0417/12


Paper 1 Written Paper March 2020
MARK SCHEME
Maximum Mark: 100

Published

This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.

Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.

Cambridge International will not enter into discussions about these mark schemes.

Cambridge International is publishing the mark schemes for the March 2020 series for most Cambridge
IGCSE™, Cambridge International A and AS Level components and some Cambridge O Level components.

This document consists of 13 printed pages.

© UCLES 2020 [Turn over


0417/12 Cambridge IGCSE – Mark Scheme March 2020
PUBLISHED
Generic Marking Principles

These general marking principles must be applied by all examiners when marking candidate answers. They should be applied alongside the
specific content of the mark scheme or generic level descriptors for a question. Each question paper and mark scheme will also comply with these
marking principles.

GENERIC MARKING PRINCIPLE 1:

Marks must be awarded in line with:

• the specific content of the mark scheme or the generic level descriptors for the question
• the specific skills defined in the mark scheme or in the generic level descriptors for the question
• the standard of response required by a candidate as exemplified by the standardisation scripts.

GENERIC MARKING PRINCIPLE 2:

Marks awarded are always whole marks (not half marks, or other fractions).

GENERIC MARKING PRINCIPLE 3:

Marks must be awarded positively:

• marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit is given for valid answers which go beyond the
scope of the syllabus and mark scheme, referring to your Team Leader as appropriate
• marks are awarded when candidates clearly demonstrate what they know and can do
• marks are not deducted for errors
• marks are not deducted for omissions
• answers should only be judged on the quality of spelling, punctuation and grammar when these features are specifically assessed by the
question as indicated by the mark scheme. The meaning, however, should be unambiguous.

GENERIC MARKING PRINCIPLE 4:

Rules must be applied consistently e.g. in situations where candidates have not followed instructions or in the application of generic level
descriptors.

© UCLES 2020 Page 2 of 13


0417/12 Cambridge IGCSE – Mark Scheme March 2020
PUBLISHED
GENERIC MARKING PRINCIPLE 5:

Marks should be awarded using the full range of marks defined in the mark scheme for the question (however; the use of the full mark range may
be limited according to the quality of the candidate responses seen).

GENERIC MARKING PRINCIPLE 6:

Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should not be awarded with grade thresholds or
grade descriptors in mind.

© UCLES 2020 Page 3 of 13


0417/12 Cambridge IGCSE – Mark Scheme March 2020
PUBLISHED
Question Answer Marks

1(a) Webcam 2
Mouse

1(b) RAM 2
Video card

Question Answer Marks

2 2
internet intranet

This type of network is public 

This is the more secure type of network 

This type of network is global 

This type of network is more likely to be monitored 

Question Answer Marks

3 Two from, for e.g.: 2


Oil prospecting
Mineral prospecting
Diagnostic systems
Careers
Medical diagnosis

© UCLES 2020 Page 4 of 13


0417/12 Cambridge IGCSE – Mark Scheme March 2020
PUBLISHED
Question Answer Marks

4(a) 4
desktop tablet
smartwatch
computer computer

A computer made up of separate units 

Is an example of wearable technology 

A portable device that allows text to be typed relatively easily 

Most easily used for fitness and health monitoring by runners 

4(b) Three from: 3


More portable as it is lighter in weight
Smaller in size therefore can fit in in your pocket
More likely to have the smartphone with you at all times
Easier to receive and make phone calls on the move
More of a chance of retaining the signal//can be used in more places than a laptop computer
Less power consumption

Question Answer Marks

5(a) IF(A2<>"",VLOOKUP(A2,E3:F6,2), "") 5

If the contents of A2 are not empty – 1 mark


Otherwise display a blank cell – 1 mark

Three from:
Looks up/searches the value in A2
Looks up in the range E3:F6
Retrieves/displays the corresponding value
From the second column of the range
Displays the value/produces ICT in A3

© UCLES 2020 Page 5 of 13


0417/12 Cambridge IGCSE – Mark Scheme March 2020
PUBLISHED
Question Answer Marks

5(b)(i) Three from: 3


Used if the range of cells is to be used many times
Easier to remember a name rather than cell references
Only has to type in the name rather than the cell references
Less chance of errors when entering the range
If the range of cells moves/copied the name still refers to the cells

5(b)(ii) Example name – Subjects 1

5(c) Counts the number of candidates/people that are opting for the ICT examination 2

or

Counts the number of ‘E’ in the range A4:A15

Question Answer Marks

6(a) \Work\Class_A1\Examination_Marks\ 3

\Work – 1 mark
\Class_A1 – 1 mark
\Examination_Marks – 1 mark

6(b) .txt is a text file format – 1 mark 2


.rtf is a rich text format – 1 mark

6(c) Three from: 3


RTF has basic formatting (embolden, underline, etc.) while TXT is plain text
RTF is capable of paragraph formatting while TXT is not
RTF is capable of creating bulleted lists while TXT is not
RTF files can include images while TXT cannot
TXT takes up less memory while RTF takes up more memory

© UCLES 2020 Page 6 of 13


0417/12 Cambridge IGCSE – Mark Scheme March 2020
PUBLISHED
Question Answer Marks

6(d) Four from: 4


To save time typing the personal details of each student onto the document
To help reduce the number of errors in the typing of the data
Used to save time editing the document
Produces a personalised document for each student
So the teacher does not miss out a student

Question Answer Marks

7(a) Max five from: 6


The biometric data is unique to the user
Biometric data is always with you
Passwords can be copied/forgotten/guessed/cracked
Difficult to copy/forge biometric data
Eliminates shoulder surfing
Prevents key logging software

Max two from, e.g.:


fingerprints, Retina scans, Voice recognition, Iris scans, Handprint

7(b) Four from: 4


If the user wears glasses/grows a beard/damages the face/aging effects, then the laptop computer may not read the face
correctly
Position of the face and distance from the screen is important
Possible concerns about personal liberty infringement/intrusive
Equipment/set up is more expensive
The system has to be set up before use and this can take more time than setting up a password
May activate accidentally
Once set up it is difficult to reset

© UCLES 2020 Page 7 of 13


0417/12 Cambridge IGCSE – Mark Scheme March 2020
PUBLISHED
Question Answer Marks

8(a) Two from: 2


A flat file database stores data in one table//a relational database uses multiple tables
In a relational database the tables are linked
In a relational database must have a primary key and a foreign key in the linked tables

8(b) Four from: 4


Open database package
Select database tools
The teacher’s file and subject file would be imported to separate tables
A primary key is identified/set
The foreign key is identified in the subject table
Click/create/select relationships
The primary key is dragged to the foreign key
Save the database

Question Answer Marks

9 4
header footer margin

Text entered that can appear at the top of each page automatically 

An area between the main content of a page and the edge of the page 

An additional space between facing pages 

Text entered that can appear at the bottom of each page automatically 

© UCLES 2020 Page 8 of 13


0417/12 Cambridge IGCSE – Mark Scheme March 2020
PUBLISHED
Question Answer Marks

10(a) Four from: 4

Cell phone
He could use his cell phone to send text messages
Text messages can be sent at any time of the day//Text messages are not affected by time zone differences
He can capture image/audio and send them

VoIP
Used on any computing device that can connect to the internet
Can connect using hot spots
Live videos can be sent

To gain full marks it needs at least one benefit of using a cell phone and at least one benefit of using VoIP

10(b) One from: 1


Pay in cash/money
Withdraw cash/money

10(c) 2
Appropriate Not Appropriate

How old are you? 

What is your mother’s maiden name? 

What is your PIN? 

Which town were you born in? 

© UCLES 2020 Page 9 of 13


0417/12 Cambridge IGCSE – Mark Scheme March 2020
PUBLISHED
Question Answer Marks

10(d) Three from: 3


Saves money by not having to pay for transport to the bank
Saves time by not having to travel to the bank
He does not carry cash therefore less chance of robbery
Banking is 24/7
Money from his parents can be sent at any time therefore speeding up the time it takes to reach his account
Saves time rather than queueing in the bank
He can select his own language

10(e) Two from: 2


May not have a stable internet connection
It is easier to make an error with online banking
There may not be the facilities to carry out online banking in remote parts of Kenya
Security issues as he could be using public hot spots
May need cash as isolated communities may not have facilities

Question Answer Marks

11 Max four from: 6


The introduction of robots has reduced the number of car production/factory floor workers
Vehicle production factories/robots work ‘24/7’
Workers could be working unsociable hours
De-skilling of staff
Increase in training for staff

Max four from:


Increase in the number of supervisors/quality control workers
Increase in the number of maintenance staff
Increase in part time/job sharing
Increased number of staff compressing hours
Increase in the number of engineers/designers/programmers to build the robots

© UCLES 2020 Page 10 of 13


0417/12 Cambridge IGCSE – Mark Scheme March 2020
PUBLISHED
Question Answer Marks

12(a) Four from: 4


The web address should start with https
There is a closed/green padlock
When the padlock is clicked a message will state the connection is encrypted/secure
The web page has a digital/SSL certificate
The green padlock shows it has an Extended Validation (EV) certificate/CA certificate

12(b) Max four from: 6


Differences
Pharming downloads a file/program/malicious code onto the user’s smartphone
When the user enters a correct website the software redirects them to the fake website
When the user enters his password/personal data it is sent to the hacker’s computer
Pharming can be stopped by not downloading .exe, .bat files

In Smishing the user receives a text message from an unknown person


In Smishing the user is asked to phone a number/reply to the text/click on a link
Smishing can be stopped by not replying to unknown text messages

Max three from:


Comparisons
Both are attacks on the smartphone
Both redirect the user to a fake company/person/fake website
Both require the user to enter/divulge personal information
Both obtain/steal personal/your data

© UCLES 2020 Page 11 of 13


0417/12 Cambridge IGCSE – Mark Scheme March 2020
PUBLISHED
Question Answer Marks

13(a) Advantages 8
Max five from:
Allows the use of sound/animation/video/transitions to make the presentation//leaflets cannot use sound/animation/video
Can be more interactive therefore can be used on a company website/interactive whiteboard
Hyperlinks can be used//the users of the leaflet would have to type in the hyperlink
No printing costs
More accessible (speak text, etc.)
People can throw away leaflets without reading them
Easier to update

Disadvantages
Max five from:
Special equipment is needed to view the presentation
Power/equipment failure/corrupted software can be an issue
There could be more focus on the presentation rather than the content
People have to be present in the lecture room
The leaflet can be read at any time
Presentations cannot be written in braille

13(b) Four from: 4


Open the presentation
Take/photograph an image of the product
Upload an image of the new product from a camera/file/the company website//export from camera
Save the image
Select the correct slide
Create a frame on the slide
Browse/search for the image
Import/insert/copy and paste the image into the presentation/slide
Place/drag the image in correct place
Edit the image
Save the presentation

© UCLES 2020 Page 12 of 13


0417/12 Cambridge IGCSE – Mark Scheme March 2020
PUBLISHED
Question Answer Marks

13(c) Two from: 2


The image is not in the current/same folder
The name of the image/format/extension is incorrect
The image does not exist//software does not support the file extension
The image has not been uploaded

© UCLES 2020 Page 13 of 13



Cambridge IGCSE

INFORMATION AND COMMUNICATION TECHNOLOGY 0417/11


*7638064276*

Paper 1 Theory May/June 2020


2 hours

You must answer on the question paper.

No additional materials are needed.

INSTRUCTIONS
• Answer all questions.
• Use a black or dark blue pen.
• Write your name, centre number and candidate number in the boxes at the top of the page.
• Write your answer to each question in the space provided.
• Do not use an erasable pen or correction fluid.
• Do not write on any bar codes.
• You may use an HB pencil for any diagrams, graphs or rough working.

INFORMATION
• The total mark for this paper is 100.
• The number of marks for each question or part question is shown in brackets [ ].
• No marks will be awarded for using brand names of software packages or hardware.

This document has 16 pages. Blank pages are indicated.

06_0417_11_2020_1.13
© UCLES 2020 [Turn over
2

1 A computer consists of both hardware and software.

(a) Define the term software.

.....................................................................................................................................

.....................................................................................................................................

.....................................................................................................................................

..................................................................................................................................... [2]

(b) There are two types of software.

Identify the types.

1...................................................................................................................................

.....................................................................................................................................

2...................................................................................................................................

.....................................................................................................................................

[2]

2 Tick (✓) whether the following statements refer to a Command Line Interface (CLI) or a Graphical
User Interface (GUI).

CLI GUI
(✓) (✓)
The user has to type in every
instruction
The user does not need to
learn any of the instructions
Each instruction has to be
typed in correctly
The user is in direct
communication with the
computer

[2]

© UCLES 2020 06_0417_11_2020_1.13


3

3 Every computer contains input and output devices and a central processing unit (CPU).

(a) Describe the CPU including its role.

.....................................................................................................................................

.....................................................................................................................................

.....................................................................................................................................

.....................................................................................................................................

.....................................................................................................................................

.....................................................................................................................................

.....................................................................................................................................

..................................................................................................................................... [4]

(b) Data can be read directly by using a number of different devices.

Name the most appropriate device used to read the following data.

Cheque No. Branch Code Account No. Transaction Code

..................................................... .....................................................

0 26815 38221 6

..................................................... .....................................................

[4]

© UCLES 2020 06_0417_11_2020_1.13 [Turn over


4

4 A hospital is creating a database to store blood donors’ medical details. The fields in the
database include Health_number, Date_of_birth, Gender and Blood_group.

(a) When a new blood donor wishes to give blood they need to fill in a form.

Each blood donor has a unique health number which uses a 10-digit number, for example
9434765919.

Blood group can be A, B, AB or O.

Part of the form is shown below.

Blood donor

1. What is your health number?

2. What is your date of birth? / /

3. What is your gender? M/F

4. What is your blood group?

Name a suitable data type for the answers given to each of the questions in the form. For
any numeric field, specify the type of number.

Question 1...................................................................................................................

Question 2...................................................................................................................

Question 3...................................................................................................................

Question 4...................................................................................................................

[4]

© UCLES 2020 06_0417_11_2020_1.13


5

(b) In the Blood_group field the only data that can be entered is A, B, AB or O.

Tick (✓) whether each of the following blood groups is an example of abnormal or normal
data.

abnormal normal
Blood group
(✓) (✓)

AB

AO

[2]

(c) The administrator needs a list of all the blood donors in the database with blood group A
as well as in the same list all the blood donors with blood group AB. This list will only
include female blood donors.

To find the blood donor with the health number 9434765919 he will need to type in the
following query.

Health_number = 9434765919

Write a query to find all the female blood group donors with the blood group A as well as
those with AB.

.....................................................................................................................................

..................................................................................................................................... [6]

© UCLES 2020 06_0417_11_2020_1.13 [Turn over


6

(d) When the details of a new donor are added to the database the person’s date of birth is
entered.

Explain why the administrator would prefer their date of birth to be stored rather than their
age.

.....................................................................................................................................

.....................................................................................................................................

.....................................................................................................................................

.....................................................................................................................................

.....................................................................................................................................

.....................................................................................................................................

.....................................................................................................................................

..................................................................................................................................... [4]

(e) Name the most appropriate validation check for the Health_number.

.....................................................................................................................................

..................................................................................................................................... [1]

© UCLES 2020 06_0417_11_2020_1.13


7

5 Phishing and pharming can affect the security of a user’s data.

(a) Compare and contrast phishing and pharming.

.....................................................................................................................................

.....................................................................................................................................

.....................................................................................................................................

.....................................................................................................................................

.....................................................................................................................................

.....................................................................................................................................

.....................................................................................................................................

.....................................................................................................................................

.....................................................................................................................................

.....................................................................................................................................

.....................................................................................................................................

..................................................................................................................................... [6]

© UCLES 2020 06_0417_11_2020_1.13 [Turn over


8

(b) Smishing is another security issue. Describe the methods which can be used to help
prevent smishing.

.....................................................................................................................................

.....................................................................................................................................

.....................................................................................................................................

.....................................................................................................................................

.....................................................................................................................................

.....................................................................................................................................

.....................................................................................................................................

.....................................................................................................................................

.....................................................................................................................................

.....................................................................................................................................

.....................................................................................................................................

..................................................................................................................................... [6]

6 Tick (✓) which of the following statements apply to LANs, which apply to WANs and which
apply to WLANs.

LAN WAN WLAN


(✓) (✓) (✓)

The internet is an example of this type of network

This type of network is found in a building but is


connected without cables
This type of network is used to transmit data
between Europe and North America
This type of network is found in a building but is
connected with cables

[4]

© UCLES 2020 06_0417_11_2020_1.13


9

7 The headteacher of a school has decided to replace desktop computers with laptop computers.

Describe the advantages and disadvantages of using a laptop computer rather than a desktop
computer.

............................................................................................................................................

............................................................................................................................................

............................................................................................................................................

............................................................................................................................................

............................................................................................................................................

............................................................................................................................................

............................................................................................................................................

............................................................................................................................................ [4]

8 Following recent data protection issues the personal data we allow organisations to share about
us may be reduced.

(a) Discuss the benefits and drawbacks of trying to keep personal data confidential and secure.

.....................................................................................................................................

.....................................................................................................................................

.....................................................................................................................................

.....................................................................................................................................

.....................................................................................................................................

.....................................................................................................................................

.....................................................................................................................................

.....................................................................................................................................

.....................................................................................................................................

.....................................................................................................................................

.....................................................................................................................................

..................................................................................................................................... [6]

© UCLES 2020 06_0417_11_2020_1.13 [Turn over


10

(b) The sharing of email addresses can lead to spam.

Explain what is meant by the term spam email.

.....................................................................................................................................

.....................................................................................................................................

.....................................................................................................................................

..................................................................................................................................... [2]

(c) Explain why spam email should be prevented.

.....................................................................................................................................

.....................................................................................................................................

.....................................................................................................................................

.....................................................................................................................................

.....................................................................................................................................

.....................................................................................................................................

.....................................................................................................................................

..................................................................................................................................... [4]

© UCLES 2020 06_0417_11_2020_1.13


11

9 Point of sale (POS) terminals are used in supermarkets.

(a) Tick (✓) which of the following devices used at a POS terminal are only input devices,
which are only output devices and which are both.

Input Output Both


Device
(✓) (✓) (✓)

Bar code reader

Buzzer

Touch screen on till

Receipt printer

Light sensor on the conveyor belt

Electronic scales

[6]

© UCLES 2020 06_0417_11_2020_1.13 [Turn over


12

(b) A stock file contains data about the goods being sold. Describe the steps needed to update
the stock file when an item is scanned at the point of sale (POS) terminal. Include in your
description how new stock can be ordered automatically.

.....................................................................................................................................

.....................................................................................................................................

.....................................................................................................................................

.....................................................................................................................................

.....................................................................................................................................

.....................................................................................................................................

.....................................................................................................................................

.....................................................................................................................................

.....................................................................................................................................

.....................................................................................................................................

.....................................................................................................................................

..................................................................................................................................... [6]

© UCLES 2020 06_0417_11_2020_1.13


13

10 The network manager at a school has been asked to develop a student registration system to
help staff keep a record of student attendance.

(a) Describe the steps required in the analysis of such a system.

.....................................................................................................................................

.....................................................................................................................................

.....................................................................................................................................

.....................................................................................................................................

.....................................................................................................................................

.....................................................................................................................................

.....................................................................................................................................

.....................................................................................................................................

.....................................................................................................................................

.....................................................................................................................................

.....................................................................................................................................

..................................................................................................................................... [6]

(b) The school is planning to use fingerprints as a way to record when students arrive in the
class.

Describe the advantages and disadvantages of using fingerprint data entry for student
registration systems rather than magnetic ID cards.

.....................................................................................................................................

.....................................................................................................................................

.....................................................................................................................................

.....................................................................................................................................

.....................................................................................................................................

.....................................................................................................................................

.....................................................................................................................................

..................................................................................................................................... [4]

© UCLES 2020 06_0417_11_2020_1.13 [Turn over


14

(c) Fingerprints are one example of biometrics.

Identify three other examples of biometrics.

1...................................................................................................................................

.....................................................................................................................................

2...................................................................................................................................

.....................................................................................................................................

3...................................................................................................................................

.....................................................................................................................................

[3]

11 Most data protection acts include the principle that data should be accurate and, where
necessary, kept up to date.

List four other principles of a typical data protection act.

1..........................................................................................................................................

............................................................................................................................................

2..........................................................................................................................................

............................................................................................................................................

3..........................................................................................................................................

............................................................................................................................................

4..........................................................................................................................................

............................................................................................................................................

[4]

© UCLES 2020 06_0417_11_2020_1.13


15

12 The way we buy products using credit cards has changed in recent years. Originally the magnetic
stripe on the back of the card was used with a signature. Then chip and PIN methods were
used, and more recently contactless methods have been introduced.

Discuss the effectiveness of using these different methods to improve security when paying
for goods.

............................................................................................................................................

............................................................................................................................................

............................................................................................................................................

............................................................................................................................................

............................................................................................................................................

............................................................................................................................................

............................................................................................................................................

............................................................................................................................................

............................................................................................................................................

............................................................................................................................................

............................................................................................................................................

............................................................................................................................................

............................................................................................................................................

............................................................................................................................................

............................................................................................................................................

............................................................................................................................................ [8]

© UCLES 2020 06_0417_11_2020_1.13


16

BLANK PAGE

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable
effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will
be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge Assessment
International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at
www.cambridgeinternational.org after the live examination series.

Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of
Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge.

© UCLES 2020 06_0417_11_2020_1.13


Cambridge IGCSE™

INFORMATION AND COMMUNICATION TECHNOLOGY 0417/11


Paper 1 Written May/June 2020
MARK SCHEME
Maximum Mark: 100

Published

Students did not sit exam papers in the June 2020 series due to the Covid-19 global pandemic.

This mark scheme is published to support teachers and students and should be read together with the
question paper. It shows the requirements of the exam. The answer column of the mark scheme shows the
proposed basis on which Examiners would award marks for this exam. Where appropriate, this column also
provides the most likely acceptable alternative responses expected from students. Examiners usually review
the mark scheme after they have seen student responses and update the mark scheme if appropriate. In the
June series, Examiners were unable to consider the acceptability of alternative responses, as there were no
student responses to consider.

Mark schemes should usually be read together with the Principal Examiner Report for Teachers. However,
because students did not sit exam papers, there is no Principal Examiner Report for Teachers for the June
2020 series.

Cambridge International will not enter into discussions about these mark schemes.

Cambridge International is publishing the mark schemes for the June 2020 series for most Cambridge
IGCSE™ and Cambridge International A & AS Level components, and some Cambridge O Level
components.

This document consists of 10 printed pages.

© UCLES 2020 [Turn over


0417/11 Cambridge IGCSE – Mark Scheme May/June 2020
PUBLISHED

Generic Marking Principles

These general marking principles must be applied by all examiners when marking candidate answers.
They should be applied alongside the specific content of the mark scheme or generic level descriptors
for a question. Each question paper and mark scheme will also comply with these marking principles.

GENERIC MARKING PRINCIPLE 1:

Marks must be awarded in line with:

• the specific content of the mark scheme or the generic level descriptors for the question
• the specific skills defined in the mark scheme or in the generic level descriptors for the question
• the standard of response required by a candidate as exemplified by the standardisation scripts.

GENERIC MARKING PRINCIPLE 2:

Marks awarded are always whole marks (not half marks, or other fractions).

GENERIC MARKING PRINCIPLE 3:

Marks must be awarded positively:

• marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit
is given for valid answers which go beyond the scope of the syllabus and mark scheme,
referring to your Team Leader as appropriate
• marks are awarded when candidates clearly demonstrate what they know and can do
• marks are not deducted for errors
• marks are not deducted for omissions
• answers should only be judged on the quality of spelling, punctuation and grammar when these
features are specifically assessed by the question as indicated by the mark scheme. The
meaning, however, should be unambiguous.

GENERIC MARKING PRINCIPLE 4:

Rules must be applied consistently e.g. in situations where candidates have not followed
instructions or in the application of generic level descriptors.

GENERIC MARKING PRINCIPLE 5:

Marks should be awarded using the full range of marks defined in the mark scheme for the question
(however; the use of the full mark range may be limited according to the quality of the candidate
responses seen).

GENERIC MARKING PRINCIPLE 6:

Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should
not be awarded with grade thresholds or grade descriptors in mind.

© UCLES 2020 Page 2 of 10


0417/11 Cambridge IGCSE – Mark Scheme May/June 2020
PUBLISHED

Question Answer Marks

1(a) Two from: 2


Software is programs and data
Programs for controlling the operation of a computer
Programs for processing of electronic data

1(b) System software 2


Applications software

Question Answer Marks

2 2
CLI GUI

The user has to type in every instruction 

The user does not need to learn any of the



instructions

Each instruction has to be typed in correctly 

The user is in direct communication with the



computer

Two marks for four correct ticks


One mark for two or three correct ticks
Zero marks for one correct tick

Question Answer Marks

3(a) Four from: 4


An item of hardware
It carries out the instructions of a computer program
It performs basic arithmetic calculations
It performs logical operations
It performs input/output operations of the computer
It contains the internal storage/control unit

3(b) (i) RFID reader 4


(ii) Magnetic Ink Character Reader/MICR
(iii) Bar code reader
(iv) Chip reader

Question Answer Marks

4(a) Question 1 Numeric: integer // text 4


Question 2 Date/time
Question 3 Boolean/logical
Question 4 Text/alphanumeric

© UCLES 2020 Page 3 of 10


0417/11 Cambridge IGCSE – Mark Scheme May/June 2020
PUBLISHED

Question Answer Marks

4(b) 2
abnormal normal

AB 

C 

B 

AO 

Two marks for four correct ticks


One mark for two or three correct ticks
Zero marks for one correct tick

4(c) Gender = F AND Blood_group = A* 6

Gender – 1 mark
= F – 1 mark
AND –1 mark
= A* – 1 mark
use of wildcard – 1 mark
Blood_group – 1 mark

4(d) Two matched pairs from: 4

The age changes every year therefore it will need to be changed regularly ...
... Administration of the database becomes more time consuming.

The age of the donor can be easily and automatically calculated from their
date of birth ...
... improving accuracy.

Data only needs to be entered once ...


... reducing errors.

4(e) Length check // Range check 1

© UCLES 2020 Page 4 of 10


0417/11 Cambridge IGCSE – Mark Scheme May/June 2020
PUBLISHED

Question Answer Marks

5(a) Max four from: 6

Comparisons
Both use the internet
Both redirect the user to a fake website
Both can lead to fraud and identity theft
Both use websites that look legitimate
Personal data is compromised

Max four from:

Differences
With phishing emails are sent to the computer
In pharming malicious code is uploaded to the computer
In phishing clicking a link sends user to a fake website
In pharming the code redirects the user to a fake website without their
knowledge
The email in phishing appears to have come from a trusted source
Website in pharming appears to be genuine
In pharming spyware can be used to record key presses

5(b) Six from: 6

Avoid clicking on any unknown texts with links/Avoid clicking links in texts
from people you do not know.

Do not reply to text messages that have asked you about any of your
personal finances/details.

Report any suspicious activity.

Be on the lookout for messages that contain the number 5000 or any
number that is not a phone number as this is used by smishers.
If the text messages urge you for a quick reply then that is a clear sign of
smishing.

Do extensive research before replying to any message. There are plenty


websites that allow anyone to run searches based on a phone number and
see any relatable information about whether or not a number is legitimate.

Never call back a phone number that was associated with the text from an
unknown source.

If the message states ‘Dear user, congratulations, you have won.’ It is a


clear sign for smishing.

Check the time when the unknown message was sent.

If the text message was sent at an unusual time, then that is another sign of
smishing.

© UCLES 2020 Page 5 of 10


0417/11 Cambridge IGCSE – Mark Scheme May/June 2020
PUBLISHED

Question Answer Marks

6 4
LAN WAN WLAN

The internet is an example of this type



of network

This type of network is found in a


building but is connected without 
cables

This type of network is used to


transmit data between Europe and 
North America

This type of network is found in a



building but is connected with cables

One mark per correct row

Question Answer Marks

7 Max three from: 4

Advantages
All elements are together in one unit therefore takes up less space
They are portable
Can be used in more places than a desktop

Max three from:

Disadvantages
Easier to steal/lose
Limited battery life so more likely to run out of power
Pointing devices can be more difficult to use
In built webcams can be more difficult to use rather than a desktop
If one piece of hardware breaks it can be more difficult to replace
Desktops have a better heat dispersion rate
More likely to be damaged as they are portable.
Screen size may be smaller
Less powerful

© UCLES 2020 Page 6 of 10


0417/11 Cambridge IGCSE – Mark Scheme May/June 2020
PUBLISHED

Question Answer Marks

8(a) Max five from: 6

Benefits
If personal data is kept confidential then identity theft is reduced
It helps prevent fraud
Reduces the chance of users suffering harm from criminals, as less data for
criminals to attempt to access
Protects sensitive data
… examples:
racial/ethnic/political/religious/membership of trade unions/health/criminal
activity
Protects the data being used for purposes other than what it was collected
for

Max five from:

Drawbacks
Difficult to enforce as users give information freely
Most users do not read the terms and conditions before agreeing to them,
therefore allowing data to be used
Data protection is local but networks are global so laws are difficult to
enforce
Younger people do not mind that data is passed on therefore the law could
not be enforced for all

8(b) Two from: 2


Electronic Junk email/unsolicited emails/sent to a person without requesting
it
Deliberate filling up of a user’s inbox/many emails sent at once
Emails sent to everyone on the mailing list

8(c) Four from: 4


Takes time to deal with it
Can slow down networks
Can fill up the receiver’s mail box and therefore fill up hard disk/leads to
denial of service
Can increase the time needed to run your email software
Could contain a virus

© UCLES 2020 Page 7 of 10


0417/11 Cambridge IGCSE – Mark Scheme May/June 2020
PUBLISHED

Question Answer Marks

9(a) 6
Device Input Output Both

Bar code reader 

Buzzer 

Touch screen on till 

Receipt printer 

Light sensor on the conveyor belt 

Electronic scales 

One mark per correct row

9(b) Max five from: 6


Bar code is scanned at the POS/bar code number entered manually
Bar code is searched for in the stock file …
… until the record is found
Details of the product are read
Stock level of the item reduced by 1
New stock level written back to the file
Item is flagged to state order in place

If less than the re-order level then the item is automatically re-ordered – 1
mark

Question Answer Marks

10(a) Six from: 6


Current system is observed
Staff/potential users interviewed
Staff/potential users given questionnaires
Gather information about current system
Existing documents examined
Inputs, outputs and processing of the current system determined
Problems with current system identified
User and information requirements identified
System specification decided
Hardware identified/justified
Software identified/justified

© UCLES 2020 Page 8 of 10


0417/11 Cambridge IGCSE – Mark Scheme May/June 2020
PUBLISHED

Question Answer Marks

10(b) Max three from: 4

Advantages
Fingerprints are unique
More accurate data entry
Improved security
Your fingerprints are with you all the time/cannot be lost/ID cards can be lost
Student needs to be present at the reader
Magnetic cards can be affected by magnetic fields/smart phones
Very difficult to clone unlike cards

Max three from:

Disadvantages
Takes a longer time to collect all the fingerprints and store them rather than
producing ID cards
Equipment would be more expensive
Damage to the finger/reader will give false readings/no reading
Invasion of privacy

10(c) Three from: 3


Iris scan
Hand print
Facial recognition
Voice recognition
Retina scan

Question Answer Marks

11 Four from: 4
Data should be fairly and lawfully processed
Data should only be processed for the stated purpose
Data should be adequate, relevant and not excessive/limited
Data should not be kept longer than necessary
Data should be processed in accordance with the data subject’s rights
Data should be kept secure
Data should not be transferred to another country unless they have
adequate protection.
Data should be processed in a transparent manner
Data should be collected for specified/explicit/legitimate purposes
Data should only be further processed for archive purposes which is
compatible with the initial purposes
Data kept for archiving should safeguard the rights and freedoms of
individuals
Explicit consent required for processing sensitive data
Parental consent required for processing personal data of children including
online services
Data subjects are allowed access to their personal data

© UCLES 2020 Page 9 of 10


0417/11 Cambridge IGCSE – Mark Scheme May/June 2020
PUBLISHED

Question Answer Marks

12 Magnetic stripe 8
Benefits
The user needs to have the card present to use it
Data more difficult to copy as it uses a stripe
Increased security as signature is also needed
Drawbacks
The card could be stolen and the signature copied
Magnetic stripe can be affected by magnetic fields
Card can be damaged due to overuse

Chip and PIN


Benefits
Increased security as the card and a PIN is also needed
The chip cannot be scanned remotely
Drawbacks
Shoulder surfing can take place
Security risk as the chip contains personal information
Card can be damaged due to overuse

Contactless
Benefits
More secure as encryption is used to read the card
Card details can be stored on a smartphone which might have an extra layer
of security
Stops shoulder surfing
Only allows a small amount to be transacted
Drawbacks
Someone who steals the card can use it without a PIN
Can be cloned using electronic devices
No contact with the device so other devices may ‘read’ the card accidentally
Security risk as the card contains personal information

To achieve full marks all three methods must be discussed, the discussion
must also cover both the benefits and drawbacks.

One mark can be awarded for a reasoned conclusion

© UCLES 2020 Page 10 of 10



Cambridge IGCSE

INFORMATION AND COMMUNICATION TECHNOLOGY 0417/12


*1018410769*

Paper 1 Theory May/June 2020


2 hours

You must answer on the question paper.

No additional materials are needed.

INSTRUCTIONS
• Answer all questions.
• Use a black or dark blue pen.
• Write your name, centre number and candidate number in the boxes at the top of the page.
• Write your answer to each question in the space provided.
• Do not use an erasable pen or correction fluid.
• Do not write on any bar codes.
• You may use an HB pencil for any diagrams, graphs or rough working.

INFORMATION
• The total mark for this paper is 100.
• The number of marks for each question or part question is shown in brackets [ ].
• No marks will be awarded for using brand names of software packages or hardware.

This document has 16 pages. Blank pages are indicated.

06_0417_12_2020_1.15
© UCLES 2020 [Turn over
2

1 The 2020 Olympic Games committee is producing a database to show the medal winners in the
cycling events.

It is important that the correct data type is used in each of the fields.

(a) Tick (✓) the most appropriate data type for each of the following fields.

Text
Boolean Numeric
(alphanumeric)
(✓) (✓)
(✓)

Athlete_name

Gold_medal (Y/N)

Age

Name_of_country

[4]

© UCLES 2020 06_0417_12_2020_1.15


3

(b) A report has been produced that shows the male gold medal winners from the past three
Olympic Games.

Write down six of the formatting features that have been used in the report.

1.........................................................................................................................................

...........................................................................................................................................

2.........................................................................................................................................

...........................................................................................................................................

3.........................................................................................................................................

...........................................................................................................................................

4.........................................................................................................................................

...........................................................................................................................................

5.........................................................................................................................................

...........................................................................................................................................

6.........................................................................................................................................

...........................................................................................................................................

[6]

© UCLES 2020 06_0417_12_2020_1.15 [Turn over


4

(a) Write down the type of interface shown.

........................................................................................................................................... [1]

(b) Write down two disadvantages of using this type of interface.

1.........................................................................................................................................

...........................................................................................................................................

2.........................................................................................................................................

...........................................................................................................................................

[2]

© UCLES 2020 06_0417_12_2020_1.15


5

3 Complete the following sentences using the most appropriate network term.

A communication method that wirelessly connects a mobile phone to a car, to allow hands-free

use of the mobile phone is ........................................... .

A network device that allows a stand-alone computer, using a dial-up analogue connection, to

connect to an ISP is a .......................................... .

A network device that allows a LAN to connect to the internet is a ........................................ .

A wireless communication method used in WLAN is ......................................... .

[4]

4 A teacher is creating a spreadsheet that will record the grades students achieved in recent tests
and compare the average grades of these tests with the students’ forecast grades. The grading
the teacher is using awards 1 for the highest grade down to 10 for the lowest. The teacher has
created a validation rule on the grade entered.

(a) Give examples of data used to test the validation rule. Your answers for abnormal test data
must be for a different reason in each case.

Type of test data Example of test data

Normal

Abnormal

Abnormal

Extreme

[4]

© UCLES 2020 06_0417_12_2020_1.15 [Turn over


6

(b) Part of the spreadsheet is shown, column G subtracts the Forecast grade from the Average
grade.

(i) Describe the steps the teacher can take to edit the spreadsheet to prevent new data
being typed into the Forecast grade column.

................................................................................................................................

................................................................................................................................

................................................................................................................................

................................................................................................................................

................................................................................................................................

................................................................................................................................

................................................................................................................................

................................................................................................................................

................................................................................................................................

................................................................................................................................ [5]

(ii) The teacher has typed a formula in cell E3. The formula is ROUNDUP(AVERAGE(B3:D3),0)
Explain, in detail, what the formula does.

................................................................................................................................

................................................................................................................................

................................................................................................................................

................................................................................................................................

................................................................................................................................

................................................................................................................................

................................................................................................................................ [4]

© UCLES 2020 06_0417_12_2020_1.15


7

(c) The teacher has produced a graph showing the differences between the forecast grade and
the average grade for each student. The graph looks like this.

Describe the steps taken to create the graph. Include in your answer three improvements that
could be made to the graph.

Method...............................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

Improvement 1...................................................................................................................

...........................................................................................................................................

Improvement 2...................................................................................................................

...........................................................................................................................................

Improvement 3...................................................................................................................

...........................................................................................................................................

[6]

© UCLES 2020 06_0417_12_2020_1.15 [Turn over


8

5 When using the internet, FTP can be used.

Explain what is meant by the term FTP.

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

.................................................................................................................................................. [2]

6 Smishing and phishing can affect the security of a user’s data.

(a) Compare and contrast smishing and phishing.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [6]

© UCLES 2020 06_0417_12_2020_1.15


9

(b) Describe the methods which can be used to help prevent phishing.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [6]

7 Complete each sentence using the most appropriate output device from the following list.

3D printer Buzzer Dot matrix printer Heater


Laser printer LCD monitor Light Wide format printer

(a) The device that can produce prosthetic limbs is called a

........................................................................................................................................... [1]

(b) The device that can output soft copy is called a

........................................................................................................................................... [1]

(c) The device that can produce sound as its main output is called a

........................................................................................................................................... [1]

© UCLES 2020 06_0417_12_2020_1.15 [Turn over


10

8 Tablet computers tend to be used more than desktop computers.

Describe the advantages and disadvantages of using a tablet computer rather than a desktop
computer.

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

.................................................................................................................................................. [6]

9 People rely heavily on microprocessor-controlled devices in the home.

(a) Describe two drawbacks in terms of lifestyle changes this has produced for the users of such
devices.

1.........................................................................................................................................

...........................................................................................................................................

2.........................................................................................................................................

...........................................................................................................................................

[2]

© UCLES 2020 06_0417_12_2020_1.15


11

(b) Many of the microprocessor-controlled devices in our homes use WiFi connections.

Describe the benefits and drawbacks of using WiFi connections in this way.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [6]

10 Music scores can now be produced using computer systems and appropriate software.

Describe the features of this technology.

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

.................................................................................................................................................. [4]

© UCLES 2020 06_0417_12_2020_1.15 [Turn over


12

11 A headteacher is planning to produce a presentation to showcase the school’s achievements.

(a) Describe two methods the headteacher could use to gather information about the requirements
of the target audience.

1.........................................................................................................................................

...........................................................................................................................................

2.........................................................................................................................................

...........................................................................................................................................

[2]

(b) The presentation is to be shown on large monitors at the entrance to the school. The school
is planning to embed music into the presentation so that music could be played as the
presentation is shown.

Describe the steps the headteacher would need to take to play music in the background of
the slides.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [4]

© UCLES 2020 06_0417_12_2020_1.15


13

(c) After showing the presentation to the parents the headteacher wishes to use the presentation
to show to young children to encourage them to come to the school.

Describe the features that the headteacher must include to make the presentation meet the
needs of an audience of young children.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [4]

12 (a) Describe repetitive strain injury (RSI) and explain what causes it.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [2]

(b) Give three ways of minimising the risk of RSI.

1.........................................................................................................................................

...........................................................................................................................................

2.........................................................................................................................................

...........................................................................................................................................

3.........................................................................................................................................

...........................................................................................................................................

[3]

© UCLES 2020 06_0417_12_2020_1.15 [Turn over


14

13 Modern laptop computers tend to use external solid state storage rather than external optical
storage.

Compare and contrast the use of solid state storage with the use of optical storage to store data.

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

.................................................................................................................................................. [8]

© UCLES 2020 06_0417_12_2020_1.15


15

14 There are two types of storage within a computer, internal memory and backing storage.

Discuss the differences between internal memory and backing storage.

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

.................................................................................................................................................. [6]

© UCLES 2020 06_0417_12_2020_1.15


16

BLANK PAGE

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable
effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will
be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge Assessment
International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at
www.cambridgeinternational.org after the live examination series.

Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of
Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge.

© UCLES 2020 06_0417_12_2020_1.15


Cambridge IGCSE™

INFORMATION AND COMMUNICATION TECHNOLOGY 0417/12


Paper 1 Written May/June 2020
MARK SCHEME
Maximum Mark: 100

Published

Students did not sit exam papers in the June 2020 series due to the Covid-19 global pandemic.

This mark scheme is published to support teachers and students and should be read together with the
question paper. It shows the requirements of the exam. The answer column of the mark scheme shows the
proposed basis on which Examiners would award marks for this exam. Where appropriate, this column also
provides the most likely acceptable alternative responses expected from students. Examiners usually review
the mark scheme after they have seen student responses and update the mark scheme if appropriate. In the
June series, Examiners were unable to consider the acceptability of alternative responses, as there were no
student responses to consider.

Mark schemes should usually be read together with the Principal Examiner Report for Teachers. However,
because students did not sit exam papers, there is no Principal Examiner Report for Teachers for the June
2020 series.

Cambridge International will not enter into discussions about these mark schemes.

Cambridge International is publishing the mark schemes for the June 2020 series for most Cambridge
IGCSE™ and Cambridge International A & AS Level components, and some Cambridge O Level
components.

This document consists of 9 printed pages.

© UCLES 2020 [Turn over


0417/12 Cambridge IGCSE – Mark Scheme May/June 2020
PUBLISHED

Generic Marking Principles

These general marking principles must be applied by all examiners when marking candidate answers.
They should be applied alongside the specific content of the mark scheme or generic level descriptors
for a question. Each question paper and mark scheme will also comply with these marking principles.

GENERIC MARKING PRINCIPLE 1:

Marks must be awarded in line with:

• the specific content of the mark scheme or the generic level descriptors for the question
• the specific skills defined in the mark scheme or in the generic level descriptors for the question
• the standard of response required by a candidate as exemplified by the standardisation scripts.

GENERIC MARKING PRINCIPLE 2:

Marks awarded are always whole marks (not half marks, or other fractions).

GENERIC MARKING PRINCIPLE 3:

Marks must be awarded positively:

• marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit
is given for valid answers which go beyond the scope of the syllabus and mark scheme,
referring to your Team Leader as appropriate
• marks are awarded when candidates clearly demonstrate what they know and can do
• marks are not deducted for errors
• marks are not deducted for omissions
• answers should only be judged on the quality of spelling, punctuation and grammar when these
features are specifically assessed by the question as indicated by the mark scheme. The
meaning, however, should be unambiguous.

GENERIC MARKING PRINCIPLE 4:

Rules must be applied consistently e.g. in situations where candidates have not followed
instructions or in the application of generic level descriptors.

GENERIC MARKING PRINCIPLE 5:

Marks should be awarded using the full range of marks defined in the mark scheme for the question
(however; the use of the full mark range may be limited according to the quality of the candidate
responses seen).

GENERIC MARKING PRINCIPLE 6:

Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should
not be awarded with grade thresholds or grade descriptors in mind.

© UCLES 2020 Page 2 of 9


0417/12 Cambridge IGCSE – Mark Scheme May/June 2020
PUBLISHED

Question Answer Marks

1(a) 4
Text
Boolean Numeric
(alphanumeric)

Athlete_name 

Gold_medal(Y/N) 

Age 

Name_of_Country 

One mark per correct row

1(b) Six from: 6


Italic
Increase/decrease font size
Border
Tab
Bold
Superscript
Underline
Text highlighting

Question Answer Marks

2(a) Command Line Interface/CLI 1

2(b) Two from: 2


Have to remember/learn the commands
Have to type in the commands accurately
Difficult to edit once commands typed in

Question Answer Marks

3 Bluetooth 4
Modem
Router
WiFi

© UCLES 2020 Page 3 of 9


0417/12 Cambridge IGCSE – Mark Scheme May/June 2020
PUBLISHED

Question Answer Marks

4(a) One from: 4


Normal data: Any integer between 1 and 10

Two from: (must be a different type)


Abnormal data: Any number outside the range/alphabetic/symbol/negative
number/decimal number

One from:
Extreme: 1 or 10

4(b)(i) Five from: 5


Select the whole sheet
Right click then Format cells
Click Protection tab ...
... unlock cells
Highlight F3:F6/Forecast grades column/column F
Lock cells
Click on Review then protect sheet

4(b)(ii) Calculates the Average 4


of the range B3 to D3
Rounds up the answer
to 0 decimal places/integer

4(c) Three from: 6


Highlight A3:A6
Hold CTRL
Select G3:G6
Click insert
Column/bar graph

Three from:
Add legend
Add chart title
Add axes labels
Remove gridlines
Change colour/thickness of the bars

Question Answer Marks

5 Two from: 2
File transfer protocol
Used when transferring files from one computer to another over the internet

© UCLES 2020 Page 4 of 9


0417/12 Cambridge IGCSE – Mark Scheme May/June 2020
PUBLISHED

Question Answer Marks

6(a) Max five from: 6

Comparisons
Both use communication devices to collect personal data
Both require the user to communicate quickly
Both require the user to enter personal data
Both use the internet

Max five from:

Differences
Smishing: fake text messages/SMS are sent to a phone
Phishing: fake emails are sent to your computer
In smishing the user may be asked to make a phone call
A smishing message is shorter than a phishing email
Easier to spot a smishing message
Smishing messages tend to use 5000 in the message

6(b) Six from: 6


Avoid clicking on any unknown emails with links.
Do not reply to emails that have asked you about any of your personal data.
Report any suspicious activity.
If the email urges you for a quick reply then that is a clear sign of phishing.
Do extensive research before replying to any message, check the domain
name/company name
If the email is too good to be true, it possibly is
Check the time when the unknown email was sent.
If the email was sent at an unusual time, then that is another sign of
phishing.
If the to: box has a large number of similar emails to yours then it is phishing
If there are several grammar mistakes then it is suspicious

Question Answer Marks

7(a) 3D printer 1

7(b) LCD Monitor 1

7(c) Buzzer 1

© UCLES 2020 Page 5 of 9


0417/12 Cambridge IGCSE – Mark Scheme May/June 2020
PUBLISHED

Question Answer Marks

8 Max four from: 6

Advantages
Tablet computers are more portable
Can be used in more places than a desktop computer
Smaller footprint as the units are not separate
Powered by battery so can be used away from a power supply
Internet connection may be better as device is portable

Max four from:

Disadvantages
Tablet computers are easier to steal/lose
As the elements of a desktop computer are separate they are easier to
upgrade/tablet computers are one unit
Batteries can run out/desktop computers have less chance of running out of
power
Screens are smaller
Keyboard tends to be onscreen/touch screen therefore can be harder to use
No mouse therefore pointing devices/touchscreen can be harder to use
Webcams tend to be static therefore harder to use
Less standard ports/sockets
Desktop computers have a better heat dispersion rate
Desktop computers are less likely to be damaged as they are not portable.

Question Answer Marks

9(a) Two from: 2


Can lead to unhealthy eating due to dependency on ready meals
Can lead to laziness
Lack of fitness/exercise
Manual household skills are lost

© UCLES 2020 Page 6 of 9


0417/12 Cambridge IGCSE – Mark Scheme May/June 2020
PUBLISHED

Question Answer Marks

9(b) Max four from: 6

Drawbacks
Security issue with the data being sent as passwords can be accessed
Leads to laziness as voice control used
Heavily reliant on power/battery power
Other people can hack devices
Reliant on the WiFi connection
Can be affected by walls/weather
Affected by distance from the WAP

Max four from:

Benefits
Smartphones can connect to the devices and can control them
Wireless so no tripping over wires
Voice control can be used to activate the devices
Home surveillance from afar
TV on demand
Keyless door locks are more secure

Question Answer Marks

10 Four from: 4
The music score can be generated from the music played
The editing/correcting of the music score in a different key is faster
Solo music scores can be easily transformed into music for many parts
Software can automatically correct the music score
Music can be played automatically as it is written
Music notes are automatically printed out in the correct format
Music scores can be saved for future editing

Question Answer Marks

11(a) Interview members of the target audience to see what they want from the 2
presentation
Give out questionnaires to the target audience

11(b) Four from: 4


Select slide 1
Click Insert …
... Select Audio
Locate the music on PC and select
Click play in background
Test it by running the slideshow

© UCLES 2020 Page 7 of 9


0417/12 Cambridge IGCSE – Mark Scheme May/June 2020
PUBLISHED

Question Answer Marks

11(c) Four from: 4


The font needs to be easy to read
Larger font needed
Different font
Bright colours
Animation used
Simpler language
Shorter length
Transition effects
More pictures than text
Different music

Question Answer Marks

12(a) Damage to fingers and wrists – 1 mark 2

One from:
Caused by continuous use of a keyboard
Caused by repetitive clicking of a mouse button

12(b) Three from: 3


Use an ergonomic keyboard
Use an ergonomic mouse
Use a wrist rest/use a mouse rest
Use voice-activated software
Take regular breaks
Maintain correct posture of arms

© UCLES 2020 Page 8 of 9


0417/12 Cambridge IGCSE – Mark Scheme May/June 2020
PUBLISHED

Question Answer Marks

13 Max seven from: 8

Differences
Optical discs such as CDs, DVDs and Blu-ray discs …
…. are read from and written to using a laser beam

Solid state storage such as pen drives and SSDs …


…. are read from and written to using semiconductor chips

Optical discs have slower access times


Optical discs have slower transfer rates
Optical discs can be more easily scratched
Solid state do not have to get up to speed before they work
Solid state has lower power consumption

Max seven from:

Comparisons
Both store videos, music, files, images, data
Both are portable
Both use direct access
Both can be easily lost/stolen
Both backing storage

Question Answer Marks

14 Six from: 6
Internal storage examples RAM and ROM
Internal storage is chip based
Backing storage can be solid state, optical or magnetic
Backing storage is permanent storage
RAM loses memory when computer is turned off
RAM contains current instruction
ROM contains instructions to boot up the computer
Backing storage has slower access speeds
More storage in backing storage

© UCLES 2020 Page 9 of 9



Cambridge IGCSE

INFORMATION AND COMMUNICATION TECHNOLOGY 0417/13


*3929455569*

Paper 1 Theory May/June 2020


2 hours

You must answer on the question paper.

No additional materials are needed.

INSTRUCTIONS
• Answer all questions.
• Use a black or dark blue pen.
• Write your name, centre number and candidate number in the boxes at the top of the page.
• Write your answer to each question in the space provided.
• Do not use an erasable pen or correction fluid.
• Do not write on any bar codes.
• You may use an HB pencil for any diagrams, graphs or rough working.

INFORMATION
• The total mark for this paper is 100.
• The number of marks for each question or part question is shown in brackets [ ].
• No marks will be awarded for using brand names of software packages or hardware.

This document has 20 pages. Blank pages are indicated.

06_0417_13_2020_1.13
© UCLES 2020 [Turn over
2

1 There are two types of software: applications and system.

Tick (✓) the most appropriate type of software for each of the following.

Applications System
(✓) (✓)

Device driver

Linker

Photo-editing software

Spreadsheet

[2]

2 (a) Write down the type of interface shown.

m
Files - Message
Working_file memo notes File Edit View Insert Format Tools Actions Help

Reply Reply to All Forward

From: dave@testpro.com Date: 26 March 2020 Time: 14:22


To: cheryl@testpro.com
photos template3 Subject: Files
Artwork - Notepad
File Edit Format View Help

Miscellaneous

Project1

........................................................................................................................................... [1]

© UCLES 2020 06_0417_13_2020_1.13


3

(b) Write down two advantages of using this type of interface.

1.........................................................................................................................................

...........................................................................................................................................

2.........................................................................................................................................

...........................................................................................................................................

[2]

3 A computer system is connected to a LAN and a WAN.

(a) Explain what a LAN is.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [2]

(b) Explain what a WAN is.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [2]

© UCLES 2020 06_0417_13_2020_1.13 [Turn over


4

4 Mason is the head of a year group at a school. Every term he needs to send to parents a report on
their child’s progress. This will include a written report and the percentage attendance over the
term.

Each term he loads the comments from his tutors into the word processing software. He then adds
the attendance data from the database. The report is then printed and sent to parents.

He has decided that in future he will use mail merge to print the reports.

(a) Give four advantages of using mail merge instead of typing the reports.

1.........................................................................................................................................

...........................................................................................................................................

2.........................................................................................................................................

...........................................................................................................................................

3.........................................................................................................................................

...........................................................................................................................................

4.........................................................................................................................................

...........................................................................................................................................

[4]

(b) As it is entered, the data on the database is checked using validation routines. The percentage
attendance field uses a range check.

Describe, using the percentage attendance field, the steps that need to be taken to create this
validation routine.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [4]

© UCLES 2020 06_0417_13_2020_1.13


5

(c) Before the database can be implemented the validation routines need to be tested.

Describe, using the percentage attendance field, how the validation routine will be tested by
Mason.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [4]

5 The use of laptop computers and tablet computers by people on the move is becoming very popular.

Describe four advantages of using a tablet computer rather than a laptop computer.

1 ................................................................................................................................................

..................................................................................................................................................

2 ................................................................................................................................................

..................................................................................................................................................

3 ................................................................................................................................................

..................................................................................................................................................

4 ................................................................................................................................................

..................................................................................................................................................

[4]

© UCLES 2020 06_0417_13_2020_1.13 [Turn over


6

6 The secretary of the Tawara Rowing Club is organising a presentation evening for its members. A
systems analyst is creating a database for the club to store the details of the members. She is also
creating a spreadsheet to show who is attending the presentation evening.

The systems analyst has set up the following fields for the database.

Membership Year
Name_of_person Date_of_birth Contact_email Contact_phone_no Gender
_type _joined

Nor Kwa 2/4/2005 Social n.kwa@rockict.com 03 2453 5673 2018 F

Adam Mazian 23/5/2003 Social AdamM@abc.co.my 082 25 4689 2016 M

Ahmed Othman 12/03/2006 Junior AOthman@cie.org 01223 432678 2018 M

Zara Png 1/12/1997 Senior Zara@cbc.cn 123 3267 9999 2010 F

(a) For the following fields write down the most appropriate data type. Each data type must be
different. For any numeric field, specify the type of number.

Gender...............................................................................................................................

Membership_type..............................................................................................................

Year_joined........................................................................................................................

[3]

© UCLES 2020 06_0417_13_2020_1.13


7

(b) Design an online data entry form which could be used to enter the details of one member,
using all the fields shown in the table.

In your design include appropriate spacing for each field and navigational aids. Do not include
data in the form.

[8]

© UCLES 2020 06_0417_13_2020_1.13 [Turn over


8

(c) A spreadsheet has been created to show which members are attending the presentation
evening and who has paid.

Part of the spreadsheet is shown.

A B C D E F G H I J K

1 Tawara Rowing Club

Family Full Type of Number Total


2 Name Attending Paid Cost $
name name member attending owed

3 Nor Kwa Nor Kwa Social Y 2 50 Y Junior 10

Ahmed
4 Ahmed Othman Junior Y 3 30 Y Senior 20
Othman

5 Zara Png Zara Png Senior Y 1 20 N Social 25

Adam
6 Adam Mazian Social N 0 0 N
Mazian

Write down three of the formatting features that have been used in the part of the spreadsheet
shown.

1.........................................................................................................................................

...........................................................................................................................................

2.........................................................................................................................................

...........................................................................................................................................

3.........................................................................................................................................

...........................................................................................................................................

[3]

© UCLES 2020 06_0417_13_2020_1.13


9

(d) A formula has been created and placed in cell G3. The formula is:

IF(E3=''Y'',VLOOKUP(D3,J$3:K$5,2)*F3,0)

Explain what the formula does.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [6]

(e) The secretary needs to identify different types of members in the club.

Describe the steps he would take to sort the data by type of member so that Junior members
are at the top of the list.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [3]

© UCLES 2020 06_0417_13_2020_1.13 [Turn over


10

7 A train company is improving security on its journeys. They are planning to introduce a facial
recognition system for passengers using their trains.

(a) Discuss the advantages and disadvantages of using facial recognition systems rather than
manually checking tickets.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [6]

© UCLES 2020 06_0417_13_2020_1.13


11

(b) Facial recognition is an example of biometrics. Direct data entry devices can be in three forms.
One is biometrics. The second is contactless where the item being read does not touch the
reader. The third is physical where the item being read does touch the reader.

Tick (✓) whether the following are the most appropriate examples of biometrics or contactless
or physical direct data entry.

biometrics contactless physical


(✓) (✓) (✓)

RFID

Magnetic stripe

Retina scan

Voice recognition

[4]

8 One implication of using a computer system is that people can break the law by hacking into other
computer systems. Cultural, Ethical and Moral implications can also be issues.

Tick (✓) the most appropriate implication for each of the following statements.

Cultural Ethical Moral


(✓) (✓) (✓)

A student has changed the contents of a company website


without permission

Writing computer games that make fun of a country’s


religion

Using pictures in a document without acknowledging


copyright

Passing information to a rival company

[4]

© UCLES 2020 06_0417_13_2020_1.13 [Turn over


12

9 Lanfen has purchased a new computer. The computer has no internal storage. All the data is stored
in the cloud.

Compare and contrast computers that use cloud-based storage and computers that have internal
backing storage.

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

.................................................................................................................................................. [6]

© UCLES 2020 06_0417_13_2020_1.13


13

10 The modern home relies heavily on microprocessor-controlled devices. One of the benefits is that
a worker is able to return home to a warm house having set the heater control to switch on at a
certain time.

(a) Describe four benefits in terms of lifestyle changes that this has produced for the users of
such devices.

1.........................................................................................................................................

...........................................................................................................................................

2.........................................................................................................................................

...........................................................................................................................................

3.........................................................................................................................................

...........................................................................................................................................

4.........................................................................................................................................

...........................................................................................................................................

[4]

© UCLES 2020 06_0417_13_2020_1.13 [Turn over


14

(b) The worker has set the heater control to switch on at 16:00 for two hours.

Explain how the microprocessor can operate the automatic heater to turn on and off at the
correct times.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [6]

© UCLES 2020 06_0417_13_2020_1.13


15

11 Parallel running is a type of implementation.

Name and describe two other methods of implementing a new computer system. For each one
give an advantage and a disadvantage of this method. Your answers must be different in each
case.

Method 1...................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

Advantage 1..............................................................................................................................

..................................................................................................................................................

Disadvantage 1.........................................................................................................................

..................................................................................................................................................

Method 2...................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

Advantage 2..............................................................................................................................

..................................................................................................................................................

Disadvantage 2.........................................................................................................................

..................................................................................................................................................

[8]

© UCLES 2020 06_0417_13_2020_1.13 [Turn over


16

12 A student is undertaking research for his studies. He needs to find up-to-date information and has
decided to look for it using the internet.

Explain how he would check the reliability of this information.

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

.................................................................................................................................................. [6]

© UCLES 2020 06_0417_13_2020_1.13


17

13 A school is planning to set up a student work files area. The school is considering allowing students
to log in to the student work files area either using the school’s intranet or the internet.

Discuss the advantages and disadvantages of using the school’s intranet rather than the internet
to access this student work files area.

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

.................................................................................................................................................. [8]

© UCLES 2020 06_0417_13_2020_1.13


18

BLANK PAGE

© UCLES 2020 06_0417_13_2020_1.13


19

BLANK PAGE

© UCLES 2020 06_0417_13_2020_1.13


20

BLANK PAGE

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable
effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will
be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge Assessment
International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at
www.cambridgeinternational.org after the live examination series.

Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of
Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge.

© UCLES 2020 06_0417_13_2020_1.13


Cambridge IGCSE™

INFORMATION AND COMMUNICATION TECHNOLOGY 0417/13


Paper 1 Written May/June 2020
MARK SCHEME
Maximum Mark: 100

Published

Students did not sit exam papers in the June 2020 series due to the Covid-19 global pandemic.

This mark scheme is published to support teachers and students and should be read together with the
question paper. It shows the requirements of the exam. The answer column of the mark scheme shows the
proposed basis on which Examiners would award marks for this exam. Where appropriate, this column also
provides the most likely acceptable alternative responses expected from students. Examiners usually review
the mark scheme after they have seen student responses and update the mark scheme if appropriate. In the
June series, Examiners were unable to consider the acceptability of alternative responses, as there were no
student responses to consider.

Mark schemes should usually be read together with the Principal Examiner Report for Teachers. However,
because students did not sit exam papers, there is no Principal Examiner Report for Teachers for the June
2020 series.

Cambridge International will not enter into discussions about these mark schemes.

Cambridge International is publishing the mark schemes for the June 2020 series for most Cambridge
IGCSE™ and Cambridge International A & AS Level components, and some Cambridge O Level
components.

This document consists of 10 printed pages.

© UCLES 2020 [Turn over


0417/13 Cambridge IGCSE – Mark Scheme May/June 2020
PUBLISHED

Generic Marking Principles

These general marking principles must be applied by all examiners when marking candidate answers.
They should be applied alongside the specific content of the mark scheme or generic level descriptors
for a question. Each question paper and mark scheme will also comply with these marking principles.

GENERIC MARKING PRINCIPLE 1:

Marks must be awarded in line with:

• the specific content of the mark scheme or the generic level descriptors for the question
• the specific skills defined in the mark scheme or in the generic level descriptors for the question
• the standard of response required by a candidate as exemplified by the standardisation scripts.

GENERIC MARKING PRINCIPLE 2:

Marks awarded are always whole marks (not half marks, or other fractions).

GENERIC MARKING PRINCIPLE 3:

Marks must be awarded positively:

• marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit
is given for valid answers which go beyond the scope of the syllabus and mark scheme,
referring to your Team Leader as appropriate
• marks are awarded when candidates clearly demonstrate what they know and can do
• marks are not deducted for errors
• marks are not deducted for omissions
• answers should only be judged on the quality of spelling, punctuation and grammar when these
features are specifically assessed by the question as indicated by the mark scheme. The
meaning, however, should be unambiguous.

GENERIC MARKING PRINCIPLE 4:

Rules must be applied consistently e.g. in situations where candidates have not followed
instructions or in the application of generic level descriptors.

GENERIC MARKING PRINCIPLE 5:

Marks should be awarded using the full range of marks defined in the mark scheme for the question
(however; the use of the full mark range may be limited according to the quality of the candidate
responses seen).

GENERIC MARKING PRINCIPLE 6:

Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should
not be awarded with grade thresholds or grade descriptors in mind.

© UCLES 2020 Page 2 of 10


0417/13 Cambridge IGCSE – Mark Scheme May/June 2020
PUBLISHED

Question Answer Marks

1 2
Applications System

Device driver 

Linker 

Photo-editing software 

Spreadsheet 

Two marks for four correct ticks


One mark for two or three correct ticks
Zero marks for one correct tick

Question Answer Marks

2(a) Graphical User Interface 1

2(b) Two from: 2


User does not need to learn the commands
User-friendly
Can locate applications more rapidly

Question Answer Marks

3(a) Two from: 2


Local Area Network
A network within a building/site/small geographical area
Network connected by hubs and switches

3(b) Wide Area Network 2


This network spans a large geographical area

Question Answer Marks

4(a) Four from: 4


Fewer errors in the typing the details
Faster process as he will have to check the comments and the data from the
database
Saves time in matching the correct set of comments with the data in the
database
The process is faster than typing out each student’s data
Faster to search for a set of students and mail merge than to locate them
and type in the details
Produces a more professional document
Easier/faster to personalise it

© UCLES 2020 Page 3 of 10


0417/13 Cambridge IGCSE – Mark Scheme May/June 2020
PUBLISHED

Question Answer Marks

4(b) Four from: 4


Click on design view
Select the attendance field
Select the validation rule
Enter/type >=0 and <= 100
Select validation text/error message
Enter appropriate error message/validation text/example i.e. please enter a
value between 0 and 100

4(c) Four from: 4


Click on table and field
Enter normal data and check
Enter abnormal data and check
Enter extreme data and check
If incorrect, make changes to boundaries
If incorrect, make changes to validation text
Save the database

Question Answer Marks

5 Four from: 4
Faster switch on as the operating system does not need to load
Lighter and smaller than a laptop computer therefore more portable
Don’t generate as much heat
Battery life tends to last longer
Smaller footprint
Easier to use the touch screen as the keyboard is not in the way
Less susceptible to viruses
Less parts//no separate peripherals, such as a mouse
Camera is easier to use

Question Answer Marks

6(a) Gender 3
Boolean/text/string/alphanumeric

Membership_type
Text/alphanumeric/string

Year_joined
Numeric/integer/date

Note: each answer must be a different data type.

© UCLES 2020 Page 4 of 10


0417/13 Cambridge IGCSE – Mark Scheme May/June 2020
PUBLISHED

Question Answer Marks

6(b) Two marks for all field names given; one mark for five field names 8

Max six from:


Data fills the screen and it looks like an online form
Use of navigation buttons
Use of drop down lists for Type_of_membership or Year_joined or Gender
Use of text/character boxes
The Name_of_person, Contact_email and Contact_phone_no fields are
larger than the other fields
Use of a calendar for Date_of_birth
Use of submit/help buttons
Appropriate title

6(c) Three from: 3


Bold
Centre/right alignment
Text/word wrap
Merge and centre
Increase/decrease size of columns
Row height increased

6(d) IF(E3=“Y”,VLOOKUP(D3,J$3:K$5,2)*F3,0) 6

Six from:
If the member is attending/if E3 is equal to Y
Then locate the type of member using the value in D3 ...
... in the range J3 to K5
Return the corresponding value from the second column
Multiply the returned value by F3/the number attending
Otherwise display 0 in the cell

6(e) Three from: 3


Highlight A3 to H6/column A to column H/A2 to H6
Click Sort
Deselect/unselect/uncheck top row is headings if A3 to H6
used//select/check top row is heading if A2 to H6 used
Click on sort by Column D//Click on sort by Type of member
Sort A to Z/ascending

© UCLES 2020 Page 5 of 10


0417/13 Cambridge IGCSE – Mark Scheme May/June 2020
PUBLISHED

Question Answer Marks

7(a) Max five from: examples 6

Advantages
Facial recognition is unique therefore the correct person is identified
Tickets can be lost/stolen whereas your face is always with you
The commuter is charged for the ticket therefore more secure
Faster throughput/faster to check the commuters
Fear of detection reduces fraud

Max five from: examples

Disadvantages
Personal liberty infringement as facial data must be stored.
Equipment and setup is more expensive than manual system.
The time taken to set up a store of facial patterns can be more time
consuming
A database is needed as many passengers need to be stored
Passengers will have to have data stored on the system; this could take a
long time to set up
If the face is injured/damaged/covered/beard it could be more difficult to
read the data

A mark can be awarded for a reasoned conclusion

7(b) 4
biometrics contactless physical

RFID 

Magnetic stripe 

Retina scan 

Voice recognition 

One mark per correct row

© UCLES 2020 Page 6 of 10


0417/13 Cambridge IGCSE – Mark Scheme May/June 2020
PUBLISHED

Question Answer Marks

8 4
Cultural Ethical Moral

A student has changed the contents


of a company website without 
permission

Writing computer games that make



fun of a country’s religion

Using pictures in a document without



acknowledging copyright

Passing information to a rival



company

One mark per correct row

Question Answer Marks

9 Similarities 6
They are both used to store data
They are both mass storage
Both can be secured by passwords

Differences
Internal backing storage – physical storage in the computer
Internal backing storage – the user has control of the storage
Cloud – automatic backup takes place
Cloud – only pay for what you use
Internal backing storage – only initial cost is required
Internal backing storage – difficult to expand the storage
Cloud – can be used on different devices
Cloud – needs access to the internet to be used
Cloud – due to duplicate copies more chance of the data being hacked
Cloud – more chance of it being hacked as it is on all the time

Max five marks if only differences have been given in the answer

© UCLES 2020 Page 7 of 10


0417/13 Cambridge IGCSE – Mark Scheme May/June 2020
PUBLISHED

Question Answer Marks

10(a) Four from: 4


People no longer have to do manual tasks therefore more time to do other
things
To go out of the house when food is being cooked/washing is being done
Can control the devices remotely
Greater sense of security with automated burglar alarms
Use of smart fridges can lead to a healthy diet
More time with the family
Can do leisure activities when it is convenient
Can do their shopping convenient to them
Can set timers for washing/cooking

10(b) Six from: 6


Microprocessor constantly checks …
... current time against the start time
If the current time is less than the set time nothing happens
If they are the same the microprocessor sends a signal …
... to the actuator to turn the heater on
The microprocessor calculates the end time by adding 2 hours to the start
time
The microprocessor checks the current time against the end time
When they are equal the microprocessor sends a signal to the actuator to
turn the heater off

© UCLES 2020 Page 8 of 10


0417/13 Cambridge IGCSE – Mark Scheme May/June 2020
PUBLISHED

Question Answer Marks

11 Two matched from: 8

Direct changeover – 1 mark


New system replaces existing system immediately/overnight – 1 mark

Disadvantage:
The old system no longer exists therefore all data could be lost – 1 mark

Advantage:
One from:
The benefits are immediate
Costs are reduced as only one set of staff are needed
Less change of error as the new system will be fully tested

Phased implementation – 1 mark


New system is implemented part by part – 1 mark

Advantage:
If the current part fails then not all the system is lost – 1 mark

Disadvantage:
One from:
More expensive as each part needs to be evaluated before moving on
More time consuming as each part needs to be evaluated before moving on

Pilot running – 1 mark


Whole system is implemented in one branch/one office at a time – 1 mark

Disadvantage:
More time consuming as the changeover is spread out – 1 mark

Advantage:
One from:
If the system crashes/fails then only branch/office is affected
Cheaper as training is carried branch by branch
Less time consuming as training is carried out branch by branch

Question Answer Marks

12 Six from: 6
Check the credentials of the authors of a website
Cross check the data with other websites
Check if the site has excessive advertising
Check If the advertising is related only to its own products
Check the final part of a URL …
... .ac., .gov, .org government/academic sites are usually fairly reliable
Check if site is endorsed by reliable/reputable people/organisations it can be
accepted as being reliable/If it has links to other reliable sites
Check the site for grammatical/spelling mistakes
Compare information from different text books to see if the results are
similar
Check if it has been recommended by teachers

© UCLES 2020 Page 9 of 10


0417/13 Cambridge IGCSE – Mark Scheme May/June 2020
PUBLISHED

Question Answer Marks

13 Max seven from: 8

Advantages
Intranet is policed/controlled by the school
More secure as it needs a password
Intranet private network only contains information that is relevant
Intranet resides behind a firewall therefore data is more secure
Messages can target the correct students
Better bandwidth on the intranet
Access from external people are barred

Max seven from:

Disadvantages
More expensive to set up
More time consuming to set up
More time spent on administration i.e. passwords
May only be viewed within the school
More expensive to maintain
More time consuming to maintain
Will not be able to access school files at home for homework
School would need to provide more computers across the school for
students to use to access via the intranet

One mark can be awarded for a reasoned conclusion

© UCLES 2020 Page 10 of 10


Cambridge IGCSE™
* 4 4 2 5 3 5 1 3 5 9 *

INFORMATION AND COMMUNICATION TECHNOLOGY 0417/11


Paper 1 Theory October/November 2020

2 hours

You must answer on the question paper.

No additional materials are needed.

INSTRUCTIONS
● Answer all questions.
● Use a black or dark blue pen.
● Write your name, centre number and candidate number in the boxes at the top of the page.
● Write your answer to each question in the space provided.
● Do not use an erasable pen or correction fluid.
● Do not write on any bar codes.
● You may use an HB pencil for any diagrams, graphs or rough working.

INFORMATION
● The total mark for this paper is 100.
● The number of marks for each question or part question is shown in brackets [ ].
● No marks will be awarded for using brand names of software packages or hardware.

This document has 16 pages. Blank pages are indicated.

DC (DH/FC) 215559/5
© UCLES 2020 [Turn over
2

1 Complete the question using an appropriate item from the list given.

Blu-ray disc drive DVD RAM drive Hard disk drive Keyboard Laser printer

LCD monitor Magnetic tape drive Mouse Pen drive SSD

(a) Identify two output devices from the list.

1 ................................................................................................................................................

2 ................................................................................................................................................
[2]

(b) Identify two optical storage devices from the list.

1 ................................................................................................................................................

2 ................................................................................................................................................
[2]

2 The Central Processing Unit consists of three components.

Tick (3) whether the following statements refer to the ALU, the Control unit or the Main memory.

Control Main
ALU unit memory
(3) (3) (3)
This is the immediate access storage
This carries out the calculations
This carries out logical decisions
This directs the input and output flow in the CPU
[4]

© UCLES 2020 0417/11/O/N/20


3

3 A variety of network devices can be used to connect computers together.

(a) Complete the following sentences using the most appropriate network device from the list.
Your answers must be different in each case.

an access point a bridge a hub

a modem a network interface card a switch

A device used to connect a Local Area Network (LAN) to another LAN that uses the same

protocol is called ..................................................................................................................... .

A device used to convert a computer’s digital signal to an analogue signal for communication

is called ................................................................................................................................... .

A device that connects a number of other devices and sends data to one specific device only

is ............................................................................................................................................. .

An item of hardware in a computer that allows a device to connect to a network is

................................................................................................................................................. .
[4]

A router is used to connect a LAN to the internet. A message is sent from the router to another
router.

(b) Give the name of the part of the router where the IP addresses are stored.

...................................................................................................................................................

............................................................................................................................................. [1]

(c) Explain how the data from a router is routed.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [5]
© UCLES 2020 0417/11/O/N/20 [Turn over
4

4 The HTML of a web page consists of a head section and a body section.

(a) The head section can contain the link to the stylesheet.

Identify two other items found in the head section of HTML.

1 ................................................................................................................................................

2 ................................................................................................................................................
[2]

(b) Explain the purpose of the body section of HTML.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

(c) A stylesheet can contain styles and classes.

Explain the difference between a style and a class.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

© UCLES 2020 0417/11/O/N/20


5

Question 5 starts on page 6.

© UCLES 2020 0417/11/O/N/20 [Turn over


6

5 The Fish Bowl is a large outdoor music arena. It uses an online booking system.

A customer has entered her data into the booking system using an online data entry form.

Name of show Uni Direction

Date of performance 18th March 2020

Time of performance 7:30 pm

Seat position Stalls Circle Upper Circle

Number of Adults: 2

Number of Children: 0

(a) Evaluate this online data entry form.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [6]

© UCLES 2020 0417/11/O/N/20


7

(b) When a person makes a booking, a ticket will be produced for each person. The ticket will be
sent by email and can then be printed out or used on a smartphone to gain entry to the event.

Design a ticket that includes elements for both visual and electronic checking for the
forthcoming music event.

[6]

6 Data stored in a computer needs to be protected.

(a) Describe what is meant by encryption.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [3]

© UCLES 2020 0417/11/O/N/20 [Turn over


8

Due to an issue with Question 6b, the question has been removed from the question paper.

© UCLES 2020 0417/11/O/N/20


9

7 A new database system has been set up for a bookshop. Part of a record from the database
system is shown. Each field has a validation check which needs to be tested.

(a) For each field identify the most appropriate validation check. Each check must be different.
The validation checks for two fields have already been identified; these types of validation
check must not be used for the other fields.

Field name Data Validation check


ISBN 9781471837951
Name_of_book A View of the Castle Presence check
Purchase_price 16.99 Range check
Year_published 2018
Date_acquired 31/01/2019
[3]

(b) The Purchase_price field uses a range check. The prices of books range from 1 to 100.

Identify three items of test data which could be used with the Purchase_price field, giving
reasons for your choice. The reasons must be different in each case.

Item 1 ........................................................................................................................................

Reason .....................................................................................................................................

...................................................................................................................................................

Item 2 ........................................................................................................................................

Reason .....................................................................................................................................

...................................................................................................................................................

Item 3 ........................................................................................................................................

Reason .....................................................................................................................................

...................................................................................................................................................
[6]

© UCLES 2020 0417/11/O/N/20 [Turn over


10

8 Autonomous vehicles are being tested on some of the world’s roads. These vehicles can travel in
convoys with each vehicle following the one in front with a set distance between them. The whole
operation is computer controlled. If the vehicle in front slows down, then the following vehicle also
slows down to maintain the distance between them.

A proximity sensor is used to detect how close the vehicle is to the vehicle in front.

Describe how the microprocessor would maintain the set distance between the vehicles.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

.................................................................................................................................................... [6]

© UCLES 2020 0417/11/O/N/20


11

9 There have been a number of incidents where laptop computers containing highly sensitive
data have been left on trains. Manufacturers are now developing new ways of protecting laptop
computers and their data.

Discuss the effectiveness of different methods which could be used to protect the data.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

.................................................................................................................................................... [8]

© UCLES 2020 0417/11/O/N/20 [Turn over


12

10 A student is creating a database for her geography project to show all the earthquakes that
occurred in 2019. She has produced part of the database which is shown.

Country Magnitude Depth(km)


Vanuatu 6.9 26
Vanuatu 6.7 24
Indonesia 6.1 29
Vanuatu 6.7 27.6
Nepal 4.1 10.2
Myanmar 6.9 136
Japan 6.2 9
Japan 6 8
Vanuatu 6.4 16
Japan 7 10
Ecuador 7.8 20.6
South Georgia 6.2 14
Ecuador 6.2 14
Ecuador 6 10
Mexico 6 16
Mexico 6 10
Vanuatu 7 24

When she has completed her database, she needs to carry out some searches on the data. To
search for all the earthquakes with a depth of more than 20 km she will need to type the following
search criteria.

Depth(km) >20

(a) Write the search criteria to find all the earthquakes of a magnitude greater than or equal to
6.5, with a depth less than 15 km.

...................................................................................................................................................

............................................................................................................................................. [5]

(b) Give the name of the country that satisfies the search criteria in part (a).

............................................................................................................................................. [1]

© UCLES 2020 0417/11/O/N/20


13

The student has transferred the data into a spreadsheet in order to create a graph.

A B C D E F G

1 World Earthquakes - 2019


2 Country Magnitude Depth(km)
3 Vanuatu 6.9 26 Vanuatu 5
4 Vanuatu 6.7 24 Indonesia 1
5 Indonesia 6.1 29 Nepal 1
6 Vanuatu 6.7 27.6 Myanmar 1
7 Nepal 4.1 10.2 Japan 3
8 Myanmar 6.9 136 Ecuador 3
9 Japan 6.2 9 South Georgia 1
10 Japan 6 8 Mexico 2
11 Vanuatu 6.4 16
12 Japan 7 10
13 Ecuador 7.8 20.6
14 South Georgia 6.2 14
15 Ecuador 6.2 14
16 Ecuador 6 10
17 Mexico 6 16
18 Mexico 6 10
19 Vanuatu 7 24

(c) (i) She has entered a formula in cell G3. The formula is

COUNTIF(A$3:A$19,F3)

Explain in detail what the formula in G3 does. Include in your answer an explanation of
the use of the $ sign.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [4]

© UCLES 2020 0417/11/O/N/20 [Turn over


14

(ii) The student is creating an appropriate chart/graph of the data in cells F3 to G10.

Write down the steps she needs to take to produce a chart/graph of the data on the
same sheet. Your answer must include examples of an appropriate title and labels.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [6]

11 Two types of documentation are written when a new computer system is created. Some items only
appear in the technical documentation and other items only in the user documentation whereas
some items appear in both.

Tick (3) whether the following items only appear in Technical documentation, only appear in
User documentation or appear in Both.

Item Technical User


documentation documentation Both
(3) (3) (3)
Purpose of the system
How to save a file
System flowchart
Software requirements
List of variables
Input format
[6]

© UCLES 2020 0417/11/O/N/20


15

12 A teacher is teaching students about history using a virtual reality (VR) system.

(a) Identify three devices that could be used with a VR system.

1 ................................................................................................................................................

2 ................................................................................................................................................

3 ................................................................................................................................................
[3]

(b) The teacher carefully monitors the students’ use of the VR system. She only allows them 20
minutes on the device before taking a break. This is to ensure that they remain healthy whilst
using it.

Identify three health problems associated with the prolonged use of VR systems.

Problem 1 .................................................................................................................................

...................................................................................................................................................

Problem 2 .................................................................................................................................

...................................................................................................................................................

Problem 3 .................................................................................................................................

...................................................................................................................................................
[3]

© UCLES 2020 0417/11/O/N/20 [Turn over


16

(c) The teacher asks the students to create a presentation for their parents to explain to them
about the history of their town.

Describe the features that the students must include to make the presentation appeal to the
adults.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [4]

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.

Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of
Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge.

© UCLES 2020 0417/11/O/N/20


Cambridge IGCSE™

INFORMATION AND COMMUNICATION TECHNOLOGY 0417/11


Paper 1 Written October/November 2020
MARK SCHEME
Maximum Mark: 100

Published

This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.

Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.

Cambridge International will not enter into discussions about these mark schemes.

Cambridge International is publishing the mark schemes for the October/November 2020 series for most
Cambridge IGCSE™, Cambridge International A and AS Level and Cambridge Pre-U components, and some
Cambridge O Level components.

This document consists of 9 printed pages.

© UCLES 2020 [Turn over


0417/11 Cambridge IGCSE – Mark Scheme October/November
PUBLISHED 2020

Generic Marking Principles

These general marking principles must be applied by all examiners when marking candidate answers.
They should be applied alongside the specific content of the mark scheme or generic level descriptors
for a question. Each question paper and mark scheme will also comply with these marking principles.

GENERIC MARKING PRINCIPLE 1:

Marks must be awarded in line with:

• the specific content of the mark scheme or the generic level descriptors for the question
• the specific skills defined in the mark scheme or in the generic level descriptors for the question
• the standard of response required by a candidate as exemplified by the standardisation scripts.

GENERIC MARKING PRINCIPLE 2:

Marks awarded are always whole marks (not half marks, or other fractions).

GENERIC MARKING PRINCIPLE 3:

Marks must be awarded positively:

• marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit
is given for valid answers which go beyond the scope of the syllabus and mark scheme,
referring to your Team Leader as appropriate
• marks are awarded when candidates clearly demonstrate what they know and can do
• marks are not deducted for errors
• marks are not deducted for omissions
• answers should only be judged on the quality of spelling, punctuation and grammar when these
features are specifically assessed by the question as indicated by the mark scheme. The
meaning, however, should be unambiguous.

GENERIC MARKING PRINCIPLE 4:

Rules must be applied consistently, e.g. in situations where candidates have not followed
instructions or in the application of generic level descriptors.

GENERIC MARKING PRINCIPLE 5:

Marks should be awarded using the full range of marks defined in the mark scheme for the question
(however; the use of the full mark range may be limited according to the quality of the candidate
responses seen).

GENERIC MARKING PRINCIPLE 6:

Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should
not be awarded with grade thresholds or grade descriptors in mind.

© UCLES 2020 Page 2 of 9


0417/11 Cambridge IGCSE – Mark Scheme October/November
PUBLISHED 2020

Question Answer Marks

1(a) LCD monitor 2


Laser printer

1(b) DVD RAM drive 2


Blu-ray disc drive

Question Answer Marks

2 4
Control Main
ALU Unit memory
() () ()

This is the immediate access storage 

This carries out the calculations 

This carries out logical decisions 

This directs the input and output flow in



the CPU

Question Answer Marks

3(a) A bridge 4
A modem
A switch
A network interface card

They are in this order


All answers must be different

3(b) Routing table 1

3(c) Five from: 5


Data is sent in data packets//uses data packets
Each data packet contains an IP address of the next router
The router reads/checks/inspects the IP address
It checks the IP address against its routing table
Data packet is sent to the router with the IP address
The router uses the IP address to work out the best route/destination
computer
The router stores the IP addresses

© UCLES 2020 Page 3 of 9


0417/11 Cambridge IGCSE – Mark Scheme October/November
PUBLISHED 2020

Question Answer Marks

4(a) Two from: 2


Document/page title
Meta data
Character set
Styles
Scripts
Default target window/frame

4(b) Two from: 2


Defines the document’s body
Contains all the elements of an HTML page
Contains the content
Contains style instructions

4(c) Two from: 2


A class definition name starts with a full stop
A class is used for adding or changing a style within CSS
Classes are subtypes within an element
There are a limited number of styles
Styles are pre-defined classes are user-defined
Styles are defined in the head section
Styles are used once but classes are styles saved for future use

Question Answer Marks

5(a) Six from: 6


Positives
The fields are fully visible on the screen
The fields are clearly labelled
Ample/suitable space to enter the data
Screen looks clear to read
Text is clear to read
Suitable space between fields

Negatives
No indication of what to do for the seat position/how to select the correct
option
There is too much space to enter the data
No drop down/combo box lists for number of adults/children
No navigation/submit/help buttons
No radio button for position of seat
No explanation on how to fill in details
The form does not fill the screen
Text is too small

To gain full marks there needs to be at least one positive and at least one
negative

© UCLES 2020 Page 4 of 9


0417/11 Cambridge IGCSE – Mark Scheme October/November
PUBLISHED 2020

Question Answer Marks

5(b) Max four from: 6


Adult or Child shown/type of ticket
Name of the performance
Time of the performance
Date of the performance
Seat position
Title of the venue
Seat number
Ticket number shown
Person’s name

Uses a bar code/QR code/RFID – 1 mark


Looks like a ticket with enough elements – 1 mark

Question Answer Marks

6(a) Three from: 3


This is the scrambling of data
Makes the data not understandable/meaningless
This system uses an encryption key to encrypt the data
This system uses an encryption/decryption key to decrypt the data
Protects sensitive data

6(b) Question Removed 6

Question Answer Marks

7(a) 3
Field name Data Validation check

ISBN 9781471837951 Check digit/length check

Name_of_book A View of the Castle Presence check

Purchase_price $16.99 Range check

Year_published 2018 Type check/length check

Date_acquired 31/01/2019 Format/picture check

© UCLES 2020 Page 5 of 9


0417/11 Cambridge IGCSE – Mark Scheme October/November
PUBLISHED 2020

Question Answer Marks

7(b) Matched pairs: 6

Any number in the range 1–100


This is normal data and should work//data that is within the acceptable range

Any number outside the range or a word/character/symbol


This would check the range check boundaries/trap incorrect data
types/abnormal data//data that is outside the acceptable range

1
This would check the lower boundary of the range check/extreme data//on the
edge of acceptable range

100
This would check the upper boundary of the range check/extreme data//on
the edge of acceptable range

Question Answer Marks

8 Six from: 6
Microprocessor reads the data
The data from the proximity sensor is compared to the pre-set value
The pre-set value is set to show the minimum distance from the vehicle in
front
If the values are the same nothing happens
If the values are different …
… the microprocessor sends a signal …
… to the actuator
Actuator speeds up the vehicle/slows down the vehicle/applies the brakes
The process is continuous

© UCLES 2020 Page 6 of 9


0417/11 Cambridge IGCSE – Mark Scheme October/November
PUBLISHED 2020

Question Answer Marks

9 Eight from at least two methods: 8


Portable devices and cloud
Storing the data on a portable hard/SSD/Pen drive/cloud means that the
device is with you at all times and not with the laptop computer
No data is stored on the laptop computer if a portable SSD/HDD/pen
drive/cloud is used so if the laptop computer is stolen nothing is lost
If the pendrive is lost then all your data is lost
The access to the cloud can be password protected
If the laptop gets stolen the data will be safe on the cloud

Passwords and encryption


The data on the computer can be encrypted to increase security
Data can use strong passwords making it more secure
Passwords to the data can be forgotten and lost especially if the laptop
password needs to be remembered
Security methods prevent users who do not know password from gaining
access
Passwords could be difficult to remember which could lock the device

Physical security
Use of a dongle to log onto the laptop ensures that only the person with the
device gains access
Devices like pendrives/dongles tend to be small and can easily be lost/stolen
If the dongle is stolen/lost then access to the laptop is difficult
Security software may malfunction rendering the laptop impossible to access

Biometrics
Biometrics can be used to access the laptop/data this means that the user
needs to be present
Difficult to fake/replicate biometrics
Biometric data cannot be reset once compromised
Biometrics are unique therefore it is an added security method

Question Answer Marks

10(a) Magnitude>=6.5 AND Depth(km)<15 5

Magnitude – 1 mark
>=6.5 – 1 mark
AND – 1 mark
Depth(km) – 1 mark
<15 – 1 mark

10(b) Japan 1

© UCLES 2020 Page 7 of 9


0417/11 Cambridge IGCSE – Mark Scheme October/November
PUBLISHED 2020

Question Answer Marks

10(c)(i) COUNTIF(A$3:A$19,F3) 4

Three from:
The formula counts the number of times
Vanuatu/contents/value of F3
Appears in the country list/A3 to A19

The $ allows the range to remain static if replicated/search in the same range
if replicated – 1 mark

10(c)(ii) Max four from: 6


Highlight F3 to G10
Click Insert Chart
Click Bar chart//column graph
Select layout/type of bar chart
Add title to the chart
Add axes
Add a legend
Save the chart

Three from, for example:


Title – Earthquakes in 2019
X/horizontal axis label – Countries
Y axis label/vertical – Number of earthquakes

Question Answer Marks

11 6
Item Technical User
documentation documentation Both
() () ()

Purpose of the system 

How to save a file 

System flowchart 

Software requirements 

List of variables 

Input format 

© UCLES 2020 Page 8 of 9


0417/11 Cambridge IGCSE – Mark Scheme October/November
PUBLISHED 2020

Question Answer Marks

12(a) Three from: 3


Controller wand/joystick/control buttons/microphone
Tracking/force balls//trackpads//trackers
Treadmill/motion platforms
Pressure mats
Data gloves/bodysuits
Head mounted display/head mounted device/projector
Headset/head mounted device/ear mounted device
Goggles/VR eyeglasses
Steering/gaming wheels/consoles
Pedals/Paddles
Cameras
Motion sensors

12(b) Three from: 3


Eye problems/strain
Neck pain/back pain
Headaches
Balance problems/motion sickness
Tiredness
Injuries caused by being too involved in the VR system

12(c) Four from: 4


A small font size
A formal font type
Formal content
Pastel shade colours to make it easier to read
Use of both upper and lower case characters to make it easier to read
Use of technical/appropriate language
Fewer images and more text
Don’t use too much colour
Use suitable/appropriate images
Use plain and simple backgrounds

© UCLES 2020 Page 9 of 9


Cambridge IGCSE™
* 4 7 1 5 4 6 9 3 7 1 *

INFORMATION AND COMMUNICATION TECHNOLOGY 0417/12


Paper 1 Theory October/November 2020

2 hours

You must answer on the question paper.

No additional materials are needed.

INSTRUCTIONS
● Answer all questions.
● Use a black or dark blue pen.
● Write your name, centre number and candidate number in the boxes at the top of the page.
● Write your answer to each question in the space provided.
● Do not use an erasable pen or correction fluid.
● Do not write on any bar codes.
● You may use an HB pencil for any diagrams, graphs or rough working.

INFORMATION
● The total mark for this paper is 100.
● The number of marks for each question or part question is shown in brackets [ ].
● No marks will be awarded for using brand names of software packages or hardware.

This document has 16 pages. Blank pages are indicated.

DC (DH/SG) 189826/3
© UCLES 2020 [Turn over
2

1 Complete the question using an appropriate item from the list given.

Bar code reader Blu-ray drive DVD drive Hard Disk Drive Keyboard

Memory stick Mouse Optical Character Reader SSD TFT monitor

(a) Identify two solid state storage devices from the list.

1 ................................................................................................................................................

2 ................................................................................................................................................
[2]

(b) Identify two direct data entry devices from the list.

1 ................................................................................................................................................

2 ................................................................................................................................................
[2]

2 A website can have three web development layers.

Tick (3) whether the following statements refer to the behaviour layer, content layer or
presentation layer.

behaviour content presentation


(3) (3) (3)
This layer is used to display and format
elements within the web page
This layer includes the hyperlinks to navigate
around the website
This layer is used to enter scripting language
to elements within a web page
This layer is used to create the structure of
a web page
[4]

© UCLES 2020 0417/12/O/N/20


3

3 A computer system consists of a number of different items of hardware.

Write down the most appropriate item of hardware that fits the following descriptions.

(a) A non-volatile device that stores the start-up commands.

............................................................................................................................................. [1]

(b) A printer that produces physical objects.

............................................................................................................................................. [1]

(c) A hardware device that reads analogue data from the environment.

............................................................................................................................................. [1]

4 The temperature in a glasshouse is controlled by a computer. A program is being designed to


open and close the glasshouse windows. If the temperature is too hot, then the windows will open;
otherwise the windows will close.

The systems analyst has produced a number of different instructions to show how the system
works. Part of the instructions are shown.

(a) Complete the instructions by writing the most appropriate technical terms to explain how the
windows are operated.

• Data is read by the sensor.

• ......................................................................................... data is output from the sensor.

• Data from the sensor is sent to the microprocessor via the ..............................................

...........................................................................................................................................

• If the temperature is greater than the ................................................................................

• The microprocessor sends a signal to the ........................................................................


[4]

(b) Circle the two most appropriate input devices associated with the computerised glasshouse.

Chip and PIN reader Hard Disk Drive Laser printer

LED monitor Moisture sensor Numeric keypad


[2]

© UCLES 2020 0417/12/O/N/20 [Turn over


4

(c) Another use of computer control is in the manufacture of cars.

Discuss the benefits and drawbacks of using computer-controlled systems rather than
humans to build a car.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [6]

© UCLES 2020 0417/12/O/N/20


5

5 (a) Compare and contrast an intranet with the internet.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [8]

(b) Protocols are associated with the internet and an intranet.

Identify three protocols and for each one, identify a use.

Protocol 1 .................................................................................................................................

Use ...........................................................................................................................................

...................................................................................................................................................

Protocol 2 .................................................................................................................................

Use ...........................................................................................................................................

...................................................................................................................................................

Protocol 3 .................................................................................................................................

Use ...........................................................................................................................................

...................................................................................................................................................
[6]
© UCLES 2020 0417/12/O/N/20 [Turn over
6

6 Khalid keeps a spreadsheet to record his expenses and to plan for future spending. This
spreadsheet is split into two separate sheets, which he has named Plan and Model.

Plan contains details of his future spending.


Model contains a model of his income and expenses.

Plan
A B C D
% of % of
1 Income Statement spending income
2 Income 63,784
3
4 Expenditure items
5 Taxes 12,757 22.22% 20%
6 Housing 19,135 33.33% 30%
7 Food 6,378 11.11% 10%
8 Transportation 9,568 16.67% 15%
9 Entertainment / Other 6,378 11.11% 10%
10 Healthcare 3,189 5.56% 5%
11
12 Investment return 4%
13 Income Growth 2.5%
14 Expense Ratio % 90%
15

Model
A B C D E F G
1 Model
2 2020 2021 2022 2023 2024 2025
3
4 Income 63,784 65,379 67,013 68,688 70,406 72,166
5 Investment Income 255 527 816 1,123 1,450
6 Total Income 63,784 65,634 67,540 69,504 71,529 73,616
7
8 Taxes 12,757 13,076 13,403 13,738 14,081 14,433
9 Housing 19,135 19,614 20,104 20,607 21,122 21,650
10 Food 6,378 6,538 6,701 6,869 7,041 7,217
11 Transportation 9,568 9,807 10,052 10,303 10,561 10,825
12 Entertainment / Other 6,378 6,538 6,701 6,869 7,041 7,217
13 Healthcare 3,189 3,269 3,351 3,434 3,520 3,608
14 Total Expenses 57,405 58,842 60,312 61,820 63,366 64,950
15
16 Net Income (Savings) 6,379 6,792 7,228 7,684 8,163 8,666
17
18
19 Balance Sheet
20 Savings 6,379 13,171 20,399 28,083 36,246 44,912
21 Can I afford a car? N N N N Y Y
22

© UCLES 2020 0417/12/O/N/20


7

(a) Khalid has entered a formula in cell C4 of the Model sheet. The formula is B4+(B4*Plan!$B13)

Explain, in detail, what the formula does. Include in your answer an explanation of why the $
and the ! are used in the formula.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [5]

(b) He is saving up to buy a new car; this will cost at least $35,000.

Khalid has entered a formula in cell B21 of the Model sheet. The formula is
IF(B20>35000,"Y","N")

Explain, in detail, what the formula does.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [3]

© UCLES 2020 0417/12/O/N/20 [Turn over


8

Plan
A B C D
% of % of
1 Income Statement spending income
2 Income 63,784
3
4 Expenditure items
5 Taxes 12,757 22.22% 20%
6 Housing 19,135 33.33% 30%
7 Food 6,378 11.11% 10%
8 Transportation 9,568 16.67% 15%
9 Entertainment / Other 6,378 11.11% 10%
10 Healthcare 3,189 5.56% 5%
11
12 Investment return 4%
13 Income Growth 2.5%
14 Expense Ratio % 90%
15

(c) Khalid is planning to create an appropriate graph/chart to be placed in a new sheet. The
graph/chart will display the % of income and the names of the expenditure items from the
Plan sheet.

Identify the most appropriate graph/chart he could use and describe the steps he needs to
take to produce this graph/chart in a new sheet.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [7]

© UCLES 2020 0417/12/O/N/20


9

Question 7 starts on page 10.

© UCLES 2020 0417/12/O/N/20 [Turn over


10

7 The owner of a soccer club has employed a systems analyst to create a new computerised system
to store details of club members.

The systems analyst starts by researching the existing system. One way he could do this is to
interview members of the soccer club.

(a) Discuss the benefits and drawbacks of individually interviewing the members.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [6]

(b) When the systems analyst created the new system, he had to choose data types for each
field.

Write down the most appropriate data type for each field. The answers in the table must be
different in each case. The data type for one field has already been identified; this data type
must not be used for the other fields.

For any numeric field specify the type of number.

Field name Data type Example data

Year_joined 2019

Gender F

Date_of_birth 04/11/2000

Membership_number Text 01254

Cost_of_membership $10.50

[4]

© UCLES 2020 0417/12/O/N/20


11

(c) The systems analyst has set the data type for the Membership_number field as text.

Explain why this field has been set for a text data type rather than a numeric data type.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

(d) The owner of the soccer club is planning to create membership cards for all its members
using mail merge. The membership card will include personal data from the new system.

Describe the steps required to perform the mail merge.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [6]

© UCLES 2020 0417/12/O/N/20 [Turn over


12

8 Many supermarkets now use the internet and allow customers to buy their products online.

(a) Explain, in detail, the effects that online shopping has had on supermarkets.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [4]

(b) When customers shop online, they can pay using a debit card.

Describe measures that customers could use to reduce fraud when using a debit card online.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [5]

© UCLES 2020 0417/12/O/N/20


13

(c) Smishing, pharming and phishing are three security threats that can occur when using the
internet for shopping.

Tick (3) whether the following statements refer to pharming, phishing or smishing.

pharming phishing smishing


(3) (3) (3)
Fake emails are sent to target users
When the user types in a URL they are directed to
a fake website
Malicious code is installed on the user’s computer
Fake text messages are sent to the user’s phone
[4]

9 When software is bought, the purchaser is subject to copyright legislation.

Give four actions that would breach copyright legislation.

1 .......................................................................................................................................................

..........................................................................................................................................................

2 .......................................................................................................................................................

..........................................................................................................................................................

3 .......................................................................................................................................................

..........................................................................................................................................................

4 .......................................................................................................................................................

..........................................................................................................................................................
[4]

10 Define the following internet terms.

(a) Hyperlink ...................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

(b) ISP ............................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]
© UCLES 2020 0417/12/O/N/20 [Turn over
14

11 For each of the following pieces of hardware, explain the strategies you would use to help minimise
health problems.

(a) Monitor ......................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [3]

(b) Keyboard ..................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

12 Describe the differences between using a Graphical User Interface (GUI) and a Command Line
Interface (CLI).

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

.................................................................................................................................................... [4]

© UCLES 2020 0417/12/O/N/20


15

BLANK PAGE

© UCLES 2020 0417/12/O/N/20


16

BLANK PAGE

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.

Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of
Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge.

© UCLES 2020 0417/12/O/N/20


Cambridge IGCSE™

INFORMATION AND COMMUNICATION TECHNOLOGY 0417/12


Paper 1 Written October/November 2020
MARK SCHEME
Maximum Mark: 100

Published

This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.

Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.

Cambridge International will not enter into discussions about these mark schemes.

Cambridge International is publishing the mark schemes for the October/November 2020 series for most
Cambridge IGCSE™, Cambridge International A and AS Level and Cambridge Pre-U components, and some
Cambridge O Level components.

This document consists of 9 printed pages.

© UCLES 2020 [Turn over


0417/12 Cambridge IGCSE – Mark Scheme October/November
PUBLISHED 2020

Generic Marking Principles

These general marking principles must be applied by all examiners when marking candidate answers.
They should be applied alongside the specific content of the mark scheme or generic level descriptors
for a question. Each question paper and mark scheme will also comply with these marking principles.

GENERIC MARKING PRINCIPLE 1:

Marks must be awarded in line with:

• the specific content of the mark scheme or the generic level descriptors for the question
• the specific skills defined in the mark scheme or in the generic level descriptors for the question
• the standard of response required by a candidate as exemplified by the standardisation scripts.

GENERIC MARKING PRINCIPLE 2:

Marks awarded are always whole marks (not half marks, or other fractions).

GENERIC MARKING PRINCIPLE 3:

Marks must be awarded positively:

• marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit
is given for valid answers which go beyond the scope of the syllabus and mark scheme,
referring to your Team Leader as appropriate
• marks are awarded when candidates clearly demonstrate what they know and can do
• marks are not deducted for errors
• marks are not deducted for omissions
• answers should only be judged on the quality of spelling, punctuation and grammar when these
features are specifically assessed by the question as indicated by the mark scheme. The
meaning, however, should be unambiguous.

GENERIC MARKING PRINCIPLE 4:

Rules must be applied consistently, e.g. in situations where candidates have not followed
instructions or in the application of generic level descriptors.

GENERIC MARKING PRINCIPLE 5:

Marks should be awarded using the full range of marks defined in the mark scheme for the question
(however; the use of the full mark range may be limited according to the quality of the candidate
responses seen).

GENERIC MARKING PRINCIPLE 6:

Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should
not be awarded with grade thresholds or grade descriptors in mind.

© UCLES 2020 Page 2 of 9


0417/12 Cambridge IGCSE – Mark Scheme October/November
PUBLISHED 2020

Question Answer Marks

1(a) SSD 2
Memory stick

1(b) Bar code reader 2


Optical Character Reader

Question Answer Marks

2 4
behaviour content presentation
() () ()

This is used to display and 


format elements within the
web page

This layer includes the 


hyperlinks to navigate
around the website

This layer is used to enter 


scripting language to
elements within a web page

This layer is used to create 


the structure of a web page

Question Answer Marks

3(a) ROM/Read Only Memory 1

3(b) 3D printer 1

3(c) Sensor 1

Question Answer Marks

4(a) One mark per correct answer in correct order: 4


Analogue
Analogue to Digital Convertor
Pre-set value
Motor/Actuator

4(b) Numeric keypad 2


Moisture sensor

© UCLES 2020 Page 3 of 9


0417/12 Cambridge IGCSE – Mark Scheme October/November
PUBLISHED 2020

Question Answer Marks

4(c) Six from: 6

Benefits
Robots can work in sterile/hazardous areas where humans would need
protective clothing
Robots can work 24/7
Cheaper in the long run
More accurate
Cars will be more consistent
Robots do the boring/laborious work
Issues can be found quicker
Higher productivity

Drawbacks
More expensive to buy//more expensive in the short term
Maintenance is more expensive as maintenance staff needed
Requires backup systems, which are expensive
They replace skilled workers, leading to de-skilling
They need constant observation which increases the cost of maintenance
crews
If something goes wrong, it may be difficult to find the error
Workers need to be re-trained which is expensive

To gain full marks there must be at least one benefit and drawback

Question Answer Marks

5(a) Eight from: 8

Similarities
Both are communication systems
Both use internet technologies
Both use HTML to write the web pages
Both are information systems
Both are networks

Differences
An intranet has private access whereas the internet has public access
An intranet is policed whereas the internet anyone can post material
The data on an intranet is moderate whereas /the internet is not moderated
The data access on an intranet is more secure than the internet
Internet has greater amount of information than intranet
Intranet is within an organisation whereas the internet is world-wide
Data in the intranet is more relevant/reliable than information found on the
internet

To gain full marks there must be at least one from each section

© UCLES 2020 Page 4 of 9


0417/12 Cambridge IGCSE – Mark Scheme October/November
PUBLISHED 2020

Question Answer Marks

5(b) Matched pairs: 6


HTTP/HyperText Transfer Protocol
Transfer data between a webserver and the browser//display/loads
pages//connect to a webpage

HTTPS/ HyperText Transfer Protocol Secure variant


One from:
Transfer data between a webserver and the browser securely//display/loads
secure pages//connect to a secure webpage
Secure variant of HTTP

FTP/File Transfer Protocol


Transfers files between computers/website

VOIP/Voice Over Internet Protocol


Makes phone calls over the internet

SSL/TLS
determines variables of the encryption for both the link and the data being
transmitted

SMTP
Communication protocol for email

SLS
Protocol used on the internet

Question Answer Marks

6(a) B4+(B4*Plan!$B13) 5

Three from:
Calculates the 2021 income in the Model sheet
By increasing the 2020 income by 2.5%
The 2.5% is taken from the Income Growth cell in the Plan sheet

The $ is needed as the column B needs to be retained when the formula is


replicated – 1 mark

The ! is needed to show that the data is being taken from a different
worksheet – 1 mark

6(b) IF(B20>35000,“Y”,“N”) 3

The formula automatically displays a Y/can buy the car


if the Savings cell/B20 is greater than $35 000
otherwise it displays an N/cannot buy the car

© UCLES 2020 Page 5 of 9


0417/12 Cambridge IGCSE – Mark Scheme October/November
PUBLISHED 2020

Question Answer Marks

6(c) Pie chart – 1 mark 7

Five from:
Select Plan sheet
Highlight A5:A10
Press CTRL and highlight D5:D10
Click on insert chart
Select pie chart
Choose style of chart
Add a title
Add data/axes labels
Add legend
Add a name for the new sheet

Right click on the chart and move to a new sheet//copy and paste in the new
sheet – 1 mark

Question Answer Marks

7(a) Six from: 6

Benefits
Gives the opportunity for the member to give more honest answers
The questions can be expanded/modified//added to following previous
questions/answers
Allows more detailed answers to be given rather than questionnaires
Questions can be explained
Can see the body language

Drawbacks
Takes a long time to interview all the members using this method
Both the members and the interviewer have to be free at the same time
This method is expensive as the system’s analysts time is expensive
The member cannot remain anonymous, so they cannot express
themselves properly
The member feels that they give comments that the interviewer wants to
hear

To gain full marks at least one benefit and drawback must be given

7(b) Numeric: Integer 4


Boolean/logical
Date
Numeric: Currency

Must be in this order

7(c) Two from: 2


The field would not be used for calculations
There is a leading zero in the data
Text fields take up less space than numeric fields

© UCLES 2020 Page 6 of 9


0417/12 Cambridge IGCSE – Mark Scheme October/November
PUBLISHED 2020

Question Answer Marks

7(d) Six from: 6


Open/load the word processor
Click on mailings/mail merge
Load/create the membership card template/master document
Tags/field/place holders are placed in the membership card
Select/locate the data/recipient list in the new system//load data source
Link the new system to the membership card template
The membership card is merged with the new system
The data from the fields are imported into the membership card
The data replaces the tags/field/place holders
Preview results
Check spelling/proof read
The membership cards are saved/printed/sent

Question Answer Marks

8(a) Four from: 4


Costs are reduced as less staff have to be employed in the store
Less physical shops are required therefore the costs of running the stores
are reduced
The customer base is increased as the internet is global
There are increased costs due to employing more drivers/staff in the
packing departments
Increased costs in setting up and maintaining the online shopping website
Reduction in customer loyalty as customers tend to shop around
Change in jobs from instore to delivery drivers//increase in delivery
drivers/staff have to be re-trained
Increased costs as employees have to be trained on new technology

8(b) Five from: 5


Use up to date anti-spyware/anti-virus to stop phishing and pharming
attacks
Using websites that encrypt data when sent/green padlock/use HTTPS/SSL
Ensuring that strong passwords are used
Passwords used for the online shopping account should be different to other
passwords you use
Check all transactions carried out with the store/receipts
Type in the web address of the supermarket rather than copy and
paste/click on links from an email
Do not buy from untrusted websites/apps
Ensure that the wireless password to the router is strong
Report any phishing attempts
Disable cookies/delete cookies frequently

© UCLES 2020 Page 7 of 9


0417/12 Cambridge IGCSE – Mark Scheme October/November
PUBLISHED 2020

Question Answer Marks

8(c) 4
pharming phishing smishing
() () ()

Fake emails are sent to target users 

When the user types in a URL they 


are directed to a fake website

Malicious code is installed on the 


user’s computer

Fake text messages are sent to the 


user’s phone

Question Answer Marks

9 Four from: 4
Making a copy and giving it away to a friend or colleague/streaming without
permission
Making a copy and lending it without permission
Making a copy and selling it without permission
Using a single copy with multiple simultaneous use on a network
Using coding from the original copy in your own programs/modifying the
original code
Renting out the original copy without permission

Question Answer Marks

10(a) Two from: 2


Link from an image or word
Link containing a URL//URL code
When clicked on it takes you to a web page or position in a webpage

10(b) Two from: 2


Internet Service Provider
A company that provides users with access to the internet/internet services
Usually broadband

Question Answer Marks

11(a) Three from: 3


Use a flat screen monitor to reduce the eye strain
Use matt finish/anti-glare screens to stop glare
Use screens that can be tilted to reduce neck pain
Use screens that have height adjustment
Turn the monitor 90 degrees to a window to reduce glare
Use LCD monitors to reduce screen flicker
Use screen filters//lower the brightness
Do not sit too close to the screen
Use LED to reduce eye strain

© UCLES 2020 Page 8 of 9


0417/12 Cambridge IGCSE – Mark Scheme October/November
PUBLISHED 2020

Question Answer Marks

11(b) Two from: 2


Use wrist/hand rests to reduce RSI
Use ergonomic keyboards to reduce RSI
Use voice activated software to reduce the use of the keyboard
Ensure correct posture when typing on the keyboard
Take breaks/use stretching exercises

Question Answer Marks

12 Four from: 4
With a CLI Instructions must be typed to get a computer to carry out an
action
The user needs to remember/learn/understand the commands in a CLI
The instructions need to be entered correctly in CLI
With a CLI you have to remember the exact path and name of application
With a CLI it is more important that users understand how a computer works
With a GUI you just click on an icon
In the GUI the instructions are pre-determined
GUI is more user-friendly
GUI uses more processing power
GUI uses more memory

© UCLES 2020 Page 9 of 9


Cambridge IGCSE™
* 7 5 8 8 4 1 9 7 6 2 *

INFORMATION AND COMMUNICATION TECHNOLOGY 0417/13


Paper 1 Theory October/November 2020

2 hours

You must answer on the question paper.

No additional materials are needed.

INSTRUCTIONS
● Answer all questions.
● Use a black or dark blue pen.
● Write your name, centre number and candidate number in the boxes at the top of the page.
● Write your answer to each question in the space provided.
● Do not use an erasable pen or correction fluid.
● Do not write on any bar codes.
● You may use an HB pencil for any diagrams, graphs or rough working.

INFORMATION
● The total mark for this paper is 100.
● The number of marks for each question or part question is shown in brackets [ ].
● No marks will be awarded for using brand names of software packages or hardware.

This document has 16 pages. Blank pages are indicated.

DC (DH/FC) 189827/3
© UCLES 2020 [Turn over
2

1 A desktop computer consists of both hardware and software. The software is either applications
software or system software.

(a) Tick (3) whether the following are examples of applications software or system software.

applications system
(3) (3)
Measurement software
Linker
Database
Utility software
[2]

(b) Identify two internal items of hardware that could be found in a desktop computer.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................
[2]

2 A computer system uses two types of documentation: technical and user. Some items only appear
in the technical documentation and other items only in the user documentation, whereas some
items appear in both.

Tick (3) whether the following items appear only in Technical documentation, only in User
documentation or in Both.

Item Technical User


Both
documentation documentation
(3)
(3) (3)
Algorithms
File structures
Error messages
Limitations of the system
Hardware requirements
Glossary of terms
[6]

© UCLES 2020 0417/13/O/N/20


3

3 A student has produced a document for her biology project. Part of the project is shown. Answer
the questions relating to the document.

Biology Project 16/02/2019 Biology Project 16/02/2019

The Kiwi making it an omnivore.

Apteryx is the
scientific name for
the Kiwi. The Kiwi is
a burrowing bird and
is the oldest of New
Zealand’s birds,
having evolved 70
million years ago from a flightless ancestor
from the great southern continent of
Gondwana. It is related to the Ostrich, Emu
and Rhea as well as the now extinct New
Zealand Moa, all of which are much taller
than the Kiwi. The Kiwi is a very secretive,
nocturnal bird which is seldom seen in the
wild.

There are two species of Kiwis in New


Zealand. Brown Kiwis are found in forested
areas in the North Island, Fiordland, South
Westland and Stewart Island. Spotted Kiwis
are found on offshore islands and forests in
the north of the South Island.

The Kiwi is a tailless and flightless bird. It


feeds on insects, grubs and spiders which it
locates by sniffing among the leaves and
rotting wood on the forest floor using its
external nostrils. It is the only bird to have
external nostrils. The Kiwi also eats berries,

2 3

(a) Give the name of the extra margin between the two pages of the document.

............................................................................................................................................. [1]

(b) Give the name of the space above the document, containing ‘Biology Project’ and the date.

............................................................................................................................................. [1]

(c) Name the term given to the single line of text that has overflowed on to the next page.

............................................................................................................................................. [1]

(d) Name the type of alignment used for the body text.

............................................................................................................................................. [1]

(e) The student has placed an image in the document.

Name the type of formatting used to allow the text to flow around the image.

............................................................................................................................................. [1]

© UCLES 2020 0417/13/O/N/20 [Turn over


4

4 Generic file formats allow data to be opened in any platform.

Identify two generic text formats.

1 .......................................................................................................................................................

2 .......................................................................................................................................................
[2]

5 When a website is created, three web development layers are used: the content layer, the
presentation layer and the behaviour layer.

(a) Describe what is meant by the content layer.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [3]

(b) Describe what is meant by the presentation layer.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [3]

© UCLES 2020 0417/13/O/N/20


5

6 The manager of a company is planning to create a computerised system and has asked a systems
analyst to research the current system. The systems analyst could do this by using a number of
different methods, but has chosen to create and send out a questionnaire to members of the
company.

(a) Discuss the benefits and drawbacks of sending out questionnaires to members of the
company.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [6]

(b) The system has been created. As the data is entered into the system it is verified.

Give two methods of verification.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................
[2]

© UCLES 2020 0417/13/O/N/20 [Turn over


6

(c) Explain why data still needs to be validated even though it has been verified.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [4]

© UCLES 2020 0417/13/O/N/20


7

7 A house contains a microprocessor-controlled central heating system.

(a) Identify two input devices that would be used in this system.

1 ................................................................................................................................................

2 ................................................................................................................................................
[2]

(b) Describe how a microprocessor would use the data from these devices to control the central
heating system.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [6]

© UCLES 2020 0417/13/O/N/20 [Turn over


8

8 A spreadsheet has been produced showing the final places in one of the events in the 2018 Winter
Olympic Games.

A B C D E F G H I J
1
Total
2 Country Name Heat1 Heat2 Heat3 Heat4 Time Min Seconds
3 KOR Yun Sungbin 50.28 50.07 50.18 50.02 200.6 3 20.55 20.6
4 LAT Martins Dukurs 50.85 50.38 50.32 50.76 202.3 3 22.31 22.3
5 GBR Dom Parsons 50.85 51.41 49.33 50.62 202.2 3 22.21 22.2
6 OAR Nikita Tregubov 50.59 50.50 50.50 50.59 202.2 3 22.18 22.2
7 LAT Tomass Dukurs 50.88 50.58 50.65 50.63 202.7 3 22.74 22.7
8 KOR Kim Jisoo 50.80 50.86 50.51 50.81 203.0 3 22.98 23.0
9 GER Axel Jungk 50.77 51.01 50.83 50.99 203.6 3 23.60 23.6
10

The event consists of four heats. The times taken to complete each heat are added together to
give the Total Time, in seconds. This is then displayed as minutes and seconds.

Two formulae form this calculation; they are stored in column H and column J.

The formula in cell H3 is: =INT(G3/60)

(a) Explain what the formula in cell H3 does.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

The formula in cell J3 is: =ROUND(I3,1)

(b) Explain what the formula in cell J3 does.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

© UCLES 2020 0417/13/O/N/20


9

At the end of the competition, the table must be sorted into ascending order of Total Time. The top
athlete would be in the gold medal position, the second in silver medal position and the third in
bronze medal position. The Medal and Rank columns must be added.

This display should look like this:

A B C D E F G H I
1
Total
2 Medal Rank Country Name Heat1 Heat2 Heat3 Heat4 Time
3 Gold 1 KOR Yun Sungbin 50.28 50.07 50.18 50.02 200.55
4 Silver 2 OAR Nikita Tregubov 50.59 50.50 50.50 50.59 202.18
5 Bronze 3 GBR Dom Parsons 50.85 51.41 49.33 50.62 202.21
6 4 LAT Martins Dukurs 50.85 50.38 50.32 50.76 202.31
7 5 LAT Tomass Dukurs 50.88 50.58 50.65 50.63 202.74
8 6 KOR Kim Jisoo 50.80 50.86 50.51 50.81 202.98
9 7 GER Axel Jungk 50.77 51.01 50.83 50.99 203.60
10

(c) Explain the steps that must be taken to amend the spreadsheet and to display the data in this
way.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [6]

© UCLES 2020 0417/13/O/N/20 [Turn over


10

The heat times are measured by a computer system, but could be measured by officials with
stopwatches.

(d) Discuss the advantages and disadvantages of using computers in measurement rather than
humans.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [6]

© UCLES 2020 0417/13/O/N/20


11

9 Legal documents can be sent by email, as a file attachment, or by physical fax.

(a) Describe the advantages of using emails compared with physical faxing.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [5]

A legal document is sent as a file attachment.

(b) Explain the steps that need to be taken to ensure that if a virus is attached to the file, it cannot
infect the computer.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [4]

© UCLES 2020 0417/13/O/N/20 [Turn over


12

A computer virus has been downloaded from an infected file.

(c) Describe three effects this could have on a computer.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................

3 ................................................................................................................................................

...................................................................................................................................................
[3]

10 The use of ICT in organisations has changed the way in which employees work.

(a) Describe, giving an example, what is meant by compressed hours.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [3]

(b) Describe, giving an example, what is meant by flexible working.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [3]

© UCLES 2020 0417/13/O/N/20


13

11 The director of a museum in China is planning an exhibition on ancient civilisations. One of the
exhibits is a full representation of a 10 000-year-old human. The Natural History Museum in
London is planning to send a complete skeleton, but it is too fragile.

(a) Describe how a computer could be used to create a 3D copy of the skeleton which will then
be printed in China.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [5]

(b) Describe four benefits of using 3D printers.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................

3 ................................................................................................................................................

...................................................................................................................................................

4 ................................................................................................................................................

...................................................................................................................................................
[4]

© UCLES 2020 0417/13/O/N/20 [Turn over


14

12 Autonomous vehicles such as taxis are being tested on the world’s roads. This type of taxi is
able to drive between two points without the driver having control of the vehicle. The vehicles use
satellite navigation and wireless technology with sensors to navigate and control the vehicle.

Evaluate the use of these technologies when navigating and controlling vehicles in this way.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

.................................................................................................................................................... [8]

© UCLES 2020 0417/13/O/N/20


15

13 Email is a common way of communicating with other people. Netiquette is associated with
emailing.

A headmistress of a school has asked the network manager to produce a document listing
netiquette rules the staff and students should follow when sending emails from the school.

Describe, giving reasons, three rules that he could produce.

1 .......................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

2 .......................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

3 .......................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................
[6]

© UCLES 2020 0417/13/O/N/20


16

BLANK PAGE

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.

Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of
Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge.

© UCLES 2020 0417/13/O/N/20


Cambridge IGCSE™

INFORMATION AND COMMUNICATION TECHNOLOGY 0417/13


Paper 1 Written October/November 2020
MARK SCHEME
Maximum Mark: 100

Published

This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.

Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.

Cambridge International will not enter into discussions about these mark schemes.

Cambridge International is publishing the mark schemes for the October/November 2020 series for most
Cambridge IGCSE™, Cambridge International A and AS Level and Cambridge Pre-U components, and some
Cambridge O Level components.

This document consists of 9 printed pages.

© UCLES 2020 [Turn over


0417/13 Cambridge IGCSE – Mark Scheme October/November
PUBLISHED 2020

Generic Marking Principles

These general marking principles must be applied by all examiners when marking candidate answers.
They should be applied alongside the specific content of the mark scheme or generic level descriptors
for a question. Each question paper and mark scheme will also comply with these marking principles.

GENERIC MARKING PRINCIPLE 1:

Marks must be awarded in line with:

• the specific content of the mark scheme or the generic level descriptors for the question
• the specific skills defined in the mark scheme or in the generic level descriptors for the question
• the standard of response required by a candidate as exemplified by the standardisation scripts.

GENERIC MARKING PRINCIPLE 2:

Marks awarded are always whole marks (not half marks, or other fractions).

GENERIC MARKING PRINCIPLE 3:

Marks must be awarded positively:

• marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit
is given for valid answers which go beyond the scope of the syllabus and mark scheme,
referring to your Team Leader as appropriate
• marks are awarded when candidates clearly demonstrate what they know and can do
• marks are not deducted for errors
• marks are not deducted for omissions
• answers should only be judged on the quality of spelling, punctuation and grammar when these
features are specifically assessed by the question as indicated by the mark scheme. The
meaning, however, should be unambiguous.

GENERIC MARKING PRINCIPLE 4:

Rules must be applied consistently, e.g. in situations where candidates have not followed
instructions or in the application of generic level descriptors.

GENERIC MARKING PRINCIPLE 5:

Marks should be awarded using the full range of marks defined in the mark scheme for the question
(however; the use of the full mark range may be limited according to the quality of the candidate
responses seen).

GENERIC MARKING PRINCIPLE 6:

Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should
not be awarded with grade thresholds or grade descriptors in mind.

© UCLES 2020 Page 2 of 9


0417/13 Cambridge IGCSE – Mark Scheme October/November
PUBLISHED 2020

Question Answer Mark

1(a) 2
applications system
() ()

Measurement software 

Linker 

Database 

Utility software 

4 correct ticks = 2 marks


2 or 3 correct ticks = 1 mark
1 correct tick = 0 marks

1(b) Two from: 2


Processor
Motherboard
Random access memory (RAM)
Read only memory (ROM)
Video card
Sound card
Graphics card

Question Answer Marks

2 6
Item Technical User Both
documentation documentation ()
() ()

Algorithms 

File structures 

Error messages 

Limitations of the system 

Hardware requirements 

Glossary of terms 

© UCLES 2020 Page 3 of 9


0417/13 Cambridge IGCSE – Mark Scheme October/November
PUBLISHED 2020

Question Answer Mark

3(a) Gutter margin 1

3(b) Header 1

3(c) Widow 1

3(d) Fully justified 1

3(e) Text/word wrap 1

Question Answer Marks

4 Two from: 2
csv – comma-separated values
txt – text
rtf – rich text format

Question Answer Marks

5(a) Three from: 3


Created using HTML
Every aspect of the site’s content/information/data should be represented in
this layer
Can consist of text/images/hyperlinks/multimedia
Layer used to create the structure of the web page

5(b) Three from: 3


Usually includes media queries
Media queries changes the site’s display based on screen size and device
This is used to display and format elements within the web page/format of
the web page/customise
This layer is defined by CSS (Cascading Style Sheets)
Contain styles that indicate how the document should be displayed in a web
browser

© UCLES 2020 Page 4 of 9


0417/13 Cambridge IGCSE – Mark Scheme October/November
PUBLISHED 2020

Question Answer Mark

6(a) Six from: 6


Benefits
Faster to complete all questionnaires than using interviews
Cheaper to produce questionnaires than pay/employ an interviewer
Individuals can remain anonymous therefore they are more truthful
More people can answer the questionnaire than can be interviewed
They can fill it in in their own time therefore quicker to complete overall

Drawbacks
Tend not to be popular with users
Too inflexible cannot ask follow up questions
Users tend to exaggerate their responses as they are anonymous
As it’s anonymous people may not take it seriously
Cannot expand on their answers/limited in their responses

To gain full marks at least one benefit/drawback must be given

6(b) Visual verification 2


Double data entry

6(c) Four from: 4


Data may be out of range but verification does not pick it up
Data may be in the wrong format but verification does not pick it up
Data may be missing from a field but verification does not pick it up
Data may be of the wrong length but verification does not pick it up
Validation checks that the data is sensible which verification does not
Verification only checks that the data has been transferred correctly
Verification only checks that the data matches the original source document
Together they reduce the number of errors in the data

Question Answer Marks

7(a) Two from: 2


Keypad
Temperature sensor
Override switch for timing
Touch screen
Remote control//smartphone//tablet

7(b) Six from: 6


Microprocessor reads/receives the data
The required temperature/preset value is keyed in using the devices
The microprocessor compares the data with the preset value
If the temperature is greater than or equal to the preset value then …
… a signal is sent to the actuator …
… actuator turns off the heaters
If the temperature is lower than the preset value …
… then a signal is sent to the actuator to turn on the heaters
Process is continuous

© UCLES 2020 Page 5 of 9


0417/13 Cambridge IGCSE – Mark Scheme October/November
PUBLISHED 2020

Question Answer Mark

8(a) =INT(G3/60) 2
Two from:
Gives the integer part of the calculation
Works out the minutes
The calculation is G3 divided by 60//Total time divided by 60

8(b) =ROUND(I3,1) 2
Two from:
Rounds the value of I3//total time to 1 decimal place
If the 2nd decimal place figure is 5 or more it rounds up
If the 2nd decimal place figure is below 5 it rounds down//stays the same

8(c) For the sort 6


Max four from:
Highlight A3 to G9
Select Sort
Sort on Column I/Total Time
Smallest to largest//ascending order

For the display


Max four from:
Highlight columns A and B
Click Insert column to the left
Enter the titles
Enter the Rank/Medal data

8(d) Six from: 6


Advantages
More accurate
Less expensive to run
Data is more consistent
More than one variable can be measured at a time/split times
Results can be produced faster

Disadvantages
More expensive to purchase equipment/software
Maintenance can be more expensive
If the system fails/power outages could cause the computer to lose
data/sensor fails

To gain full marks at least one advantage and disadvantage is needed

© UCLES 2020 Page 6 of 9


0417/13 Cambridge IGCSE – Mark Scheme October/November
PUBLISHED 2020

Question Answer Mark

9(a) Five from: 5


The document/attachment loads directly into the computer’s memory
therefore better security
The computer need not be switched on
The computer receives a soft copy
The fax does one thing at once therefore could be engaged
The document in an email is in digital format
Easier to send to multiple recipients
People are more likely to have email rather than fax
Print quality is better with email
More accessible as it is can be sent/received by many devices
The process of faxing is slower as the document needs to be scanned
before sending
With fax the paper could get damaged during scanning/printing
Videos and audio can be sent by email

9(b) Four from: 4


The system must have installed anti-virus software
The anti-virus software must be up to date/updated regularly//download anti-
virus
The email/attachment is scanned by the anti-virus software
The email is not opened/attachment downloaded until any virus is removed
by the anti-virus software

9(c) Three from: 3


Hard disk could be filled up
The computer is performing routine tasks a lot more slowly
Pop-ups keep appearing on the screen at random.
Random reboots
Software errors/software/computer doesn’t work properly
Recycle bin/files not working
Computer hanging
Anti-virus stops working
System lock-up
Files are being deleted

Question Answer Marks

10(a) The worker completes the normal working hours per week 3
But works fewer days

For example: a 40 hour week compressed into 4 days not 5

10(b) Workers complete the same amount of hours over a working week 3
Workers can choose when to start and end in agreement with the manager

For example: Workers start at 9:30 rather than 9am to miss school run/miss
rush hour
Explanation of flexible schedule

© UCLES 2020 Page 7 of 9


0417/13 Cambridge IGCSE – Mark Scheme October/November
PUBLISHED 2020

Question Answer Mark

11(a) Two from: 5


The skeleton is scanned
A digital copy is made of the skeleton
Copy is saved
The data is sent via the internet to China

Three from:
Data is loaded into the software to prepare it for printing
Software slices the model into hundreds of layers
3D printer creates the model layer by layer
Binds them together

11(b) Four from: 4


Products can be customised easily on request
Speed of producing the product is faster than making it by hand
Cheaper than making it by hand due to labour costs
Parts of equipment that are no longer made can be printed without having to
manufacture them
Many copies of the original can be made
Saves the original from damage in transit
Create a fragile object from more robust materials

Question Answer Marks

12 Eight from: 8
Examples for advantages
The taxi can be controlled safely by the computer
Navigation systems find the quickest/safest route
Data is constantly being updated in the vehicle therefore reacts quicker to
changes
Traffic efficiency improved
Fuel efficiency is improved as the vehicle finds the best way of getting from
A to B
Roads will be safer as the vehicle can react faster to situations
Decreases the amount of accidents on the road

Examples for disadvantages


Security problem of others gaining access to the vehicle …
… and can control its operation example: slam on the brakes
More expensive to set up wireless technology than manual systems
If the wireless technology malfunctions the taxi will not be able to drive
The driver must remain alert in case of problems
Problem of disconnection stopping the vehicle …
… if the wireless signal stops then the vehicle will not operate
Requires a large number of new receiving stations and this is more
expensive
Interference/weather can affect the signal and can stop the vehicle
If the system fails this can cause accidents
Higher cost of maintenance

To gain full marks at least one of each section are required

© UCLES 2020 Page 8 of 9


0417/13 Cambridge IGCSE – Mark Scheme October/November
PUBLISHED 2020

Question Answer Mark

13 Matched pairs 6
Do not be abusive//be polite
Do not threaten people with violence/Do not use abusive words/Do not
cyber bully other students or incite bullying
As this will be upsetting for others

Check spelling and grammar


This sets a good impression

The points made are public


Be careful what is written as comments can be read by other people

Respect people’s privacy


Do not discuss or publish information that might embarrass

Do not use capital letters


As this is conveyed as shouting

Don’t send pornography


As it can be upsetting

Maintain your privacy


Do not send personal details

Check the email address carefully/check the names on the send list
So that emails are not sent to strangers

© UCLES 2020 Page 9 of 9



Cambridge IGCSE

INFORMATION AND COMMUNICATION TECHNOLOGY 0417/12


*5506029078*

Paper 1 Theory February/March 2021


2 hours

You must answer on the question paper.

No additional materials are needed.

INSTRUCTIONS
• Answer all questions.
• Use a black or dark blue pen.
• Write your name, centre number and candidate number in the boxes at the top of the page.
• Write your answer to each question in the space provided.
• Do not use an erasable pen or correction fluid.
• Do not write on any bar codes.
• You may use an HB pencil for any diagrams, graphs or rough working.

INFORMATION
• The total mark for this paper is 100.
• The number of marks for each question or part question is shown in brackets [ ].
• No marks will be awarded for using brand names of software packages or hardware.

This document has 20 pages. Any blank pages are indicated.

03_0417_12_2021_1.10
© UCLES 2021 [Turn over
2

1 Tick (✓) whether the following are examples of internal or external hardware devices.

internal external
(✓) (✓)

Mouse

Video card

Printer

Actuator

[2]

2 Geeta spends a great deal of time at work entering data into her computer.

State three items of hardware that Geeta should be provided with to help avoid RSI when she
enters data into the computer.

1 ................................................................................................................................................

..................................................................................................................................................

2 ................................................................................................................................................

..................................................................................................................................................

3 ................................................................................................................................................

..................................................................................................................................................

[3]

© UCLES 2021 03_0417_12_2021_1.10


3

Question 3 starts on page 4.

© UCLES 2021 03_0417_12_2021_1.10 [Turn over


4

th
3 Falyaz has created a diary using word processing software. The diary entry for 17 May 2020 is
shown.

(a) Write down four formatting features of the word processing software used to make this diary
entry.

Feature 1...........................................................................................................................

...........................................................................................................................................

Feature 2...........................................................................................................................

...........................................................................................................................................

Feature 3...........................................................................................................................

...........................................................................................................................................

Feature 4...........................................................................................................................

...........................................................................................................................................

[4]

© UCLES 2021 03_0417_12_2021_1.10


5

(b) The original diary entry typed into the word processing software did not include an image.

Describe the steps that would be carried out by Falyaz to include in his diary entry an image
taken from his digital camera.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [6]

(c) Name two other sources of digital images apart from using a digital camera.

Source 1............................................................................................................................

...........................................................................................................................................

Source 2............................................................................................................................

...........................................................................................................................................

[2]

© UCLES 2021 03_0417_12_2021_1.10 [Turn over


6

(d) Tick (✓) whether the following statements about generic image files refer to jpg, png or gif
file types.

jpg png gif


(✓) (✓) (✓)

This file type stores still or moving images

This file type uses lossy compression

This file type is used for storing photographs on a digital camera

This file type is limited to 256 colours

[4]

(e) Falyaz wants to add a header in his word processed diary.

Explain what is meant by a header and why it is needed.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [4]

© UCLES 2021 03_0417_12_2021_1.10


7

4 The table shows a comparison of two different types of fitness tracker. A fitness tracker contains
a microprocessor, is worn around the wrist and monitors physical readings of the wearer.

Name of fitness tracker Flexi-byt 6 FitB 4

Battery life in days 20 days 7 days

Method of internet connection Bluetooth WiFi

Water resistant 100 m 10 m

GPS Y N

Cost INR 22 855 INR 10 700

(a) You have been asked to design a poster to show this data for the two fitness trackers.

Describe how you would use six different design features to enhance the data in this poster.
The poster must be suitable for an audience of adult customers.

1.........................................................................................................................................

...........................................................................................................................................

2.........................................................................................................................................

...........................................................................................................................................

3.........................................................................................................................................

...........................................................................................................................................

4.........................................................................................................................................

...........................................................................................................................................

5.........................................................................................................................................

...........................................................................................................................................

6.........................................................................................................................................

...........................................................................................................................................

[6]

© UCLES 2021 03_0417_12_2021_1.10 [Turn over


8

(b) Describe the computer processing involved in the use of a microprocessor-controlled fitness
tracker when displaying and monitoring the blood pressure of the user.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [4]

5 A parent is concerned about his children sending texts. When sending a text, it is important to follow
netiquette.

(a) Explain what is meant by the term netiquette.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [2]

© UCLES 2021 03_0417_12_2021_1.10


9

(b) The parent is planning to produce a number of rules to ensure that his children follow netiquette
when texting other people.

Write down four rules that he could include in his list.

1.........................................................................................................................................

...........................................................................................................................................

2.........................................................................................................................................

...........................................................................................................................................

3.........................................................................................................................................

...........................................................................................................................................

4.........................................................................................................................................

...........................................................................................................................................

[4]

6 Complete the following sentences, using the most appropriate direct data entry device.

a bar code reader a chip reader MICR a magnetic stripe reader


OCR OMR PIN pad RFID reader

(a) The device that reads data from a card in a contactless card system is called

........................................................................................................................................... [1]

(b) The device that reads scanned text and converts it into a readable form is called

........................................................................................................................................... [1]

(c) The device that reads the data made up of black lines and spaces on household goods is
called

........................................................................................................................................... [1]

© UCLES 2021 03_0417_12_2021_1.10 [Turn over


10

7 A school is planning to introduce a contactless card system for pupils to pay for school meals. Each
card contains an amount of money which is topped up by parents. Parents transfer amounts of
money into the school system and pupils place the card close to a reader to upload the money onto
the card.

(a) Discuss the benefits and drawbacks, to the pupils, of using a contactless card system rather
than paying by cash.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [6]

© UCLES 2021 03_0417_12_2021_1.10


11

(b) The terminals in the school use electronic funds transfer at point of sale (EFTPOS).

Describe the computer processing that takes place to pay for a meal at the EFTPOS terminal
using the card.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [6]

© UCLES 2021 03_0417_12_2021_1.10 [Turn over


12

8 A computer system is being created to calculate the scores in a diving competition. Every dive by
an athlete is awarded a score out of 10 by each judge.

The system is being tested using live data. An athlete completes his dive with a difficulty of 3.4 and
achieves the following scores, which are displayed in a spreadsheet.

(a) Before the overall score is calculated the judges’ scores need to be sorted into ascending
order.

Describe the steps that would be carried out to sort the data into ascending order.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [3]

© UCLES 2021 03_0417_12_2021_1.10


13

(b) Cell B12 contains the formula, ROUND((SUM(B5:B9)*D1),1).

Explain what the formula in cell B12 does.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [3]

(c) The judges’ score column will be tested using normal, abnormal and extreme data.

Explain, giving examples of test data which would be used, what is meant by:

Abnormal test data............................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

Extreme test data..............................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

[4]

© UCLES 2021 03_0417_12_2021_1.10 [Turn over


14

9 Tawara school uses an optical mark recognition (OMR) system for its school register. An example
of the register is shown. For each session of the school there are two lozenges to be shaded in.

At the start of the registration period the teacher shades in a lozenge [P] on the register to show
that a pupil is present and shades in a lozenge [A] for each pupil who is absent. If a pupil is late
then the teacher shades in both the [P] and the [A] lozenges. The register sheets are sent to the
school office to be processed and the data from them is stored in the computer’s database.

(a) Describe the inputs and computer processing of the registers when they are sent to the school
office, prior to them being stored on the computer’s database.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [6]

© UCLES 2021 03_0417_12_2021_1.10


15

(b) The headteacher of the school is considering modernising the registration system so that pupils
can register using a facial recognition system.

Discuss the advantages and disadvantages of using a facial recognition registration system
rather than the OMR system they currently use.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [8]

© UCLES 2021 03_0417_12_2021_1.10 [Turn over


16

(c) Biometric data, like facial recognition, is an example of personal data.

Give two other examples of personal data that could be stored on the school registration
database.

1.........................................................................................................................................

...........................................................................................................................................

2.........................................................................................................................................

...........................................................................................................................................

[2]

© UCLES 2021 03_0417_12_2021_1.10


17

10 Computer data can be stored on physical storage devices. Data can also be stored in the ‘cloud’.

(a) Explain what is meant by the cloud, giving two advantages of storing data in the cloud compared
with physical storage devices.

Explanation........................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

Advantage 1......................................................................................................................

...........................................................................................................................................

Advantage 2......................................................................................................................

...........................................................................................................................................

[4]

(b) Tick (✓) whether the following storage devices are examples of optical, magnetic or solid
state storage.
optical magnetic solid state
(✓) (✓) (✓)

Flash drive

Hard disk drive

Blu-ray disc drive

SSD

[4]

© UCLES 2021 03_0417_12_2021_1.10 [Turn over


18

11 The owner of a bookshop has a database of all the books she has in stock. As some of the data
is being entered into the database it is checked using validation checks.

An example of some of the records in the database is shown.

Field name Example data

Name of book Brotherhood of Wisdom

Name of author Colin Turner

ISBN 471837951

Date of purchase 25/02/2021

Number of copies 10

Type of book E

Name of book The Fourth Man

Name of author Aadha Khatri

ISBN 0718121753

Date of purchase 18/03/2019

Number of copies 53

Type of book H

Name of Book Indian Temples

Name of author Vihaan Laghan

ISBN 978147183215

Date of purchase 12/02/2019

Number of copies 30

Type of book H

© UCLES 2021 03_0417_12_2021_1.10


19

Explain, using a field name and examples of the data stored in that field in the database, why
validation checks must be appropriate to the data that is being checked.

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

.................................................................................................................................................. [4]

12 A company has placed a firewall between their Local Area Network (LAN) and their internet
connection. This is used to increase security in their computer systems.

Discuss the effectiveness of using this firewall to increase security.

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

.................................................................................................................................................. [6]

© UCLES 2021 03_0417_12_2021_1.10


20

BLANK PAGE

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable
effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will
be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge Assessment
International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at
www.cambridgeinternational.org after the live examination series.

Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of
Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge.

© UCLES 2021 03_0417_12_2021_1.10


Cambridge IGCSE™

INFORMATION AND COMMUNICATION TECHNOLOGY 0417/12


Paper 1 Written Paper March 2021
MARK SCHEME
Maximum Mark: 100

Published

This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.

Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.

Cambridge International will not enter into discussions about these mark schemes.

Cambridge International is publishing the mark schemes for the March 2021 series for most Cambridge
IGCSE™, Cambridge International A and AS Level components and some Cambridge O Level components.

This document consists of 11 printed pages.

© UCLES 2021 [Turn over


0417/12 Cambridge IGCSE – Mark Scheme March 2021
PUBLISHED

Generic Marking Principles

These general marking principles must be applied by all examiners when marking candidate answers.
They should be applied alongside the specific content of the mark scheme or generic level descriptors
for a question. Each question paper and mark scheme will also comply with these marking principles.

GENERIC MARKING PRINCIPLE 1:

Marks must be awarded in line with:

• the specific content of the mark scheme or the generic level descriptors for the question
• the specific skills defined in the mark scheme or in the generic level descriptors for the question
• the standard of response required by a candidate as exemplified by the standardisation scripts.

GENERIC MARKING PRINCIPLE 2:

Marks awarded are always whole marks (not half marks, or other fractions).

GENERIC MARKING PRINCIPLE 3:

Marks must be awarded positively:

• marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit
is given for valid answers which go beyond the scope of the syllabus and mark scheme,
referring to your Team Leader as appropriate
• marks are awarded when candidates clearly demonstrate what they know and can do
• marks are not deducted for errors
• marks are not deducted for omissions
• answers should only be judged on the quality of spelling, punctuation and grammar when these
features are specifically assessed by the question as indicated by the mark scheme. The
meaning, however, should be unambiguous.

GENERIC MARKING PRINCIPLE 4:

Rules must be applied consistently, e.g. in situations where candidates have not followed
instructions or in the application of generic level descriptors.

GENERIC MARKING PRINCIPLE 5:

Marks should be awarded using the full range of marks defined in the mark scheme for the question
(however; the use of the full mark range may be limited according to the quality of the candidate
responses seen).

GENERIC MARKING PRINCIPLE 6:

Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should
not be awarded with grade thresholds or grade descriptors in mind.

© UCLES 2021 Page 2 of 11


0417/12 Cambridge IGCSE – Mark Scheme March 2021
PUBLISHED

Question Answer Marks

1 2
internal external

Mouse ✓

Video card ✓

Printer ✓

Actuator ✓

2 marks for 4 correct ticks


1 mark for 2 or 3 correct ticks
0 marks for 0 or 1 tick

Question Answer Marks

2 Three from: 3
Ergonomic keyboard
Ergonomic mouse
Microphone
Wrist rest

Question Answer Marks

3(a) Four from: 4


Bold on date
Superscript on the date
Left aligned on date
Fully justified
Text/word wrap
Highlighted text
Italics

© UCLES 2021 Page 3 of 11


0417/12 Cambridge IGCSE – Mark Scheme March 2021
PUBLISHED

Question Answer Marks

3(b) Six from: 6


Plug in/Bluetooth the digital camera to the computer//Plug in the SD
card/memory card
Select the image to be uploaded
Upload the image to the computer
Save the image on the computer

Load/open the word processing software


Load the diary entry file
Place the cursor where you want the image to be
Click insert…image
Choose/find/browse the image from the folder
Insert the image in the text

Reformat/resize/crop the image


Reposition/place the image
Click word wrap/text wrap
Save the document

3(c) Two from: 2


Internet
Scanned images
Images stored on: Smartphone/Mobile phone/PC/Tablet/SD
card/Smartwatch
Clipart libraries
Screenshot

3(d) 4
jpg png gif

This file type stores still or moving images ✓

This file type uses lossy compression ✓

This file type is used for storing photographs



on a digital camera

This file type is limited to 256 colours ✓

3(e) Max two from: 4


It is an area of a document on every page
At the top of a page
The area is between the top of the page and the top of the margin

Max two from:


To show consistency on each page
To ensure that each page has the same data in the header
Saves time for the author typing out the data on each page

© UCLES 2021 Page 4 of 11


0417/12 Cambridge IGCSE – Mark Scheme March 2021
PUBLISHED

Question Answer Marks

4(a) Six from: 6


Different size/style of font for the title/features in the table
Clear font colour for the title/text in the table
Clear fonts for the title/text in the table
Use of bold to highlight keywords
Use of italics to highlight keywords
Poster fills the page
Data is shown in the comparison table/chart
More text than images
Contrasting colours for font and background colour
Use of white space
Use of borders to make the text stand out

4(b) Four from: 4


The data is sent to/read by the microprocessor
The data is stored by the tracker
Convert the raw data into blood pressure data
Compare the data with pre-set values
If out of range send data to an alert system
The data is sent to the screen

Question Answer Marks

5(a) Two from: 2


Internet etiquette
Set of social conventions
They show common courtesy when communicating online

5(b) Four from: 4


Do not use capital letters as it relates to shouting
Do not use abusive/vulgar language/threatening behaviour
Be clear in the text sent
Always check spelling and grammar
Remember that sarcasm does not communicate well
Respect other’s privacy
Respect other people’s views
Do not use too many emoticons
Do not use text language/slang
Do not spam
Do not send inappropriate links

Question Answer Marks

6(a) RFID reader 1

6(b) OCR 1

6(c) a bar code reader 1

© UCLES 2021 Page 5 of 11


0417/12 Cambridge IGCSE – Mark Scheme March 2021
PUBLISHED

Question Answer Marks

7(a) Six from: 6


Benefits
Fast throughput of pupils at the tills
Fast transaction as only the card is presented
If the card is stolen it can be blocked
One card is less bulky than money
Using the card is more secure because the money can only be used in the
canteen

Drawbacks
Tendency to spend more as it is a card
Difficult to keep track of your spending as no physical money
If the card is damaged/lost the pupil cannot buy food/lose all their money
Card needs topping up regularly
Cards will need to be purchased by the pupils and can be expensive
Parents can see what the pupils buy
If there is an issue with the machine not easy to see mistakes
Easier to misplace than cash/coins
Parents can limit how much is spent on food
Pupils can only spend the money in the canteen and on food

To gain full marks there must be at least one benefit and at least one
drawback

7(b) Six from: 6


The cost of the meal is totalled
The reader reads the details from the card
The amount of money on the card is checked
The total is compared to the amount of money on the card
If it is greater the transaction is rejected
If it is less than or equal to then the transaction is accepted
Checked whether card it is correct type/stolen/blocked
The cost is deducted from the amount on the card
The amount/total balance on the card is updated following the transaction
The amount is credited to the school system
The details of the receipt are prepared//The receipt is produced//Rejection
slip is produced//Message is prepared

Question Answer Marks

8(a) One from: 3


Highlight cells A4 to B10
Click anywhere in the range
Highlight A4 to A10 and click expand the selection
Highlight B4 to B10 and click expand the selection

Two from:
Click on the down arrow//Click on Custom Sort
Select column B
Select smallest to largest/A  Z

© UCLES 2021 Page 6 of 11


0417/12 Cambridge IGCSE – Mark Scheme March 2021
PUBLISHED

Question Answer Marks

8(b) Three from: 3


Totals cells B5 to B9
Multiplies by cell D1/difficulty/3.4
Rounds the value to 1 decimal place

8(c) Matched pairs 4


Abnormal – data that is outside the range//Unacceptable data//Data of the
wrong type
Example: greater than 10, negative numbers, letters, symbols

Extreme – data that is on the boundary of acceptability


Example: 10

Question Answer Marks

9(a) Six from: 6


OMR sheets are scanned in using an optical mark reader//Reader reads the
lozenge
Data is sent to the computer
A template of the register is loaded into the computer
A value is assigned to each lozenge
A light passes through the scanner and shows position of each filled in
lozenge//Comparing dark spots with lighter areas//Use X Y coordinates
The position is compared to the template/pre-determined data
If the lozenge shaded is [P] then the pupil is recorded as present
If the lozenge shaded is [A] then the pupil is recorded as absent
If both lozenges [A] and [P] are shaded then the pupil is recorded as late.
If no lozenge on a line is shaded the result is discarded

© UCLES 2021 Page 7 of 11


0417/12 Cambridge IGCSE – Mark Scheme March 2021
PUBLISHED

Question Answer Marks

9(b) Eight from: 8


Advantages
Faces are unique therefore greater security
Data entry is faster as it does not need to be sent to the office for entry
Data entry is more accurate the teacher could enter the wrong data on OMR
sheet
Greater security as the pupil needs to be present to register
More difficult to fake biometrics
OMR data sheets can be forgotten or lost

Disadvantages
Facial injuries/facial hair/glasses/masks can affect the data entry
The cost of setting up a new system is higher as extra hardware and
software needs to be purchased//Setting up the system is more expensive
Time consuming to set up all the pupils
The data will need to be updated regularly due to facial changes as pupils
get older
Higher error rate
System is more complex therefore may cost more to maintain//Maintaining
the system is more expensive
The environment and usage may affect the reader
Biometric systems are not 100% accurate
Less flexibility as the OMR sheets can be used anywhere in the school
Biometric data harder be reset if incorrect/if change needed
Greater invasion of privacy as biometric data has to be stored on the
computer

To gain full marks there must be at least one advantage and one
disadvantage

9(c) Two from: 2


Name
Address
Gender
Date of birth
Personal contact details, such as Email address and phone number
ID card/roll number
Race//Ethnic origin

© UCLES 2021 Page 8 of 11


0417/12 Cambridge IGCSE – Mark Scheme March 2021
PUBLISHED

Question Answer Marks

10(a) Two from: 4


Data is stored on offsite servers
Many servers in many locations
Data is stored on more than one server
Uses data redundancy
Cloud is an online service/data storage

Two from:
The cloud has greater storage capacity than other methods
The data could be sent directly to the cloud from any device
Access the data from any device/anywhere
Easier to add storage capacity
Lower capital outlay
The owner would only pay for the storage they used
Backup up tends to be automatic
Cloud is more robust
Cloud is more secure as it is password protected

10(b) 4
optical magnetic solid state

Flash drive ✓

Hard disk drive ✓

Blu-ray disc drive ✓

SSD ✓

© UCLES 2021 Page 9 of 11


0417/12 Cambridge IGCSE – Mark Scheme March 2021
PUBLISHED

Question Answer Marks

11 Max two examples, for each example: 4


1 mark for a correct field names and data examples
1 mark for the reason

Matched pairs
Type of book
Can use length/lookup check as only one letter is input for example E or H
Cannot use a type check as only one letter used

ISBN
Can use check digit as a way of checking that digits are not transposed
Cannot use a length check as they are different lengths

Date of purchase
Can use a format check as all dates are the same format.

Number of copies
Can use a range/limit check as the lowest number is 1
Can use a type check as only numbers are accepted

Name of book/Name of Book


Cannot use a length check as names can be any length
Cannot use a type check as any character can be used

Name of author
Cannot use a length check as names can be any length

© UCLES 2021 Page 10 of 11


0417/12 Cambridge IGCSE – Mark Scheme March 2021
PUBLISHED

Question Answer Marks

12 Six from: 6
Benefits
Monitors traffic into and out of the network to make sure that all data
passing is safe.
Checks whether the data passing through it meets a given set of rules…
…if they do not then the data is blocked
Can block the unwanted traffic in and out of the network
It can log all incoming and outgoing traffic to check later
Can block certain undesirable websites/IP addresses
Keeps a list of desirable IP addresses/websites
It can block IP addresses to stop hackers

Drawbacks
It cannot stop individuals on internal networks by-passing the firewall
It cannot stop employees hacking the computer from within the system
Users own devices can by-pass the firewall therefore meaning the
computer/network is in danger
It cannot stop hackers only devices that hackers are using

To gain full marks on the question at least one benefit and drawback
are needed

© UCLES 2021 Page 11 of 11



Cambridge IGCSE

INFORMATION AND COMMUNICATION TECHNOLOGY 0417/11


*6228711242*

Paper 1 Theory May/June 2021


2 hours

You must answer on the question paper.

No additional materials are needed.

INSTRUCTIONS
• Answer all questions.
• Use a black or dark blue pen.
• Write your name, centre number and candidate number in the boxes at the top of the page.
• Write your answer to each question in the space provided.
• Do not use an erasable pen or correction fluid.
• Do not write on any bar codes.
• You may use an HB pencil for any diagrams, graphs or rough working.

INFORMATION
• The total mark for this paper is 100.
• The number of marks for each question or part question is shown in brackets [ ].
• No marks will be awarded for using brand names of software packages or hardware.

This document has 16 pages.

06_0417_11_2021_1.8
© UCLES 2021 [Turn over
2

1 Tick (✓) whether the following are examples of personal data.

Yes No
(✓) (✓)

Full name

Capital of England

Gender

Number of flowers in a garden

[2]

2 Circle two input devices that could be used in a smartphone.

HDD magnetic stripe reader microphone mouse

remote control speaker touchpad touch screen

[2]

3 Describe four characteristics of a tablet computer.

1 ................................................................................................................................................

..................................................................................................................................................

2 ................................................................................................................................................

..................................................................................................................................................

3 ................................................................................................................................................

..................................................................................................................................................

4 ................................................................................................................................................

..................................................................................................................................................

[4]

© UCLES 2021 06_0417_11_2021_1.8


3

4 Many banks have reduced the number of staff in their branches and replaced them with automatic
teller machines (ATMs). These ATMs, which can be located within the bank, can be used by
customers to deposit and withdraw money from their bank accounts.

(a) ATMs can be used to deposit cheques.

Describe the computer processing involved in depositing a cheque at an ATM.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [6]

© UCLES 2021 06_0417_11_2021_1.8 [Turn over


4

(b) Customers can visit these banks or use internet banking.

Discuss the advantages and disadvantages to a customer of visiting the bank rather than using
internet banking.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [6]

5 Tawara school has a shop that sells items needed by pupils in school. Part of a spreadsheet with
details of the items is shown.

(a) Write down the number of rows that are shown in the spreadsheet that contain text.

........................................................................................................................................... [1]

(b) Write down the number of columns that are shown in the spreadsheet that contain text.

........................................................................................................................................... [1]

© UCLES 2021 06_0417_11_2021_1.8


5

(c) Tax is paid on certain items sold in the shop. The tax rate that has to be paid is 20% of the
selling price. If tax is to be paid on an item, then ‘Y’ is placed underneath the Tax heading.

The formula in I4 is: IF(F4=''Y'',($I$1*D4*G4),'''')

Explain, in detail, what the formula does.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [5]

(d) Explain the steps that need to be taken to display cell H4 as US dollars.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [2]

© UCLES 2021 06_0417_11_2021_1.8 [Turn over


6

6 You have been asked by the secretary of a soccer club to create a website to publicise its results,
fixtures and other events.

When the website has been created it has to be published on the internet. You plan to upload it
onto the internet using FTP.

(a) Explain what is meant by FTP.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [2]

(b) Explain how to upload and publish the content of a website using FTP.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [4]

© UCLES 2021 06_0417_11_2021_1.8


7

(c) Before the website is published it needs to be tested.

Write down three different features of the web pages that could be tested. For each feature,
describe the method you would use to carry out the test.

Feature 1...........................................................................................................................

Method...............................................................................................................................

...........................................................................................................................................

Feature 2...........................................................................................................................

Method...............................................................................................................................

...........................................................................................................................................

Feature 3...........................................................................................................................

Method...............................................................................................................................

...........................................................................................................................................

[6]

© UCLES 2021 06_0417_11_2021_1.8 [Turn over


8

7 A systems analyst has created a new computer system to keep records in a medical centre. She
has created a relational database to store the medical records of patients.

The database uses primary and foreign keys.

(a) Describe what is meant by a relational database.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [3]

(b) Explain the difference between a primary key and a foreign key.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [4]

© UCLES 2021 06_0417_11_2021_1.8


9

(c) A dentist works at the medical centre. The dentist stores the medical records of his patients.

Describe four other uses of the database software that the dentist can use to help him in his
work.

1.........................................................................................................................................

...........................................................................................................................................

2.........................................................................................................................................

...........................................................................................................................................

3.........................................................................................................................................

...........................................................................................................................................

4.........................................................................................................................................

...........................................................................................................................................

[4]

© UCLES 2021 06_0417_11_2021_1.8 [Turn over


10

(d) The data stored on the computer system needs to be protected from unauthorised access.

Discuss the effectiveness of different methods of increasing security of this data.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [8]

© UCLES 2021 06_0417_11_2021_1.8


11

8 Compare and contrast the features of a switch and a hub.

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

.................................................................................................................................................. [6]

9 A company operates from 08:00 to 19:00, Monday to Friday. Full-time employees work a 40-hour
week, starting at 09:00 and finishing work at 17:00.

For each of the times worked by an employee, write down the most appropriate working pattern.

(a) An employee works from 09:00 to 13:00, Monday to Friday.

........................................................................................................................................... [1]

(b) An employee works from 09:00 to 19:00, Monday to Thursday.

........................................................................................................................................... [1]

(c) The work of two employees combined is a 40-hour week; each work for two full days and a
half day.

........................................................................................................................................... [1]

(d) An employee works a full 8-hour day but has negotiated with his employer to complete this at
some point between 08:00 and 19:00, each day.

........................................................................................................................................... [1]

© UCLES 2021 06_0417_11_2021_1.8 [Turn over


12

10 Tick (✓) the most appropriate method of implementation to match the statements below.

Direct Parallel Pilot


(✓) (✓) (✓)

All of the benefits are immediate.

If the new system fails the whole of the old system is still
operational.

This is the cheapest implementation method.

The system is implemented in one branch of the company.

[4]

11 Data stored on a computer system is at risk of being hacked.

(a) Explain what is meant by the term hacking. Include in your answer two examples of the effects
this can have on the computer system.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [3]

(b) Describe three measures that could be taken to protect the data from being hacked.

1.........................................................................................................................................

...........................................................................................................................................

2.........................................................................................................................................

...........................................................................................................................................

3.........................................................................................................................................

...........................................................................................................................................

[3]

© UCLES 2021 06_0417_11_2021_1.8


13

12 An image has been changed in a number of different ways.

Original image

For each of the following images describe the software editing technique used in order to produce
the edited images shown from the original image.

Edited images

A B C D

A ...............................................................................................................................................

..................................................................................................................................................

B ...............................................................................................................................................

..................................................................................................................................................

C ...............................................................................................................................................

..................................................................................................................................................

D ...............................................................................................................................................

..................................................................................................................................................

[4]

© UCLES 2021 06_0417_11_2021_1.8 [Turn over


14

13 RockIT Airlines representatives use a computer booking system to book flights for customers.

A representative from the airline types in the customer reference number, the number of passengers,
departure time, departure date, departure airport and the destination airport.

A customer is planning to take a flight from London Heathrow Airport. The representative types in
a code LHR for London Heathrow Airport. One of the reasons for using a code for the airport is to
improve data accuracy.

(a) Describe two other advantages of using a code rather than typing out the full name.

1.........................................................................................................................................

...........................................................................................................................................

2.........................................................................................................................................

...........................................................................................................................................

[2]

(b) Describe the importance of data accuracy when making a booking.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [2]

© UCLES 2021 06_0417_11_2021_1.8


15

(c) Describe the processing and outputs involved in making the booking.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [6]

Question 14 starts on page 16.

© UCLES 2021 06_0417_11_2021_1.8 [Turn over


16

14 A road through a village has a speed limit of 45 kilometres per hour. The police are checking and
recording the speed of vehicles passing through the village using measuring hardware and software,
so they can produce a report of their findings.

(a) Explain the difference between measurement and control when using microprocessors.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [2]

(b) Describe the role of the microprocessor in this scenario.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [4]

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable
effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will
be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge Assessment
International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at
www.cambridgeinternational.org after the live examination series.

Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of
Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge.

© UCLES 2021 06_0417_11_2021_1.8


Cambridge IGCSE™

INFORMATION AND COMMUNICATION TECHNOLOGY 0417/11


Paper 1 Written May/June 2021
MARK SCHEME
Maximum Mark: 100

Published

This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.

Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.

Cambridge International will not enter into discussions about these mark schemes.

Cambridge International is publishing the mark schemes for the May/June 2021 series for most Cambridge
IGCSE™, Cambridge International A and AS Level components and some Cambridge O Level components.

This document consists of 9 printed pages.

© UCLES 2021 [Turn over


0417/11 Cambridge IGCSE – Mark Scheme May/June 2021
PUBLISHED

Generic Marking Principles

These general marking principles must be applied by all examiners when marking candidate answers.
They should be applied alongside the specific content of the mark scheme or generic level descriptors
for a question. Each question paper and mark scheme will also comply with these marking principles.

GENERIC MARKING PRINCIPLE 1:

Marks must be awarded in line with:

• the specific content of the mark scheme or the generic level descriptors for the question
• the specific skills defined in the mark scheme or in the generic level descriptors for the question
• the standard of response required by a candidate as exemplified by the standardisation scripts.

GENERIC MARKING PRINCIPLE 2:

Marks awarded are always whole marks (not half marks, or other fractions).

GENERIC MARKING PRINCIPLE 3:

Marks must be awarded positively:

• marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit
is given for valid answers which go beyond the scope of the syllabus and mark scheme,
referring to your Team Leader as appropriate
• marks are awarded when candidates clearly demonstrate what they know and can do
• marks are not deducted for errors
• marks are not deducted for omissions
• answers should only be judged on the quality of spelling, punctuation and grammar when these
features are specifically assessed by the question as indicated by the mark scheme. The
meaning, however, should be unambiguous.

GENERIC MARKING PRINCIPLE 4:

Rules must be applied consistently, e.g. in situations where candidates have not followed
instructions or in the application of generic level descriptors.

GENERIC MARKING PRINCIPLE 5:

Marks should be awarded using the full range of marks defined in the mark scheme for the question
(however; the use of the full mark range may be limited according to the quality of the candidate
responses seen).

GENERIC MARKING PRINCIPLE 6:

Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should
not be awarded with grade thresholds or grade descriptors in mind.

© UCLES 2021 Page 2 of 9


0417/11 Cambridge IGCSE – Mark Scheme May/June 2021
PUBLISHED

Question Answer Marks

1 2
yes no

Full name 

Capital of England 

Gender 

Number of flowers in a garden 

2 marks for 4 correct ticks


1 mark for 2 or 3 correct ticks
0 marks for 0 or 1 tick

Question Answer Marks

2 Microphone 2
Touch screen

Question Answer Marks

3 Four from: 4
Screens tend to be anti-glare
Uses touch screen
Front and back facing cameras are included
Has a built in battery
Lightweight
Uses Bluetooth/WiFi/3G/4G/5G
Uses solid state memory
Uses an onscreen keyboard
Portable
Small footprint

© UCLES 2021 Page 3 of 9


0417/11 Cambridge IGCSE – Mark Scheme May/June 2021
PUBLISHED

Question Answer Marks

4(a) Six from: 6


Customer is asked to enter their debit card in the ATM
Customer’s bank computer is contacted
The card details are searched in the bank database

Card is checked to see if valid/in date/stolen


Customer is asked to enter their PIN
PIN is compared to the PIN stored on the chip

Customer is asked to deposit cheque


The system checks whether the cheque is valid
The cheque is scanned/read by the ATM
Amount is scanned
Bank account is checked for sufficient funds
The image of the scan is saved

The customer is asked to select the account to deposit money


Money is deducted from the bank of the cheque
Money is added to the account of the payee

A receipt is sent to the printer at the ATM

4(b) Six from: 6


Advantages
Retention of banks therefore all customers could use them
Easier for customers to speak to a member of the banking staff
Customers do not have to purchase expensive computer equipment
Safer than carrying out transactions over the internet
Can withdraw cash
Do not need the internet

Disadvantages
Have to pay to travel to the bank to use the service
Customers could waste time standing in queues/travelling to the bank
More difficult for people who have a condition which affects their mobility
Smaller customer base as it is local
Potential for physical robberies
Cannot keep track of the accounts as easily
Not 24/7

To gain full marks there needs to be advantages and disadvantages

Question Answer Marks

5(a) 6 rows 1

5(b) 8 columns 1

© UCLES 2021 Page 4 of 9


0417/11 Cambridge IGCSE – Mark Scheme May/June 2021
PUBLISHED

Question Answer Marks

5(c) Five from: 5


If Tax is payable then//If F4 is equal to "Y" then
If true the tax is paid
Multiply the rate of tax/I1 …
… by the selling price/D4
… by the amount sold/G4
If Tax is not payable//If F4 <>"Y"//Else//Otherwise …
… then display a blank
… the tax is not paid

5(d) Two from: 2


Highlight/select cell H4
Select format cells
Select currency/accounting
Select dollar/USD icon

Question Answer Marks

6(a) Two from: 2


File transfer protocol
Network protocol
Used for transferring files from one computer to another

6(b) Four from: 4


Download the FTP client program
Connect to the FTP server ...
... using the FTP client program
Login to the server ...
... using FTP username and password
Locate the files on your computer
Click upload button on FTP client program
Upload the files to the folder/web hosting space

6(c) Matched pairs – 1 mark for the feature and 1 mark for the method 6

Hyperlinks
Click each hyperlink to see that it takes the user to the correct web page/part
of the web page/website

Form buttons/icons
Click to see that they carry out the correct task

Text
Use spellchecker/grammar checker/proofread text to check it makes sense

Images
Check the images are not pixelated/correct size/correct image

Videos
Check the videos run correctly/correct video

Sound
Check the sound file runs correctly/correct sound file linked

© UCLES 2021 Page 5 of 9


0417/11 Cambridge IGCSE – Mark Scheme May/June 2021
PUBLISHED

Question Answer Marks

7(a) Three from: 3


Contains more than one table
Tables are linked
It uses relationships
Removes redundancy of data
Saves storage space

7(b) Four from: 4


Primary key holds unique data
Primary key identifies the record
Primary key can be automatically indexed
Each table has one primary key whereas a table can contain a number of
foreign keys
Foreign key is used to link with the primary key of another table

7(c) Four from: 4


Searches/queries can be used to search details of patients
Reports can be created about treatment carried out
Formulas can be created to calculate the cost of treatment
Charts can be created showing missed appointments by patients
Images are stored of the x-rays to identify the patient/determine treatment
Mail merge appointments that have been missed

Any other appropriate use plus explanation

7(d) Eight from: 8

Factors increasing effectiveness


Strong passwords are difficult to crack
Biometric passwords are harder to crack
Regularly changing passwords increases security
Use of two-factor authentication
Using different passwords for parts of the computer system makes it more
difficult to gain access to the full system
Firewall required to stop attacks from computers
Firewall stops fraudulent sites attacking the computer
Anti-spyware stops passwords being seen when typed in

Factors reducing effectiveness


Too complex a password can be easily forgotten
Passworded files may not be backed up
Using a number of different passwords can become cumbersome
Regularly changing passwords means that passwords may be forgotten
May be difficult to choose unique password if it is changed every few weeks
Passwords may become more easy to guess if regularly changed
Hackers can breach most passwords
The firewall can affect the operation of the computer and stop some uploads
The firewall may need to be shut down at times to upload files therefore
making computer unsafe
Some legitimate software can be blocked by the firewall

To gain full marks both sides of the discussion are needed

© UCLES 2021 Page 6 of 9


0417/11 Cambridge IGCSE – Mark Scheme May/June 2021
PUBLISHED

Question Answer Marks

8 Six from: 6
Comparison
Both are network devices
Both are hardware devices
Both have computers and devices connected to them
Both send data to devices//Both are communication devices

Contrast
In a hub data packets/data are broadcast to every device connected to it
A hub is less secure than a switch in distributing data
Switch checks the data packet
Switch sends to an appropriate device

To gain full marks both contrast and comparison is needed

Question Answer Marks

9(a) Part time 1

9(b) Compressed hours 1

9(c) Job sharing 1

9(d) Flexible hours 1

Question Answer Marks

10 4
Direct Parallel Pilot

All of the benefits are immediate. 

If the new system fails the whole of the 


old system is still operational.

This is the cheapest implementation 


method.

The system is implemented in one 


branch of the company.

© UCLES 2021 Page 7 of 9


0417/11 Cambridge IGCSE – Mark Scheme May/June 2021
PUBLISHED

Question Answer Marks

11(a) Gaining unauthorised access to a computer system – 1 mark 3

Two from:
Examples
Can lead to the identity theft of data
Can lead to the misuse of/access to personal data
Data can be deleted
Data can be changed
Data can be corrupted
Place malicious files/software

11(b) Three from: 3


Use of firewalls to block unauthorised computer systems
Use of passwords
Use of intrusion detection software/anti-spyware
Use two-factor authentication
Switch off WiFi/computer when not in use

Question Answer Marks

12 A - Resize the image maintaining aspect ratio 4


B - Rotate the image 90 degrees anti clockwise/counter clockwise//270
degrees clockwise
C - Reflect the image in the Y axis
D - Brightness adjusted

Question Answer Marks

13(a) Two from: 2


Uses up less memory in the computer
Quicker to enter the data
Quicker to search for data

13(b) Two from: 2


If the data is typed in incorrectly then the booking may be rejected
If an incorrect airport code is used they may fly to the wrong airport//May miss
the flight
If the customer reference number is typed in incorrectly then the booking may
be assigned to the wrong person
If the number of passengers is incorrectly entered then number of seats will
be wrong/overbooked
So that the wrong booking is not made

© UCLES 2021 Page 8 of 9


0417/11 Cambridge IGCSE – Mark Scheme May/June 2021
PUBLISHED

Question Answer Marks

13(c) Six from: 6


Display flights available
Booking database is searched for the customer reference number
Matching record is retrieved
Details of the customer are displayed on the screen
Booking database is searched for matching departure airport
Booking database is searched for matching destination airport
If flight correct, date/time found
Search if seats/tickets/flight available
If unavailable error message output
Outputs the price
If seats available, flags seat as booked
If not booked then flag removed
Reduces number of seats/tickets available by number booked
E-ticket/ticket details are output
E-ticket/ticket details sent to customer
Receipt is printed//Verification email sent

Question Answer Marks

14(a) Measurement is the monitoring/recording of physical variables without the 2


microprocessor taking action

Control is when the microprocessor takes action depending on sensor


readings

14(b) Four from: 4


Microprocessor reads the data
Data/Speed limit is stored in the computer
Divides the distance travelled by time taken between the readings
The speed of the vehicle is then compared to the speed limit of the road
The speed is recorded
It sends the data for later processing
Graphs are automatically produced of the number of cars speeding

© UCLES 2021 Page 9 of 9



Cambridge IGCSE

INFORMATION AND COMMUNICATION TECHNOLOGY 0417/12


*7108723569*

Paper 1 Theory May/June 2021


2 hours

You must answer on the question paper.

No additional materials are needed.

INSTRUCTIONS
• Answer all questions.
• Use a black or dark blue pen.
• Write your name, centre number and candidate number in the boxes at the top of the page.
• Write your answer to each question in the space provided.
• Do not use an erasable pen or correction fluid.
• Do not write on any bar codes.
• You may use an HB pencil for any diagrams, graphs or rough working.

INFORMATION
• The total mark for this paper is 100.
• The number of marks for each question or part question is shown in brackets [ ].
• No marks will be awarded for using brand names of software packages or hardware.

This document has 16 pages. Any blank pages are indicated.

06_0417_12_2021_1.2
© UCLES 2021 [Turn over
2

1 Tick (✓) whether the following are examples of control, measurement or modelling applications.

control measurement modelling


(✓) (✓) (✓)

Personal finance

Weather forecasting

Burglar alarms

Weather stations

[4]

2 (a) Circle two items that could be used to output data directly from a smartphone.

Blu-ray disc microphone mouse screen


SD card sensor speaker webcam

[2]

(b) One of the uses of a smartphone is the sending and receiving of emails.

Describe four other uses of a smartphone.

1.........................................................................................................................................

...........................................................................................................................................

2.........................................................................................................................................

...........................................................................................................................................

3.........................................................................................................................................

...........................................................................................................................................

4.........................................................................................................................................

...........................................................................................................................................

[4]

© UCLES 2021 06_0417_12_2021_1.2


3

3 Tick (✓) the most appropriate storage medium that should be used in each scenario.

Magnetic tape RAM ROM


Scenario
(✓) (✓) (✓)

To store the current instructions in use by a


computer

To back up data from a school network server

To store data temporarily

To store the start-up instructions of a


computer

[4]

4 Complete the sentences below using the most appropriate word from the list.

cookies hacking pharming phishing


smishing spam spyware virus

(a) The act of gaining unauthorised access to a computer system is called

........................................................................................................................................... [1]

(b) The software that gathers data by monitoring key presses on a user’s keyboard is called

........................................................................................................................................... [1]

(c) A fake text message, that could contain a link, sent to a mobile phone is called

........................................................................................................................................... [1]

© UCLES 2021 06_0417_12_2021_1.2 [Turn over


4

5 Petr has set up a database for a science project on planets in the solar system. Part of the database
is shown.

ID Name_of_planet Number_of_moons Orbital_period Rings Gravity Type_of_planet First_observed

4 Mars 2 1.88 N 0.38 Regular 1610

5 Ceres 0 4.61 N 0.27 Dwarf 1801

7 Saturn 62 29 Y 1.16 Gas Giant 1610

9 Neptune 14 165 Y 1.21 Gas Giant 1846

10 Pluto 5 248 N 0.62 Dwarf 1930

11 Haumea 1 309 N 0.401 Dwarf 2004

(a) When Petr was designing his database, he had to set the data types for each field.
Complete the design table below by filling in the data types for each named field. Use the most
appropriate data type. Each data type must be different. For any numeric field, specify the type
of number.

Field name Data type

Number_of_moons

Orbital_period

Rings

Name_of_planet

[4]

© UCLES 2021 06_0417_12_2021_1.2


5

(b) Operators such as AND, OR, NOT, LIKE, >, >=, <, <=, =, <> can be used to search Petr’s
planet database. The search criteria for all the gas giant planets with more than 20 moons
would look like this:

Type_of_planet = ''Gas Giant'' AND Number_of_moons > 20

Write down the search criteria that will produce a list of planets that are not gas giants but
have at least one moon and were first observed after 1800.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [7]

(c) Write down the names of the planets that are not gas giants but have at least one moon and
were first observed after 1800.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [2]

(d) Petr has copied the data from the Orbital_period field into a spreadsheet. The data for the
orbital period for Mars, 1.88, is stored in cell A2. In cell B2 he has entered a function of:

ROUND(A2,0)

Explain in detail the function used in cell B2.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [2]

© UCLES 2021 06_0417_12_2021_1.2 [Turn over


6

6 Humans can send unmanned aircraft into storms to collect wind speeds and temperature data. The
unmanned aircraft have sensors attached to them which send the data back to computers at the
weather station. The computers analyse the data.

Previously the aircraft was manned and all the data was collected and flown back to the weather
station.

Discuss the advantages and disadvantages of using the unmanned aircraft rather than using the
manned aircraft.

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

.................................................................................................................................................. [8]

© UCLES 2021 06_0417_12_2021_1.2


7

7 The owner of Tawara Hotels is planning a new computerised booking system. There are ten Tawara
Hotels throughout the world. The current booking system allows people to book rooms in any of
the Tawara Hotels. He has employed a systems analyst to research the current system and then
install the new system.

(a) When analysing the current booking system, the systems analyst must identify the user
requirements.

Explain why it is important for the systems analyst to do this.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [3]

(b) Tick (✓) the relevant stage of the systems life cycle for each of the following activities.

Development
Activity Analysis and testing Evaluation
(✓) (✓) (✓)

Identifying the problems with the current


system

Comparing the solution with the original


task requirements

Create the file structure

Identify limitations to the new system and


improvements to be made

[4]

© UCLES 2021 06_0417_12_2021_1.2 [Turn over


8

(c) Before the new booking system is installed, the systems analyst has to decide on a method
of implementation. One method of implementation is pilot running.

Name two other methods of implementation and describe two benefits of each.

Name.................................................................................................................................

Benefit 1............................................................................................................................

...........................................................................................................................................

Benefit 2............................................................................................................................

...........................................................................................................................................

Name.................................................................................................................................

Benefit 1............................................................................................................................

...........................................................................................................................................

Benefit 2............................................................................................................................

...........................................................................................................................................

[6]

© UCLES 2021 06_0417_12_2021_1.2


9

8 Students often use IT equipment; therefore it is important to have a good physical safety strategy.

Evaluate your own use of IT equipment, in terms of physical safety, and describe the strategies
you will need to minimise the potential physical safety risks.

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

.................................................................................................................................................. [6]

9 (a) Describe two uses of a company intranet.

1.........................................................................................................................................

...........................................................................................................................................

2.........................................................................................................................................

...........................................................................................................................................

[2]

© UCLES 2021 06_0417_12_2021_1.2 [Turn over


10

(b) Social networking is used to communicate with friends; this is one use of the internet.

Describe four other uses of the internet.

1.........................................................................................................................................

...........................................................................................................................................

2.........................................................................................................................................

...........................................................................................................................................

3.........................................................................................................................................

...........................................................................................................................................

4.........................................................................................................................................

...........................................................................................................................................

[4]

© UCLES 2021 06_0417_12_2021_1.2


11

(c) A major part of the everyday use of the internet is social networking. Currently some social
networks are not policed. The owners of a website have full discretion on what material is
removed and what is allowed to be kept.

Discuss the benefits and drawbacks of policing social networking sites.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [8]

© UCLES 2021 06_0417_12_2021_1.2 [Turn over


12

10 Describe the advantages, to both the company and employees, of changing work patterns due to
the introduction of computers.

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

.................................................................................................................................................. [6]

11 When an email is sent, it could have a digital certificate attached.

Explain why a digital certificate is required. Include in your answer items that could be found in a
digital certificate.

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

.................................................................................................................................................. [5]

© UCLES 2021 06_0417_12_2021_1.2


13

12 A search engine can be used to find information on the internet.

(a) Describe the disadvantages of using a search engine to find information rather than typing in
a web address.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [4]

(b) A student is writing a project on rare animals. He uses a search engine to find information
about the animals from the internet. He is concerned about the reliability of some of the
information he has found.

Explain how he would evaluate the reliability of this information.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [6]

© UCLES 2021 06_0417_12_2021_1.2 [Turn over


14

The student plans to create a table, using word processing software, to display the information he
has found out about the animal.

The completed table will look like this:

Name of animal Tiger quoll

Scientific name Dasyurus maculatus

Pouched No

Habitat Australia

Conservation status Threatened

(c) Explain how the student can create a table to enter this data.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [2]

(d) The student has saved a picture from the internet of a tiger quoll.

Explain how he could create a new row above the Pouched row and place the picture into the
right-hand cell of this new row.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [4]

© UCLES 2021 06_0417_12_2021_1.2


15

BLANK PAGE

© UCLES 2021 06_0417_12_2021_1.2


16

BLANK PAGE

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable
effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will
be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge Assessment
International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at
www.cambridgeinternational.org after the live examination series.

Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of
Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge.

© UCLES 2021 06_0417_12_2021_1.2


Cambridge IGCSE™

INFORMATION AND COMMUNICATION TECHNOLOGY 0417/12


Paper 1 Written May/June 2021
MARK SCHEME
Maximum Mark: 100

Published

This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.

Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.

Cambridge International will not enter into discussions about these mark schemes.

Cambridge International is publishing the mark schemes for the May/June 2021 series for most Cambridge
IGCSE™, Cambridge International A and AS Level components and some Cambridge O Level components.

This document consists of 10 printed pages.

© UCLES 2021 [Turn over


0417/12 Cambridge IGCSE – Mark Scheme May/June 2021
PUBLISHED

Generic Marking Principles

These general marking principles must be applied by all examiners when marking candidate answers.
They should be applied alongside the specific content of the mark scheme or generic level descriptors
for a question. Each question paper and mark scheme will also comply with these marking principles.

GENERIC MARKING PRINCIPLE 1:

Marks must be awarded in line with:

• the specific content of the mark scheme or the generic level descriptors for the question
• the specific skills defined in the mark scheme or in the generic level descriptors for the question
• the standard of response required by a candidate as exemplified by the standardisation scripts.

GENERIC MARKING PRINCIPLE 2:

Marks awarded are always whole marks (not half marks, or other fractions).

GENERIC MARKING PRINCIPLE 3:

Marks must be awarded positively:

• marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit
is given for valid answers which go beyond the scope of the syllabus and mark scheme,
referring to your Team Leader as appropriate
• marks are awarded when candidates clearly demonstrate what they know and can do
• marks are not deducted for errors
• marks are not deducted for omissions
• answers should only be judged on the quality of spelling, punctuation and grammar when these
features are specifically assessed by the question as indicated by the mark scheme. The
meaning, however, should be unambiguous.

GENERIC MARKING PRINCIPLE 4:

Rules must be applied consistently, e.g. in situations where candidates have not followed
instructions or in the application of generic level descriptors.

GENERIC MARKING PRINCIPLE 5:

Marks should be awarded using the full range of marks defined in the mark scheme for the question
(however; the use of the full mark range may be limited according to the quality of the candidate
responses seen).

GENERIC MARKING PRINCIPLE 6:

Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should
not be awarded with grade thresholds or grade descriptors in mind.

© UCLES 2021 Page 2 of 10


0417/12 Cambridge IGCSE – Mark Scheme May/June 2021
PUBLISHED

Question Answer Marks

1 4
control measurement modelling

Personal

finance

Weather

forecasting

Burglar alarms 

Weather

stations

Question Answer Marks

2(a) Speaker 2
Screen

2(b) Four from, for example: 4


Order goods from the internet
Use it to surf/search the internet
GPS
Telephone/internet banking
Make/receive phone calls
Instant message
Streaming of music
Streaming videos
Text messaging
Taking photos

Question Answer Marks

3 4
Scenario Magnetic RAM ROM
tape

To store the current instructions in



use by a computer

To back up data from a school



network server

To store data temporarily 

To store the start-up instructions of



a computer

© UCLES 2021 Page 3 of 10


0417/12 Cambridge IGCSE – Mark Scheme May/June 2021
PUBLISHED

Question Answer Marks

4(a) Hacking 1

4(b) Spyware 1

4(c) Smishing 1

Question Answer Marks

5(a) 4
Field name Data type

Number_of_moons Numeric: Integer

Orbital_period Numeric: Decimal

Rings Boolean

Name_of_planet Text

5(b) Type_of_planet<>"Gas Giant" AND Number_of_moons >=1 AND 7


First_observed >1800

Only two ANDs correctly placed – 1 mark

Type_of_planet – 1 mark
<> "Gas Giant" – 1 mark

Number_of _moons – 1 mark


>=1 – 1 mark

First_observed – 1 mark
>1800 – 1 mark

5(c) Pluto 2
Haumea

5(d) It would take the value of A2 – 1 mark 2


Changes the value into an integer/zero decimal places – 1 mark

© UCLES 2021 Page 4 of 10


0417/12 Cambridge IGCSE – Mark Scheme May/June 2021
PUBLISHED

Question Answer Marks

6 Eight from: 8
Advantages
Less expensive to fly the aircraft into the storm
Less risk to life as there is no flight crew
It can be flown closer to the storm
Time taken to receive the data is shorter as don’t have to land the aircraft
before sending data
Results are processed immediately
On board computers can analyse the data continuously
Readings can be taken more frequently

Disadvantages
The sensors could malfunction and there is no way of repairing them easily
You can lose the signal due to the electrical charges in the storm
Less responsive
Slower to react
May go out of range

To gain full marks there needs to be advantages and disadvantages

Question Answer Marks

7(a) Three from: 3


The systems analyst is creating a system that is just for the client
Important to meet the needs of the user; so it is customised
Reduces the costs if the new system matches the existing hardware and
software
More efficient system is produced that does what the users require

7(b) 4
Activity Analysis Development Evaluation
and testing

Identifying the problems



with the current system

Comparing the solution


with the original task 
requirements

Create the file structure 

Identify limitations to the


new system and

improvements to be
made

© UCLES 2021 Page 5 of 10


0417/12 Cambridge IGCSE – Mark Scheme May/June 2021
PUBLISHED

Question Answer Marks

7(c) Direct changeover – 1 mark 6


Two from:
Benefits are immediate
Costs less as fewer staff are needed
Costs less as only one system is required
Less likelihood of malfunction as system is fully tested

Parallel running – 1 mark


Two from:
If new system fails, old system can be used as a back up
Possible to gradually train staff

Phased changeover – 1 mark


Two from:
If the new system fails, only one part is affected
Easier to ensure that part of the system is fully operational before moving
onto the next part
Possible to train staff in one part of the system, therefore less costly than
parallel
Possible to gradually train staff

© UCLES 2021 Page 6 of 10


0417/12 Cambridge IGCSE – Mark Scheme May/June 2021
PUBLISHED

Question Answer Marks

8 Matched pairs from, for example: 6

I always check whether wires are damaged/lose when I plug in my computer


equipment
...This will reduce electrocution

I always check whether sockets are safe/not broken when I plug in


equipment...
...This will reduce electrocution

I only plug in one plug per socket


...This reduces the chance of fire

I make sure all wires are fastened to the wall/placed under carpets/in
ducts//Use wireless...
...This reduces tripping hazards

Check and install circuit breakers...


...This reduces electrocution/fire hazard

Make sure no drinks or food is brought near to computers...


...This reduces electrocution

I make sure computer vents are not covered...


...This reduces the chances of fire

I make sure all IT equipment is safely in the middle of desks//I make sure
strong tables are used to store IT equipment/I don’t store IT equipment on
high shelves...
...To stop them falling on me and causing an injury

Question Answer Marks

9(a) Two from: 2


Send/receiving emails
Send/receive attachments/files
Internal file transfer within the company
Allows the creation of extranets
Surf internal information/webpages
Sharing/use of applications/resources

9(b) Four from, with descriptions: 4


Email
Use of the web
Newsgroups
Online chat
Streaming
Internet telephone
Online conferencing
Gaming
File transfer

© UCLES 2021 Page 7 of 10


0417/12 Cambridge IGCSE – Mark Scheme May/June 2021
PUBLISHED

Question Answer Marks

9(c) Benefits 8
Max four:
Can reduce cyber bullying/hate speech/sexual harassment
Can reduce social media from being used for illegal activities
Can reduce the ability to incite violence/trolling
Could prevent people from being subjected to inappropriate messages
Can reduce illegal/inappropriate images

Drawbacks
Freedom of speech is reduced
Would be very difficult to police as there is a massive amount of information
Different rules in different countries and social media crosses borders
Very costly to create an effective deterrent
Could force individuals to use other un-policed methods of communication
Who decides what is acceptable and what is not acceptable
Privacy issues as people checking could read messages
Difficult to police as users can be anonymous

To gain full marks there needs to be benefits and drawbacks

Question Answer Marks

10 Six from: 6
Advantages to employees
Staff are more flexible when they work so they can carry out other activities
Staff are more contented as they can work hours which suit their home life
They can start later/earlier so they avoid rush hour in the morning, so they do
not arrive stressed
They can start earlier/work later to avoid rush hour in evening so cuts travel
time
Compressed hours can lead to longer holidays/weekends therefore staff
more refreshed
Part time working allows people with other commitments to work
Job sharing allows a piece of work to be completed using the skills set of
more than one worker therefore cutting stress
Working from home allows employees to balance their home life

Advantages to the company


Working from home allows the company to employ people from around the
world
Working from home allows the company to save costs by not needing large
offices
Helps employers retain their employees…
…therefore cutting training/recruitment costs
Flexi-time allows company offices to remain open longer
Job sharing reduces training costs

To gain full marks there needs to be advantages to both the employees


and the company

© UCLES 2021 Page 8 of 10


0417/12 Cambridge IGCSE – Mark Scheme May/June 2021
PUBLISHED

Question Answer Marks

11 Max four from: 5


Adds a level of security
Verifies the email comes from a known and trusted source
Provides the receiver with a means of reply/private key
Used for initialising secure SSL connections between web browsers and
web servers

Max three from:


Details of the owner of the digital certificate
Serial number
Public key
Digital signature
Subject name
Valid from
Valid to//Expiry date

Question Answer Marks

12(a) Four from: 4


Information overload
Web sites at the top of the list may not be relevant
May be more irrelevant information
Search engines may not include all web pages
If a website loads faster, it is given priority
Search engine company may be paid to display certain web pages

12(b) Six from: 6


Check the author of the website as anybody can publish their understanding
of a topic
Check if the website has excessive advertising
Check the content/advertising of its own products of a website to see if it
biased
Check the final part of the domain name of the URL
Example .ac, .gov, .org
Check if site is endorsed by reliable/reputable people/organisations
Check if it has links to other reliable sites
Check if it has testimonials/reviews
Check if the author’s credentials are good
Check if information is comparable to other information from reliable
authenticated experts
Check if the date of the last update was a long time ago
Check if website has excessive spelling and grammar mistakes
Can compare information from other sites to see if it is reliable

12(c) Two from: 2


Select the position for the table
Click on Insert then table
Select/type in 2 columns and 5 rows
Type in the data

© UCLES 2021 Page 9 of 10


0417/12 Cambridge IGCSE – Mark Scheme May/June 2021
PUBLISHED

Question Answer Marks

12(d) Max three from: 4


Highlight Scientific name row
Right click select insert
Click Insert new row below

Or

Highlight Pouched row


Right click select insert
Click Insert new row above

Max three from


Click on right hand cell in the row
Click insert…pictures
Locate/select picture
Insert the picture
Format the picture

© UCLES 2021 Page 10 of 10



Cambridge IGCSE

INFORMATION AND COMMUNICATION TECHNOLOGY 0417/13


*8050692282*

Paper 1 Theory May/June 2021


2 hours

You must answer on the question paper.

No additional materials are needed.

INSTRUCTIONS
• Answer all questions.
• Use a black or dark blue pen.
• Write your name, centre number and candidate number in the boxes at the top of the page.
• Write your answer to each question in the space provided.
• Do not use an erasable pen or correction fluid.
• Do not write on any bar codes.
• You may use an HB pencil for any diagrams, graphs or rough working.

INFORMATION
• The total mark for this paper is 100.
• The number of marks for each question or part question is shown in brackets [ ].
• No marks will be awarded for using brand names of software packages or hardware.

This document has 20 pages. Any blank pages are indicated.

06_0417_13_2021_1.7
© UCLES 2021 [Turn over
2

1 Tick (✓) whether the following statements refer to Backing storage, RAM or ROM.

Backing
storage RAM ROM
(✓) (✓) (✓)

This is temporary storage used for the application


being executed.

This is volatile memory.

An example of this storage is an SSD.

This stores the start-up instructions for the


computer.

[4]

2 Circle two jobs where there has been an increase in employment as a direct result of the introduction
of computers.
Delivery drivers for
Car production workers Cleaning staff Medical staff
retail stores
Payroll workers Secretaries Teachers Website designers

[2]

3 A mobile phone is used for communications, either for making phone calls or text messaging.

Chang is planning an expedition to the Southern Alps in New Zealand. There is often a limited
mobile phone signal in these areas. He has set his phone up so that if there is an emergency he
can communicate with the rescue teams using text messaging rather than making a phone call.

Give two advantages of using text messaging in this way.

1 ................................................................................................................................................

..................................................................................................................................................

2 ................................................................................................................................................

..................................................................................................................................................

[2]

© UCLES 2021 06_0417_13_2021_1.7


3

4 Tick (✓) whether the following descriptions of analysing a system refer to Interviews, Observation
or Questionnaires.

Interviews Observation Questionnaires


Description
(✓) (✓) (✓)

This method gives a more reliable overview


of the whole system.

This is more time-consuming than the other


methods.

Questions on this method cannot be


expanded upon when being asked.

With this method the worker cannot remain


anonymous.

[4]

5 Complete the sentences using the most appropriate item from the list.

blog cookie email fax


search engine social media web browser wiki

(a) A piece of software that allows a user to display a web page is called a

........................................................................................................................................... [1]

(b) A personal internet journal is called a

........................................................................................................................................... [1]

(c) A web application that allows a group of people to edit the content is called a

........................................................................................................................................... [1]

© UCLES 2021 06_0417_13_2021_1.7 [Turn over


4

6 Susan is creating a database about cars and needs to save it in the shared area (S:) on the school
network. It will be stored in the folder ICT which is contained in the IGCSE folder. She needs to
save the file with a file name that is different from file names used by other students in the group.

(a) Write down a suitable file name for the file so that the teacher can easily find Susan’s work
and identify its contents. The file name should not contain spaces.

...........................................................................................................................................

........................................................................................................................................... [1]

(b) Write down the file path which Susan would use to store the file in the correct folder.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [2]

(c) Susan plans to work on her database at home. However, the database is very large so her
teacher has told her that it needs to be reduced in size. She will then be able to attach it to an
email so she can send it home.

Explain why the file size would need to be reduced.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [2]

© UCLES 2021 06_0417_13_2021_1.7


5

7 A family has purchased a wireless router for use in their home to allow their devices to be connected
via WiFi to form a wireless local area network (WLAN).

(a) When the family purchased the wireless router they were advised to change the default
password.

Explain why they should change the default password.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [2]

(b) Describe the process of using WiFi to connect to a WLAN.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [4]

© UCLES 2021 06_0417_13_2021_1.7 [Turn over


6

(c) Their son produces large complex diagrams on his desktop computer at home. He needs to
be able to access the diagrams when he is at university. Even if reduced in file size, the
diagrams would be too large to send using email.

Describe in detail how he could transfer the diagrams from his home desktop computer to be
able to access them at university, without using additional hardware.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [4]

(d) One of the parents in the family works for a government department and sends sensitive data
from their home computer to the office.The data is encrypted before being sent to ensure it is
harder to understand if it is intercepted.

Describe four other preventative measures that could be taken to avoid network security
issues.

1.........................................................................................................................................

...........................................................................................................................................

2.........................................................................................................................................

...........................................................................................................................................

3.........................................................................................................................................

...........................................................................................................................................

4.........................................................................................................................................

...........................................................................................................................................

[4]

© UCLES 2021 06_0417_13_2021_1.7


7

8 Many teachers feel that monitoring student progress is an important part of the teaching and learning
process.

Describe how the features of a spreadsheet can be used by a teacher to help monitor student
progress.

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

.................................................................................................................................................. [6]

© UCLES 2021 06_0417_13_2021_1.7 [Turn over


8

9 One way of communicating with other people is to use emails. It is very important that when you
send and receive emails you are aware of esafety.

Evaluate your own use of email in terms of esafety and describe the strategies you will need to
minimise the potential esafety risks.

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

.................................................................................................................................................. [8]

© UCLES 2021 06_0417_13_2021_1.7


9

10 Aimi works for a shop that sells toys. She is setting up a relational database of the stock in the
shop. She has started designing the database. Aimi has written down the questions that are asked
about each toy and needs to produce appropriate field names from them. An example of the type
of data that is to be stored is shown.

What is the toy? Tawara Doll

Who manufactured the toy? Tinky

What year was it manufactured? 2020

What price was it bought for? $12.99

(a) Complete the design table below by filling in an appropriate field name for each question. Each
field name must be different. Field names must not include spaces.

Question Field name

What is the toy?

Who manufactured the toy?

What year was it manufactured?

What price was it bought for?

[4]

© UCLES 2021 06_0417_13_2021_1.7 [Turn over


10

(b) When Aimi created the whole database one of the fields was set as integer. However, as data
is entered Aimi realises that the field should have been set to two decimal places.

Describe the steps that need to be taken, by Aimi, to change the field from an integer to a
decimal. This field will be set to two decimal places.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [4]

(c) Aimi created a relational database but could have created a flat file database.

Discuss the advantages and disadvantages of using a relational database rather than a flat
file database.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [6]

© UCLES 2021 06_0417_13_2021_1.7


11

11 Tawara College is setting up a new website for its older students. The website will publicise the
events in the college, as well as revision and sporting activities. The headteacher wants the website
to be attractive to the older students and it must meet their needs.

Before the website can be produced the needs of the audience have to be taken into account.

Analyse the needs of this audience.

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

.................................................................................................................................................. [8]

© UCLES 2021 06_0417_13_2021_1.7 [Turn over


12

12 The director of a zoo is writing a document about wallabies. He has taken an image of some
wallabies (Fig. 12.1) and is planning the layout of the pages which will include part of the image.
The image he plans to use is shown in Fig. 12.2.

Fig. 12.1

Fig. 12.2

(a) Name the editing technique that was used to change Fig. 12.1 to Fig. 12.2.

........................................................................................................................................... [1]

© UCLES 2021 06_0417_13_2021_1.7


13

(b) The director will include images and information about the wallabies in the document. Each
page will be set out in 2 columns with a line between them.

(i) Describe the steps taken to create the columns. Assume the software has been loaded
and the text has been entered.

................................................................................................................................

................................................................................................................................

................................................................................................................................

................................................................................................................................

................................................................................................................................

................................................................................................................................ [3]

© UCLES 2021 06_0417_13_2021_1.7 [Turn over


14

(ii) Describe the steps taken to add the image as shown.

................................................................................................................................

................................................................................................................................

................................................................................................................................

................................................................................................................................

................................................................................................................................

................................................................................................................................

................................................................................................................................

................................................................................................................................ [4]

© UCLES 2021 06_0417_13_2021_1.7


15

(c) As the document is being written for the zoo it needs to conform to the corporate house style.

Explain what is meant by corporate house style.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [4]

© UCLES 2021 06_0417_13_2021_1.7 [Turn over


16

13 A student is looking for information on the internet for his school project. He has found a number
of web pages that are useful.

(a) Explain the following terms when referring to web pages:

(i) Bookmark

................................................................................................................................

................................................................................................................................

................................................................................................................................

................................................................................................................................ [2]

(ii) Anchor

................................................................................................................................

................................................................................................................................

................................................................................................................................

................................................................................................................................ [2]

(iii) Hyperlink

................................................................................................................................

................................................................................................................................

................................................................................................................................

................................................................................................................................ [2]

(b) The student has found a website that is very useful and is planning to bookmark it.

Describe the steps he will need to take to set up a bookmark for the website.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [2]

© UCLES 2021 06_0417_13_2021_1.7


17

14 Magnetic tapes are used in organisations for backing up data.

Describe the advantages and disadvantages of using magnetic tapes rather than flash memory for
backing up data.

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

.................................................................................................................................................. [6]

15 Streaming movies and music is replacing downloading or purchasing a physical copy of the files.

Describe the advantages and disadvantages of streaming files rather than using other methods.

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

.................................................................................................................................................. [4]

© UCLES 2021 06_0417_13_2021_1.7


18

BLANK PAGE

© UCLES 2021 06_0417_13_2021_1.7


19

BLANK PAGE

© UCLES 2021 06_0417_13_2021_1.7


20

BLANK PAGE

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable
effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will
be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge Assessment
International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at
www.cambridgeinternational.org after the live examination series.

Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of
Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge.

© UCLES 2021 06_0417_13_2021_1.7


Cambridge IGCSE™

INFORMATION AND COMMUNICATION TECHNOLOGY 0417/13


Paper 1 Written May/June 2021
MARK SCHEME
Maximum Mark: 100

Published

This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.

Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.

Cambridge International will not enter into discussions about these mark schemes.

Cambridge International is publishing the mark schemes for the May/June 2021 series for most Cambridge
IGCSE™, Cambridge International A and AS Level components and some Cambridge O Level components.

This document consists of 10 printed pages.

© UCLES 2021 [Turn over


0417/13 Cambridge IGCSE – Mark Scheme May/June 2021
PUBLISHED

Generic Marking Principles

These general marking principles must be applied by all examiners when marking candidate answers.
They should be applied alongside the specific content of the mark scheme or generic level descriptors
for a question. Each question paper and mark scheme will also comply with these marking principles.

GENERIC MARKING PRINCIPLE 1:

Marks must be awarded in line with:

• the specific content of the mark scheme or the generic level descriptors for the question
• the specific skills defined in the mark scheme or in the generic level descriptors for the question
• the standard of response required by a candidate as exemplified by the standardisation scripts.

GENERIC MARKING PRINCIPLE 2:

Marks awarded are always whole marks (not half marks, or other fractions).

GENERIC MARKING PRINCIPLE 3:

Marks must be awarded positively:

• marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit
is given for valid answers which go beyond the scope of the syllabus and mark scheme,
referring to your Team Leader as appropriate
• marks are awarded when candidates clearly demonstrate what they know and can do
• marks are not deducted for errors
• marks are not deducted for omissions
• answers should only be judged on the quality of spelling, punctuation and grammar when these
features are specifically assessed by the question as indicated by the mark scheme. The
meaning, however, should be unambiguous.

GENERIC MARKING PRINCIPLE 4:

Rules must be applied consistently, e.g. in situations where candidates have not followed
instructions or in the application of generic level descriptors.

GENERIC MARKING PRINCIPLE 5:

Marks should be awarded using the full range of marks defined in the mark scheme for the question
(however; the use of the full mark range may be limited according to the quality of the candidate
responses seen).

GENERIC MARKING PRINCIPLE 6:

Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should
not be awarded with grade thresholds or grade descriptors in mind.

© UCLES 2021 Page 2 of 10


0417/13 Cambridge IGCSE – Mark Scheme May/June 2021
PUBLISHED

Question Answer Marks

1 4
Backing RAM ROM
storage

This is temporary storage used for the



application being executed.

This is volatile memory. 

An example of this storage is an SSD. 

This stores the startup instructions for



the computer.

Question Answer Marks

2 Delivery drivers for retail stores 2


Website designers

Question Answer Marks

3 Two from: 2
He may be tired/injured therefore text messaging is easier than trying to talk
The text message is sent even though the sender’s phone is in limited signal
strength
Limited signal strength can result in a break of voice
A text message is quicker to send

Question Answer Marks

4 4
Interviews Observation Questionnaires

This method gives a more


reliable overview of the whole 
system.

This is more time consuming



than the other methods.

Questions on this method


cannot be expanded upon 
when being asked.

With this method the worker



cannot remain anonymous.

Question Answer Marks

5(a) Web browser 1

© UCLES 2021 Page 3 of 10


0417/13 Cambridge IGCSE – Mark Scheme May/June 2021
PUBLISHED

Question Answer Marks

5(b) Blog 1

5(c) Wiki 1

Question Answer Marks

6(a) Example: Susan_car_database 1

6(b) S:\IGCSE\ICT\ 2

\IGCSE – 1 mark
\ICT\ – 1 mark

The overall answer must be in this order

6(c) Two from: 2


The larger it is the longer to transmit the email
Some email companies set a limit on attachment file size
The time to upload/download would increase with a large file

Question Answer Marks

7(a) Two from: 2


So that other people cannot access the router using the known default
password
As it is wireless the password could be cracked from outside easily and then
used for free by others
So that people cannot make changes to/access personal data on the router
It would increase security of the data

7(b) Four from: 4


The computer/device sends data to its wireless adapter
The data is converted into radio waves
The radio waves are transmitted
A wireless adapter receives the radio waves
Radio waves are converted into data
The computer initiates a handshake with the wireless router
The wireless router responds
Establishes a session/pairing
Wireless router checks the password/key is correct
Data is transmitted
User has to enter a password/passkey/automatic entry of key for known
connections

7(c) Four from: 4


Create a cloud storage account
Ensure sufficient storage in the cloud account
Log into the cloud at home
Upload/transfer the diagrams from his home computer to the cloud
At university: access/login to his cloud storage account
At university: download/access the stored diagrams

© UCLES 2021 Page 4 of 10


0417/13 Cambridge IGCSE – Mark Scheme May/June 2021
PUBLISHED

Question Answer Marks

7(d) Four from: 4


Install security devices/firewalls
Use a VPN
Install security software/anti-virus/anti-spyware
Set up security settings in the router/operating system
Data backup in case of data loss/corruption
Restrict access to the network infrastructure
Train the family in the safe and secure use of the equipment
Not opening emails/attachments from unknowns/phishing emails
Not downloading files from unknowns/phishing emails
Use a dongle to restrict use of software

Question Answer Marks

8 Six from: 6
Student progress can be shown over time using graphs
Comparisons between students can be shown using graphs
Comparisons with archive data can be shown using graphs
Conditional formatting can be used to show how a student is performing
compare to other students or past performance
Data can be sorted to show the best performers in the class
Calculate average marks to enable comparisons
Automatic reporting results to parents
Filtering students to show those above/below a threshold

© UCLES 2021 Page 5 of 10


0417/13 Cambridge IGCSE – Mark Scheme May/June 2021
PUBLISHED

Question Answer Marks

9 Four matched pairs: 8


I never send personal data to people I do not know ...
... because people can use it against me
… as other people can access my personal details

I do not reply by using reply button unless I know the person ...
... because it may be a scam

I use a list of known email addresses ...


... so I don’t accidently send it to the wrong email address

I check before opening an email/email attachment ...


... because it might be a phishing attack

I scan both the email and attachment ...


... in order to avoid viruses

I never send images of myself to people I do not know ...


... so they cannot recognise me in the street

I do not set auto reply to my email system ...


... as this could alert a spammer that the email is active

I use email filtering ...


... this stops spam emails

I always report any phishing emails ...


... so the authorities can take action

I change my email password regularly ...


... so that others cannot access my email account

I use a strong password …


… so that others cannot access my email account

I logout of email after I have finished using it ...


... to stop others gaining access to my emails

I keep my password safe …


… so that others cannot access my account

To gain full marks at least three matched pairs are required

© UCLES 2021 Page 6 of 10


0417/13 Cambridge IGCSE – Mark Scheme May/June 2021
PUBLISHED

Question Answer Marks

10(a) 4
Question Field name (Examples)

What is the toy? Name_of_toy

Who manufactured the toy? Manufacturer

What year was it manufactured? Year

What price was it bought for? Buying_price

10(b) Four from: 4


Open the table
Select Design View
Select the field
Select field type
Select from the drop down list – double
Click decimal places
Type in 2

10(c) Six from 6


Advantages
Data does not need to be entered a second time as tables are used
Records cannot be duplicated but a flat file cannot stop this
Saves time when entering data
More efficient storage as data is only stored once
Simpler to delete/modify details
Complex queries can be carried out
Complex reports can be created
Better security as some tables can be made confidential
Avoids inconsistent records
More data independence
Less inconsistency of data
More ability to cater for future requirements

Disadvantages
More complex than a flat file database as more tables are required
Takes more time to set up
More of a reduction in performance if many tables are needed
Slower extraction of data
Less robust due to broken keys and records//Each table requires a key field
and relationships to other tables
Needs specialist personnel to setup the database
More processing power needed for complex queries
A relational database is more complex to understand that a flat file database

To gain full marks there needs to be advantages and disadvantages

© UCLES 2021 Page 7 of 10


0417/13 Cambridge IGCSE – Mark Scheme May/June 2021
PUBLISHED

Question Answer Marks

11 Eight from: 8
There needs to be emoticons/clipart to grab the attention
The content needs to be relevant to improve their knowledge
There must be a balance of information and pictures with more information
than pictures
The use of white space is less important
More hyperlinks to related web pages
Fonts must be clear and readable
The interface must be simple, clear and intuitive
Slideshows, videos and images providing more information
High contrast background
The students need to be constantly engaged
Needs to be interactive
The tone of the website needs to be casual
The website needs to be able to work on all platforms especially mobile ones
The content needs to be kept fresh and updated

Question Answer Marks

12(a) Cropping/crop/cut 1

12(b)(i) Three from: 3


Highlight the body text
Select layout/page set up
Select columns
Select more columns
Select two columns
Click line between
Save the document

12(b)(ii) Four from: 4


Click insert …
… select picture from file
Locate the image
Load the image
Right click and list menu …
… click format
Format the image
Position the image
Click wrap text
Save the document

© UCLES 2021 Page 8 of 10


0417/13 Cambridge IGCSE – Mark Scheme May/June 2021
PUBLISHED

Question Answer Marks

12(c) Two from: 4


Used to make sure that all documents and other materials from an
organisation have consistency
Set of rules which state how all documents and written communication from
an organisation should be formatted
Use of branding

Three from:
Use of corporate/same colours
Same font
Same style of font
Margins and white space look similar
Graphics are similar
Logos are the same
Language used is the same on all documents within the organisation
Position of the images are the same

Question Answer Marks

13(a)(i) Two from: 2


Saved shortcut
Directs the browser to a specific web page
It stores the title, URL, and favicon of the corresponding page
Allows the user to easily access favourite locations on the Web

13(a)(ii) Two from: 2


The anchor is a link/placeholder/reference point
The anchor links with another part of the web page

13(a)(iii) Two from: 2


Word/phrase/image
When the hyperlink is clicked
Links to another document/page/website/top/bottom of the page

13(b) Two from: 2


Open the website
Click on the address bar/URL
Select CTRL-D/click on the bookmark/favourite icon/star/add to
favourites//Drag URL to bookmarks bar
Type in/change the name
Add the bookmark

© UCLES 2021 Page 9 of 10


0417/13 Cambridge IGCSE – Mark Scheme May/June 2021
PUBLISHED

Question Answer Marks

14 Six from: 6
Advantages
Less expensive per GB/gigabyte of memory
Not as easily lost, as larger in size

Disadvantages
Data access time is slower
Data transfer rate is slower
Affected by magnetic fields
They have moving parts therefore less robust
Read and write is more noisy
Less compact that flash memory
Harder to transfer to other devices
Requires a special reader

To gain full marks there needs to be advantages and disadvantages

Question Answer Marks

15 Four from: 4
Advantages
Files can be larger therefore it can save physical storage space
More likely to get the music you need
More likely to get more up to date music
Can be accessed in more places as only need the internet
Don’t need physical storage space
Don’t need optical drives to view/listen to movie/audio
Can be viewed on mobile devices with internet connection
Copyright owners have more control over who can watch the movie/listen to
the audio as no physical copy exists to be copied/pirated
Don’t have to wait for the whole/large file to be downloaded before viewing
Physical copies can be lost/stolen/damaged rendering them useless/have to
buy again but steamed movies are always available

Disadvantages
Needs a connection to the internet
Never own a physical copy of the file
The playback is dependent on the internet connection therefore may not be as
good a quality
A subscription may be needed to be paid therefore may be more expensive

To gain full marks there needs to be advantages and disadvantages

© UCLES 2021 Page 10 of 10


Cambridge IGCSE™
* 5 5 3 3 6 8 7 1 0 4 *

INFORMATION AND COMMUNICATION TECHNOLOGY 0417/11


Paper 1 Theory October/November 2021

2 hours

You must answer on the question paper.

No additional materials are needed.

INSTRUCTIONS
● Answer all questions.
● Use a black or dark blue pen.
● Write your name, centre number and candidate number in the boxes at the top of the page.
● Write your answer to each question in the space provided.
● Do not use an erasable pen or correction fluid.
● Do not write on any bar codes.
● You may use an HB pencil for any diagrams, graphs or rough working.

INFORMATION
● The total mark for this paper is 100.
● The number of marks for each question or part question is shown in brackets [ ].
● No marks will be awarded for using brand names of software packages or hardware.

This document has 16 pages. Any blank pages are indicated.

DC (CE/FC) 203093/2
© UCLES 2021 [Turn over
2

1 A computer consists of both hardware and software.

(a) Define the term hardware.

...................................................................................................................................................

............................................................................................................................................. [1]

(b) Give two examples of internal hardware devices.

1 ................................................................................................................................................

2 ................................................................................................................................................
[2]

(c) Define the term software.

...................................................................................................................................................

............................................................................................................................................. [1]

(d) There are two types of software: system and applications.

Give two examples of applications software.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................
[2]

2 Circle two jobs where there has been a decrease in employment as a direct result of the
introduction of computers.

Bus drivers Car production Delivery drivers Fishermen


workers for retail stores

Payroll workers Programmers Teachers Website designers


[2]

© UCLES 2021 0417/11/O/N/21


3

3 Describe two advantages of using a tablet computer rather than a laptop computer.

1 .......................................................................................................................................................

..........................................................................................................................................................

2 .......................................................................................................................................................

..........................................................................................................................................................
[2]

4 Tick (3) whether the following advantages of analysing a system refer to looking at existing
paperwork, observation or questionnaires.

Looking
at existing
paperwork Observation Questionnaire
(3) (3) (3)

This method gives the systems analyst


an overall view of the system

Individuals can remain anonymous

This method allows information to be


collected that cannot be obtained from
any other method

This method gives the quickest analysis


of the data

[4]

© UCLES 2021 0417/11/O/N/21 [Turn over


4

5 Tawara Tours has created a new online booking system to allow customers to book holidays. The
system was written using modules.

(a) Describe how the new system could be tested prior to it becoming operational.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [6]

© UCLES 2021 0417/11/O/N/21


5

(b) Tawara Tours used to book holidays using a manual booking system. This used a pen and
paper to make the bookings.

Discuss the advantages and disadvantages of using online booking systems rather than a
manual booking system.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [8]

© UCLES 2021 0417/11/O/N/21 [Turn over


6

6 As a student you often use a computer screen. This could be a screen on a desktop computer, a
laptop computer or even a smartphone.

Evaluate your use of computer screens, in terms of health risks, and explain any strategies you
use to minimise these health risks.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

.................................................................................................................................................... [6]

7 Bluetooth is a method of communication to connect devices together.

Describe how a smartphone can use Bluetooth to connect to another device.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

.................................................................................................................................................... [4]

© UCLES 2021 0417/11/O/N/21


7

8 An organisation uses the internet and an intranet.

(a) Explain how the purpose of the internet differs from the purpose of an intranet.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [4]

Employees in the organisation are allowed to access the intranet using their smartphones.

The employees are required to secure their smartphones using either facial recognition, passwords
or voice recognition.

(b) Tick (3) whether the following statements refer to facial recognition, password or
voice recognition.

Facial Voice
recognition Password recognition
(3) (3) (3)
This method cannot access the
smartphone unintentionally
The accuracy of this method can be
affected by noise
This method requires the use of the
smartphone’s camera
This method could be compromised by
shoulder surfing
[4]

© UCLES 2021 0417/11/O/N/21 [Turn over


8

9 Robots are used to spray paint cars in a car production company.

(a) Describe two other jobs that robots can perform in car production.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

(b) When the spray paint can is empty it needs to be refilled. There is a sensor in the can which
measures the amount of paint.

Describe the use of the sensor and microprocessor in this application.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [6]

© UCLES 2021 0417/11/O/N/21


9

(c) Discuss the advantages and disadvantages of the introduction of robots rather than employing
humans to spray paint the cars.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [6]

10 (a) Explain the differences between a VLOOKUP function and a LOOKUP function.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [3]

© UCLES 2021 0417/11/O/N/21 [Turn over


10

(b) A spreadsheet contains a list of staff and the rooms they work in at a school.

A B C D E
1 Room Department Name
2 29 Languages Aaron Garcia 31 =VLOOKUP(D2,A2:C7,3)
3 30 History Julieta Diaz
4 28 Chemistry Ernesto Fernandez
5 26 Biology Salvador Calbo
6 31 ICT David James
7 49 Mathematics Adriene Martinez

(i) Explain, in detail, what the formula in cell E2 does.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [3]

(ii) When certain room numbers are typed into cell D2 unexpected results appear in cell E2.

Suggest improvements that could be made to ensure the correct result is displayed.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [2]

© UCLES 2021 0417/11/O/N/21


11

A teacher in the school has created a spreadsheet to display whether a student has good
timekeeping when arriving at lessons. He has produced a formula but thinks it could be improved.
The formula is:

=IF(B4>=A$18,B$18,IF(B4>=A$17,B$17,IF(B4>=A$16,B$16,IF(B4>=A$15,B$15,IF(B4>=A$14,B$14,"")))))

A B C
1
2 Name of Student
3 Half term Lates
4 1 17 =IF(B4>=A$18,B$18,IF(B4>=A$17,B$17,IF(B4>=A$16,B$16,IF(B4>=A$15,B$15,IF(B4>=A$14,B$14,"")))))

5 2 20
6 3 1
7 4 12
8 5 18
9 6 0
10
11
12
13
14 0 Excellent
15 1 Very Good
16 5 Good
17 15 Poor
18 25 Very Poor
19

(c) Write down the value that should appear in cell C4.

............................................................................................................................................. [1]

(d) The teacher has improved the formula and has typed in =VLOOKUP(B4,A$14:B$18,2)

Explain the advantages of using this formula compared to the original one.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [4]

© UCLES 2021 0417/11/O/N/21 [Turn over


12

11 Many young people play online games. One problem with online gaming is that it is easy to give
out personal details accidentally. Some users create weak passwords which could lead to their
personal details being accessed.

(a) Name two pieces of personal data that could be accessed.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................
[2]

(b) Write down three rules that should be applied when setting a strong password.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[3]

(c) Describe safety measures that should be taken by gamers to ensure their data is safe other
than using strong passwords.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [6]
© UCLES 2021 0417/11/O/N/21
13

12 The use of social networking is a part of modern living.

(a) Define the term social networking.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

(b) Describe the benefits of using social networking.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [6]

© UCLES 2021 0417/11/O/N/21 [Turn over


14

13 A student is working on a project on the World Games. He has produced some information but has
decided to produce a second layout including a table. The original layout and the new layout are
shown.

2021 World Games


This will be the 11th World Games, a major international multi-sport event, for sports, or disciplines
within a sport, that were not contested in the Olympic Games.

Dates: Thu, 15 Jul 2021 – Sun, 25 Jul 2021


Location: Legion Field, Birmingham, Alabama, United States
Host city: Birmingham, Alabama, United States
Opening ceremony: July 15
Closing ceremony: July 25
Main venue: The New Birmingham Stadium

The original layout

2021 World Games


This will be the 11th World Games, a major international multi-sport event, for sports, or disciplines
within a sport, that were not contested in the Olympic Games.

Dates Thu, 15 Jul 2021 – Sun, 25 Jul 2021


Location Legion Field, Birmingham, Alabama, United States
Host city Birmingham, Alabama, United States
Opening ceremony July 15
Closing ceremony July 25
Main venue The New Birmingham Stadium

The new layout

(a) Explain, step by step, how the table was created, without the text being entered by hand.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [4]

© UCLES 2021 0417/11/O/N/21


15

(b) The student checks the text he has written using a spell checker.

Explain how a spell checker works.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

(c) Explain why the suggestions made by the spell checker do not always give the correct
response.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

© UCLES 2021 0417/11/O/N/21


16

BLANK PAGE

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.

Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of
Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge.

© UCLES 2021 0417/11/O/N/21


Cambridge IGCSE™

INFORMATION AND COMMUNICATION TECHNOLOGY 0417/11


Paper 1 Theory October/November 2021
MARK SCHEME
Maximum Mark: 100

Published

This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.

Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.

Cambridge International will not enter into discussions about these mark schemes.

Cambridge International is publishing the mark schemes for the October/November 2021 series for most
Cambridge IGCSE™, Cambridge International A and AS Level components and some Cambridge O Level
components.

This document consists of 10 printed pages.

© UCLES 2021 [Turn over


0417/11 Cambridge IGCSE – Mark Scheme October/November
PUBLISHED 2021

Generic Marking Principles

These general marking principles must be applied by all examiners when marking candidate answers.
They should be applied alongside the specific content of the mark scheme or generic level descriptors
for a question. Each question paper and mark scheme will also comply with these marking principles.

GENERIC MARKING PRINCIPLE 1:

Marks must be awarded in line with:

• the specific content of the mark scheme or the generic level descriptors for the question
• the specific skills defined in the mark scheme or in the generic level descriptors for the question
• the standard of response required by a candidate as exemplified by the standardisation scripts.

GENERIC MARKING PRINCIPLE 2:

Marks awarded are always whole marks (not half marks, or other fractions).

GENERIC MARKING PRINCIPLE 3:

Marks must be awarded positively:

• marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit
is given for valid answers which go beyond the scope of the syllabus and mark scheme,
referring to your Team Leader as appropriate
• marks are awarded when candidates clearly demonstrate what they know and can do
• marks are not deducted for errors
• marks are not deducted for omissions
• answers should only be judged on the quality of spelling, punctuation and grammar when these
features are specifically assessed by the question as indicated by the mark scheme. The
meaning, however, should be unambiguous.

GENERIC MARKING PRINCIPLE 4:

Rules must be applied consistently, e.g. in situations where candidates have not followed
instructions or in the application of generic level descriptors.

GENERIC MARKING PRINCIPLE 5:

Marks should be awarded using the full range of marks defined in the mark scheme for the question
(however; the use of the full mark range may be limited according to the quality of the candidate
responses seen).

GENERIC MARKING PRINCIPLE 6:

Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should
not be awarded with grade thresholds or grade descriptors in mind.

© UCLES 2021 Page 2 of 10


0417/11 Cambridge IGCSE – Mark Scheme October/November
PUBLISHED 2021

Question Answer Marks

1(a) The physical components of the computer 1

1(b) Two from: 2

Processor
Motherboard
Video/graphic card
Sound card

1(c) One from: 1

Programs for controlling the operation of a computer


Programs for processing of electronic data
Program/data/applications

1(d) Two from for example: 2

Word processing
Spreadsheet
Database
Presentation

Question Answer Marks

2 Car production workers 2


Payroll workers

Question Answer Marks

3 Two from: 2

Tends to be a faster to load up the operating system


They are more lightweight so can be carried anywhere//More portable
Don’t generate as much heat
Lower power consumption therefore batteries last longer

© UCLES 2021 Page 3 of 10


0417/11 Cambridge IGCSE – Mark Scheme October/November
PUBLISHED 2021

Question Answer Marks

4 4
Looking at Observation Questionnaire
existing
paperwork

This method gives the 


systems analyst an
overall view of the
system

Individuals can remain 


anonymous

This method allows 


information to be
collected that cannot be
obtained from any other
method

This method gives the 


quickest analysis of the
data

Question Answer Marks

5(a) Six from: 6

Each module is tested separately


Modules are tested by the programmers
Modules/system are tested with live data
Errors and problems are noted
Improvements are made to the module
The module/system is retested
Modules are combined and tested together

System is tested as a whole


System is tested to meet the user’s requirements

© UCLES 2021 Page 4 of 10


0417/11 Cambridge IGCSE – Mark Scheme October/November
PUBLISHED 2021

Question Answer Marks

5(b) Eight from: 8

Advantages
Prevents double booking
The customer can see immediately when the holiday has been booked
Bookings can be made 24/7
No need to travel to the booking office/queue up so saves time
Can be booked from any location
Saves cost of travelling to the booking office
Tickets are usually sent online and therefore paperless//Saves printing and
postal costs
Usually cheaper as lower/fewer overheads
Customers can more easily see the tours that are available

Disadvantages
Setting up is expensive//maintenance is expensive
Internet access is needed to run the booking system therefore the cost may
be increased
More reliant on server/network
Booking mistakes can be more easily made
Mistakes are more difficult to rectify due to the speed of booking
If the system crashes during the booking the booking may not be made

To gain full marks there must be at least one advantage and one
disadvantage

Question Answer Marks

6 Problem: 6
Award a mark for each problem identified
I avoid back and neck problems
I avoid eye strain
I avoid getting headaches
I avoid epilepsy

Strategies:
Max four from:
Make sure the top of the screen is at eye level
Make sure that I adjust the tilting screen correctly
Take regular breaks
Do neck/back exercises
Make sure I use blue lens spectacles
Use a screen filter
Use a matt/anti-glare screen
Turn the screen away from the window
Use a computer screen for a short time/take regular breaks
Have my eyes tested regularly
Improve the lighting in the room
Sitting further away from the screen
Keeping the screen clean
Position the screen to reduce glare
Use a non-flickering screen/LED/LCD
Turn the brightness down on the screen

© UCLES 2021 Page 5 of 10


0417/11 Cambridge IGCSE – Mark Scheme October/November
PUBLISHED 2021

Question Answer Marks

7 Four from: 4

Smartphone sends data to its Bluetooth connector


Data is converted to radio waves
The smartphone automatically detects nearby devices
The smartphone pairs to the other device if in range
The smartphone randomly chooses one of 79 possible channels
If the channel is in use, it randomly chooses another
The connection changes channels, every few seconds
Sends the radio wave to the other device

Question Answer Marks

8(a) Four from: 4

Internet is used to share and distribute information outside the organisation


whereas the intranet within an organisation
Internet is used to send and receive emails and messages outside the
organisation whereas intranet sends and receives messages within an
organisation
The intranet meets the needs of the organisation whereas internet aims to
meet the needs of everybody
The internet facilitates collaboration with others whereas the intranet is only
used to collaborate with other members within an organisation
The internet is used to browse the World Wide Web

8(b) 4
Facial Voice
recognition Password Recognition

This method cannot access


the smartphone 
unintentionally

The accuracy of this method



can be affected by noise

This method requires the use



of the smartphone’s camera

This method could be


compromised by shoulder 
surfing

© UCLES 2021 Page 6 of 10


0417/11 Cambridge IGCSE – Mark Scheme October/November
PUBLISHED 2021

Question Answer Marks

9(a) Two from, for example: 2

Fit windscreens
Fit the wheels
Welding body panels
Move cars from one place to another
Fit engines

9(b) Six from: 6

The depth of the paint is read by the sensor


The depth of paint is sent from the sensor to the ADC/microprocessor
The digital data from the ADC is read by the microprocessor
The microprocessor compares this data to the minimum depth of the
paint/preset value
If the data is less than the minimum depth/preset value, the microprocessor
sends a signal to the actuator
If the data is more than the minimum depth/preset value microprocessor does
nothing
Process is continuous

9(c) Six from: 6

Advantages
They can work in areas where it would be harmful for humans
They can work 24/7
Cheaper in the long run
Higher productivity
The finish is more consistent

Disadvantages
Expensive to purchase
Skills can be lost
Expensive to maintain/reprogram
Expensive to start up//train staff to operate the robots

To gain full marks there must be at least one advantage and one
disadvantage

© UCLES 2021 Page 7 of 10


0417/11 Cambridge IGCSE – Mark Scheme October/November
PUBLISHED 2021

Question Answer Marks

10(a) Three from: 3

LOOKUP allows for horizontal and vertical searching whereas VLOOKUP


allows for vertical searching
LOOKUP does not require an index value/only works on the second
row/column whereas VLOOKUP requires an index value
LOOKUP usually only works when the data is sorted
VLOOKUP only returns data to the right of the searched column
VLOOKUP user can select either an approximate or exact match to the
lookup value

10(b)(i) Three from: 3

The formula looks up the value in D2…


…In the (range) A2 to A7
And returns the corresponding value
In the 3rd column/Column C

10(b)(ii) Add FALSE/0 to the end of the formula – 1 mark 2


Sort the range into ascending order of column A – 1 mark

10(c) Poor 1

10(d) Four from: 4

Quicker to type in the formula


Fewer mistakes when typing in the formula
Easier to spot mistakes
Easier to expand the range
Takes up less storage space
Easier to remember when retyping

Question Answer Marks

11(a) Two from for example: 2

Email address
Real names
DOB
Home address
Contact phone number
Membership card number
Location data
Internet Protocol (IP) address
Picture of yourself
Gender

© UCLES 2021 Page 8 of 10


0417/11 Cambridge IGCSE – Mark Scheme October/November
PUBLISHED 2021

Question Answer Marks

11(b) Two from: 3

Password should not relate to personal details


Should be a long password
Not previously used password
Should not include repeating/obvious patterns//predictable words
Password should be strong

11(c) Six from: 6

Use anti-spyware/up to date antivirus software


Play the games with the firewall operational
Play only with authorised versions of games which you have purchased from
the correct sources and for which you have a licence
Download/buy files and new software from reputable sources
Do not forget to delete your account details when you are not playing again
Keep the game software up to date.
When disposing of your gaming device ensure all of your personal information
has been deleted.
Choose a username that does not reveal any personal information
Be aware of criminals buying or selling ‘property’ that exists inside a computer
game, in the real world

Question Answer Marks

12(a) Two from: 2

Dedicated website/app/platforms
It interacts with other users
Can be used to find people with similar interests

12(b) Six from: 6

Communicating with friends and colleagues all over the world


Promotes collaboration and teamwork
Instant communication
Easy to find other people with common interests
Allows the exchange of content or documents
Allows people to share best practice/knowledge/skills
It can help in community projects
Gives up to date information
Can give more confidence to some people who may be shy//develop social
skills
As it is seen by a lot of people helps advertising
Easier for online buying and selling//market products
Can be used more easily for analytics and market research
It can promote talent quickly, musicians
Make/socialise with new friends

© UCLES 2021 Page 9 of 10


0417/11 Cambridge IGCSE – Mark Scheme October/November
PUBLISHED 2021

Question Answer Marks

13(a) Four from: 4

Load the document


Highlight the text
Click Insert then Table
Select Convert text to table
Click on 2 columns
Click separate by :
Click ok

13(b) Two from: 2

Compares each typed word…


…with its dictionary/database
Uses algorithms to check the spelling

13(c) Two from: 2

Real names are not recognised


Badly spelt words will not be recognised
Incorrect grammar may not be recognised
It will not find words that sound the same but have been used incorrectly
Some words may be spelt incorrectly but form another word
They do not learn from their mistakes unless added to the dictionary
They may use the wrong dictionary

© UCLES 2021 Page 10 of 10


Cambridge IGCSE™
* 9 2 0 1 7 1 7 2 6 4 *

INFORMATION AND COMMUNICATION TECHNOLOGY 0417/12


Paper 1 Theory October/November 2021

2 hours

You must answer on the question paper.

No additional materials are needed.

INSTRUCTIONS
● Answer all questions.
● Use a black or dark blue pen.
● Write your name, centre number and candidate number in the boxes at the top of the page.
● Write your answer to each question in the space provided.
● Do not use an erasable pen or correction fluid.
● Do not write on any bar codes.
● You may use an HB pencil for any diagrams, graphs or rough working.

INFORMATION
● The total mark for this paper is 100.
● The number of marks for each question or part question is shown in brackets [ ].
● No marks will be awarded for using brand names of software packages or hardware.

This document has 16 pages. Any blank pages are indicated.

DC (CE/FC) 203094/2
© UCLES 2021 [Turn over
2

1 A computer consists of both hardware and software.

(a) Give two examples of input devices which are part of a laptop computer.

1 ................................................................................................................................................

2 ................................................................................................................................................
[2]

(b) There are two types of software: system and applications.

Give two examples of system software.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................
[2]

2 Tick (3) the most appropriate printer which relates to the following statements.

3D Dot matrix Laser


(3) (3) (3)

This printer is an impact printer

This printer uses toner

This printer uses an inked ribbon

This printer uses tomography

[4]

3 (a) Describe two disadvantages of using a tablet computer rather than a laptop computer.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................
[2]

© UCLES 2021 0417/12/O/N/21


3

(b) Modern computers often do not have an optical drive.

State two ways music can be transferred onto a computer that does not contain an optical
drive.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................
[2]

4 Write down the most appropriate network device to match the following statements. Your answers
should be different in each part.

(a) This network device checks the data packet arriving from one computer and sends the data
to a specific computer.

............................................................................................................................................. [1]

(b) This network device sends the data packet from a computer to all devices connected to it.

............................................................................................................................................. [1]

(c) This network device connects a LAN to the internet.

............................................................................................................................................. [1]

(d) This network device connects one LAN to another with the same protocol.

............................................................................................................................................. [1]

© UCLES 2021 0417/12/O/N/21 [Turn over


4

5 The Internet of Things (IoT) is a computer network which allows users to control household
devices remotely. It has many benefits, for example a user can turn on the house central heating
via a smartphone. The IoT can use WiFi and Bluetooth which can cause problems regarding data
security.

Describe the methods that could be taken to protect the user’s data.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

.................................................................................................................................................... [6]

© UCLES 2021 0417/12/O/N/21


5

6 As a student you often use a computer keyboard. This could be a virtual keyboard or a physical
keyboard on a desktop computer, a laptop computer or even a smartphone.

Evaluate your use of computer keyboards in terms of health risks, and explain any strategies you
use to minimise these health risks.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

.................................................................................................................................................... [8]

© UCLES 2021 0417/12/O/N/21 [Turn over


6

7 Rockit Motors recently created a new car sales website. The website uses internet shopping
features. Customers can ask questions of the virtual salespeople on the website, and then
purchase the car on the website.

(a) Describe two other features of internet shopping.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

(b) Discuss the benefits and drawbacks of using internet shopping for Rockit Motors.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [6]

© UCLES 2021 0417/12/O/N/21


7

(c) Before the website became operational it needed to be tested. The web designer created a
test plan including module and whole system testing.

Explain the difference between module and whole system testing.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [4]

© UCLES 2021 0417/12/O/N/21 [Turn over


8

8 You are creating a presentation on the World Games. You have created a spreadsheet showing
the number of gold, silver and bronze medals awarded to different countries.

You are planning to create a graph in the presentation showing the country, the number of gold
medals and the total number of medals.

A B C D E F
1 World Games Medals
2
3 Country Gold Silver Bronze Total
4 1 Italy 153 145 142 440
5 2 United States 142 131 109 382
6 3 Germany 137 111 138 386
7 4 Russia 137 110 72 319
8 5 France 101 102 105 308
9 6 China 68 55 27 150
10 7 Great Britain 61 89 210 360
11 8 Japan 55 38 53 146
12 9 Ukraine 47 36 125 208
13 10 Spain 42 42 42 126

Original data

(a) Explain how you would create a vertical bar chart, showing the name of the country, the
number of gold medals and the total number of medals awarded to each country, on a new
slide in the presentation.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [6]

© UCLES 2021 0417/12/O/N/21


9

(b) The total number of medals has been calculated manually and entered as a value. This could
lead to errors.

Explain how you could create a formula to calculate the total number of medals awarded for
Italy, using only the mouse.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [4]

(c) Explain how the data could be sorted by the total number of medals won by each country.
The country with the largest number of medals should be at the top of the list.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [4]

© UCLES 2021 0417/12/O/N/21 [Turn over


10

9 Identify and describe the three web development layers.

1 .......................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

2 .......................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

3 .......................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................
[6]

© UCLES 2021 0417/12/O/N/21


11

10 A school is planning to change the way it reports back to parents about their child’s academic
progress. They plan to produce a mail merged document and then email this to parents.

They have created a spreadsheet which shows the pupil’s name, target, attainment and effort
levels for Maths and the Science subjects.

Part of the spreadsheet is shown.

A B C D E F G H I J K
1 Name Target level Maths Biology Chemistry Physics
2 Attainment Effort Attainment Effort Attainment Effort Attainment Effort
3 Ahmal Wulandan 6 7 2 6 2 8 1 7 2
4 Nurul Prakoso 8 7 3 7 3 9 1 7 2
5

(a) Design a suitable document layout to display the information of one pupil. The name of the
pupil must be clearly shown separated from the rest of the data. It must have appropriate
spacing. Do not include the pupil’s data.

[6]

(b) The attainment levels range from 1 to 9 and the effort levels range from 1 to 3. Before teachers
are allowed to enter data, the spreadsheet needs to be tested.

Write down one example of extreme data to test the attainment field and one example of
abnormal data to test the effort field.

Attainment – extreme data .......................................................................................................

Effort – abnormal data ..............................................................................................................


[2]

© UCLES 2021 0417/12/O/N/21 [Turn over


12

(c) Describe four advantages of using a mail merge for this document.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................

3 ................................................................................................................................................

...................................................................................................................................................

4 ................................................................................................................................................

...................................................................................................................................................
[4]

(d) When the mail merge is created, a special field containing the date needs to be added. This
date will change automatically each time the merged document is sent or printed.

Explain how the date field can be added.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [3]

© UCLES 2021 0417/12/O/N/21


13

11 An air-conditioning system has been fitted in a hotel bedroom. The air-conditioning system will
contain fans which operate at varying speeds.

Identify the devices used in the system from the descriptions given.

(a) This device captures the temperature from the room.

............................................................................................................................................. [1]

(b) This device changes the data from the microprocessor into a form that can change the speed
of the fan.

............................................................................................................................................. [1]

(c) This output device operates the fan.

............................................................................................................................................. [1]

12 Discuss the disadvantages of policing the internet.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

.................................................................................................................................................... [6]

© UCLES 2021 0417/12/O/N/21 [Turn over


14

13 The internet has both moderated and unmoderated forums.

Explain what is meant by a moderated forum.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

.................................................................................................................................................... [4]

14 Students in Tawara College are using the internet to find information for a project. They have been
told that the college has a firewall.

(a) Explain what is meant by a firewall and why it is used.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [6]

© UCLES 2021 0417/12/O/N/21


15

The students visit different websites to get information for their project.

(b) Explain why it is not always easy for the students to find reliable information on the internet.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [4]

© UCLES 2021 0417/12/O/N/21


16

BLANK PAGE

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.

Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of
Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge.

© UCLES 2021 0417/12/O/N/21


Cambridge IGCSE™

INFORMATION & COMMUNICATION TECHNOLOGY 0417/12


Paper 1 Theory October/November 2021
MARK SCHEME
Maximum Mark: 100

Published

This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.

Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.

Cambridge International will not enter into discussions about these mark schemes.

Cambridge International is publishing the mark schemes for the October/November 2021 series for most
Cambridge IGCSE™, Cambridge International A and AS Level components and some Cambridge O Level
components.

This document consists of 9 printed pages.

© UCLES 2021 [Turn over


0417/12 Cambridge IGCSE – Mark Scheme October/November
PUBLISHED 2021

Generic Marking Principles

These general marking principles must be applied by all examiners when marking candidate answers.
They should be applied alongside the specific content of the mark scheme or generic level descriptors
for a question. Each question paper and mark scheme will also comply with these marking principles.

GENERIC MARKING PRINCIPLE 1:

Marks must be awarded in line with:

• the specific content of the mark scheme or the generic level descriptors for the question
• the specific skills defined in the mark scheme or in the generic level descriptors for the question
• the standard of response required by a candidate as exemplified by the standardisation scripts.

GENERIC MARKING PRINCIPLE 2:

Marks awarded are always whole marks (not half marks, or other fractions).

GENERIC MARKING PRINCIPLE 3:

Marks must be awarded positively:

• marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit
is given for valid answers which go beyond the scope of the syllabus and mark scheme,
referring to your Team Leader as appropriate
• marks are awarded when candidates clearly demonstrate what they know and can do
• marks are not deducted for errors
• marks are not deducted for omissions
• answers should only be judged on the quality of spelling, punctuation and grammar when these
features are specifically assessed by the question as indicated by the mark scheme. The
meaning, however, should be unambiguous.

GENERIC MARKING PRINCIPLE 4:

Rules must be applied consistently, e.g. in situations where candidates have not followed
instructions or in the application of generic level descriptors.

GENERIC MARKING PRINCIPLE 5:

Marks should be awarded using the full range of marks defined in the mark scheme for the question
(however; the use of the full mark range may be limited according to the quality of the candidate
responses seen).

GENERIC MARKING PRINCIPLE 6:

Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should
not be awarded with grade thresholds or grade descriptors in mind.

© UCLES 2021 Page 2 of 9


0417/12 Cambridge IGCSE – Mark Scheme October/November
PUBLISHED 2021

Question Answer Marks

1(a) Two from: 2

Touchscreen
Touchpad
Webcam
Microphone
Keyboard

1(b) Two from: 2

Compilers
Linkers
Device drivers
Operating systems
Utilities

Question Answer Marks

2 4
3D Dot Laser
matrix

This printer is an impact printer 

This printer uses toner 

This printer uses an inked ribbon 

This printer uses tomography 

Question Answer Marks

3(a) Two from: 2

Can be more expensive to run if the internet is accessed by mobile data


networks
Touch screen can be more error prone when typing the data
Laptop computers support more file formats
Does not have a physical keyboard therefore more difficult to type
Has a smaller screen therefore can be more difficult to read

3(b) Two from: 2

Streaming music from the internet


Sent by Bluetooth from another device
Plugging in an optical device/flash drive/HDD/SSD
Downloading music from the cloud
Direct input using a microphone
Sent by email attachment

© UCLES 2021 Page 3 of 9


0417/12 Cambridge IGCSE – Mark Scheme October/November
PUBLISHED 2021

Question Answer Marks

4(a) Switch 1

4(b) Hub 1

4(c) Router 1

4(d) Bridge 1

Question Answer Marks

5 Six from: 6

Change default name/usernames and passwords on the router


Change the default privacy//use a strong privacy setting
Disable features not in use
Use strong WiFi encryption
Separate the IoT from the home WiFi account
Keep software/hardware up to date
Avoid public WiFi networks
Ensure firewall is operational
Use anti-spyware/up to date anti-virus
Use strong passwords
Use unique passwords for each device
Change passwords regularly

Question Answer Marks

6 Health problem: 8
Award one mark for each problem identified
I can reduce Carpel Tunnel Syndrome
I can reduce Cubital Tunnel Syndrome
I can reduce neck/back pain

Strategies:
Max six strategies
Take frequent breaks
Use hand exercises
Not pressing the keyboard too hard
Use software to reduce the pressure on the keys
Use voice recognition/microphone
Use predictive text//shortcuts
Use ergonomic keyboards
Use a wrist rest
Lift the wrists up when typing
Maintain a correct posture

© UCLES 2021 Page 4 of 9


0417/12 Cambridge IGCSE – Mark Scheme October/November
PUBLISHED 2021

Question Answer Marks

7(a) Two from: 2

Menu of different types of cars


Shopping basket in which to place bought items
Login for username and password
Create a customised car
Calculates the price
Checkout page for creating the order

7(b) Six from: 6

Benefits:
Fewer staff/fewer shops therefore reduced overheads/lower costs
The company can better target customers
Updated more often
Cheaper to publicise special offers rather than mail shots
More special offers can be offered as lower overheads
Broader customer base
Operates 24/7
The customer can see immediately if the car is available
Can be used from any location
Saves cost/time of travelling to the showroom

Drawbacks:
Expensive due to the cost of setting up the website
Expensive due to the cost of maintaining the website
Expensive due to the need to re-train staff
Internet access is needed by the customer
Purchasing mistakes can be more easily made
Mistakes are more difficult to rectify due to the speed of operation
May be difficult to use as help is not as convenient
If the system crashes during the purchase the car may not be bought
The customer may experience internet/network problems
Cannot test drive the car
The pictures of the car may not be the same as the actual car

To gain full marks there must be at least one benefit and one drawback

7(c) Four from: 4

Module testing tests the operation of each module


Modules are tested separately
Module testing tests the relationships between each module
Module testing tests the data passing into and out of the modules
Easier to find errors in module testing
Whole system testing is carried out after module testing
Whole system testing checks that the system works as it is supposed
to//matches the user requirements
Whole system tests the combined modules

© UCLES 2021 Page 5 of 9


0417/12 Cambridge IGCSE – Mark Scheme October/November
PUBLISHED 2021

Question Answer Marks

8(a) Max four from: 6

Open spreadsheet
Load the file
Select B3 to C13
Then hold CTRL and select F3 to F13
Click insert then click bar chart/graph
Select the format/type of chart/graph
Highlight the chart/graph
Copy the bar chart/graph

Max four from:

Open the presentation software


Add a new slide
Click on new slide
Paste the bar chart/graph
Add titles/legend/axes labels
Save the file

8(b) Four from: 4

Click on the cell F4


Select formulas
Click Autosum/Σ
Check the correct range has been highlighted/highlight/drag C4 to E4
Click 

8(c) Four from: 4

Highlight B3 to F13
Click Data then Sort
Select data has headers
Sort by Total/Column F
Select Largest to smallest/Descending/Z to A
Click OK/enter

Question Answer Marks

9 Three matched pairs from: 6

Content layer
Content can consist of text or images

Presentation layer
This layer is defined by the CSS or styles to indicate how elements are
displayed

Behaviour layer
This layer of a web page allows interaction

© UCLES 2021 Page 6 of 9


0417/12 Cambridge IGCSE – Mark Scheme October/November
PUBLISHED 2021

Question Answer Marks

10(a) Six from: 6

Name is clearly shown at the top of the data


Name must be on a line on its own
Information fills the report – Is there a large space at the bottom or side; use
professional judgement
Suitable title at the top of the page above the name – title must relate
academic progress/report
Must be a mail merge template or a document, a letter

The exact wording must be used for the following


Target level
All four subjects: Maths, Biology, Chemistry and Physics
Attainment and Effort

10(b) Attainment: 1 or 9 2
Effort: less than 1/greater than 3/decimal number/symbol/text

10(c) Four from: 4

Faster than editing each individual letter


Fewer errors than retyping the data
More consistency in the reports
Error checking only needs to be carried out once on the data and the template
Reduces the time taken to type out all the reports separately

10(d) Three from: 3

Click on place where date is to be added


Click on Insert field
Click on Quick Parts then Field
Click on Date
Select the format
Tick update automatically/automated date
Click OK

Question Answer Marks

11(a) Sensor 1

11(b) Digital to Analogue Convertor/DAC 1

11(c) Actuator/motor 1

© UCLES 2021 Page 7 of 9


0417/12 Cambridge IGCSE – Mark Scheme October/November
PUBLISHED 2021

Question Answer Marks

12 These are points they will need to be expanded upon to gain the mark 6

Six from:

Removes freedom of speech


International therefore would be difficult to police
Laws are different in each country/state
The dark net would increase
Electronic crimes would move away from the internet to other places, making
them harder to intercept
Internet users can be anonymous therefore it will be difficult to track down
Who chooses what is blocked could affect day to day browsing
Concern that everything you do is being watched therefore privacy is lost
Could be breaches in sending/receiving confidential/personal data as others
could not see it
Increase in cost of security
Reduction in speed of browsing/search
Could lead to corruption/bribery//police may use the data
No one owns the internet so it would be impossible to police effectively
Very expensive to police the internet as extra police force has to be set up
As the internet it so big it is hard to keep track on all the activity
As the internet is dynamic it would be impossible to check everything

Question Answer Marks

13 Four from: 4

Online discussion forum/social platform/website


Where the posts are controlled/monitored by an administrator
Those that break the rules are banned
Filters out inappropriate posts
Moderated forums have rules/policy

© UCLES 2021 Page 8 of 9


0417/12 Cambridge IGCSE – Mark Scheme October/November
PUBLISHED 2021

Question Answer Marks

14(a) Two from: 6

Could be hardware or software


Sits between the computer/network and the router
Filters/controls/monitors data/traffic coming in and out of the college network

Four from:

Checks whether the data passing through it meets a given set of rules
Blocks data that does not satisfy the rules
Alerts user about unwanted data
Can log all incoming and outgoing data/traffic to check later
Can prevent/block access to undesirable/inappropriate websites/IP addresses
Keeps a list of undesirable IP addresses
Can prevent hackers gaining access to the system
Can send out warnings
Can block the unwanted traffic in and out of the network
Keeps a list of desirable IP addresses/websites
It can block IP addresses

14(b) Four from: 4

Anyone can post information on the internet


Websites may contain incorrect information
Any information found will need to be checked against reliable sources
Similar websites may have conflicting data on the same topic
The search engines tend to be generalised
Search engines do not necessarily give the most reliable searches at the top
of the list//paying to have information at the top of the list
Data on the website could be out of date

© UCLES 2021 Page 9 of 9


Cambridge IGCSE™
* 5 8 2 3 9 8 9 1 4 7 *

INFORMATION AND COMMUNICATION TECHNOLOGY 0417/13


Paper 1 Theory October/November 2021

2 hours

You must answer on the question paper.

No additional materials are needed.

INSTRUCTIONS
● Answer all questions.
● Use a black or dark blue pen.
● Write your name, centre number and candidate number in the boxes at the top of the page.
● Write your answer to each question in the space provided.
● Do not use an erasable pen or correction fluid.
● Do not write on any bar codes.
● You may use an HB pencil for any diagrams, graphs or rough working.

INFORMATION
● The total mark for this paper is 100.
● The number of marks for each question or part question is shown in brackets [ ].
● No marks will be awarded for using brand names of software packages or hardware.

This document has 20 pages. Any blank pages are indicated.

DC (CE/FC) 203095/3
© UCLES 2021 [Turn over
2

1 A tablet computer has input and output devices.

(a) Give two examples of input devices which are part of a tablet computer.

1 ................................................................................................................................................

2 ................................................................................................................................................
[2]

(b) Give two examples of output devices which are part of a tablet computer.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................
[2]

2 MICR, OCR and OMR are examples of recognition systems.

Tick (3) the most appropriate recognition system which relates to the following statements.

MICR OCR OMR


(3) (3) (3)
This system magnetises the special
characters on cheques in order to read
them

This method is used to read car number


plates

A bar code is an example of this system

If the media from this system is


photocopied it cannot be read by the
recognition system
[4]

© UCLES 2021 0417/13/O/N/21


3

3 (a) Identify two applications that use expert systems.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................
[2]

(b) Identify three components found in an expert system.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................

3 ................................................................................................................................................

...................................................................................................................................................
[3]

© UCLES 2021 0417/13/O/N/21 [Turn over


4

4 A library system has two tables; one for borrowers and one for books. Extracts from these tables
are shown.

Borrower_ID Borrower_name Contact_telephone Contact_email


5404 Susan Stranks 01632 960321 rockit@cambridgeinternational.org
9867 Fei Hong Zhao 07700 900222 tawara@cambridgeinternational.org

Borrowers table

Book_ID ISBN Name_of_book Author_of_book Date_published Borrower_ID Date_due_back

1 0859550153 Bird of Prey David James 1977 5404 27/10/2021

34 3301028345 The Fifth Man Colin Turner 1998 9324 05/10/2021

35 4237681321 A View of the Temple Yu Yan Zhang 2017 8854 07/10/2021

59 4237681321 A View of the Temple Yu Yan Zhang 2017 5404 27/10/2021

Books table

(a) Name the most appropriate validation check for each of these fields. Your answer must be
different for each field.

ISBN .........................................................................................................................................

Date_due_back ........................................................................................................................
[2]

(b) (i) For the books table, name the most appropriate field that could be used as a primary
key.

..................................................................................................................................... [1]

(ii) The librarian has created a relationship between the books table and the borrowers
table.

For the books table, name the most appropriate foreign key field that would be used to
create the relationship.

..................................................................................................................................... [1]

© UCLES 2021 0417/13/O/N/21


5

(c) The data type for Contact_telephone has been set as text.

Explain why this field has been set to text rather than integer.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

(d) At the end of each day the tables are searched to issue reminders to borrowers about books
that are overdue.

Describe the automatic processing involved in searching and issuing of reminders for overdue
books.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [6]

© UCLES 2021 0417/13/O/N/21 [Turn over


6

5 Keeping data secure is very important in any computer system. Many organisations use encryption
when sending data.

(a) Describe the term encryption.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [4]

(b) Another way of protecting data in a computer system is to use passwords.

Identify methods to prevent hackers from gaining knowledge of someone’s password.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [4]

© UCLES 2021 0417/13/O/N/21


7

6 The internet has both moderated and unmoderated forums.

Explain what is meant by an unmoderated forum.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

.................................................................................................................................................... [4]

© UCLES 2021 0417/13/O/N/21 [Turn over


8

7 Many customers now use contactless payment and internet banking.

(a) Describe the computer processing involved in using contactless bank cards to pay for
purchases.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [4]

Fewer and fewer customers now use high street banks, preferring to bank online using the internet.

(b) Discuss the advantages and disadvantages of internet banking for the customer.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [6]

© UCLES 2021 0417/13/O/N/21


9

Transactions with the bank’s website use a variety of technologies including SSL.

(c) Explain what is meant by SSL. Include in your answer why SSL is used.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [3]

(d) The web address of the bank is:

https://www.tawarabank.com

Describe the following parts of the web address.

https:// .......................................................................................................................................

...................................................................................................................................................

tawarabank ...............................................................................................................................

...................................................................................................................................................

.com ..........................................................................................................................................

...................................................................................................................................................
[3]

© UCLES 2021 0417/13/O/N/21 [Turn over


10

8 When a system is being planned, analysis needs to take place.

Questionnaires and interviews are examples of methods of researching existing systems.

Evaluate, by weighing up the advantages and disadvantages, each of these methods.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

.................................................................................................................................................... [6]

9 Rockit Motors has opened a car store in a shopping mall.

Customers can test drive the cars they are planning to purchase using virtual reality systems
within the store.

(a) Name two devices which would be used in this virtual reality system.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................
[2]

© UCLES 2021 0417/13/O/N/21


11

(b) Explain the term virtual reality.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [3]

The manager of Rockit Motors has created many different types of documents including letters
and memos for the company. Each of them is produced using its corporate house style.

(c) Explain why corporate house styles are required.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [4]

© UCLES 2021 0417/13/O/N/21 [Turn over


12

10 Many young people now use social media rather than other forms of communication.

Evaluate your own use of social media and explain any eSafety strategies you could use to help
minimise the potential dangers.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

.................................................................................................................................................... [6]

11 A student has taken a photograph of him and his friend, using a digital camera. He needs to
increase the size of the image to include it on a poster.

(a) Give one disadvantage of increasing the size of this image.

...................................................................................................................................................

............................................................................................................................................. [1]

© UCLES 2021 0417/13/O/N/21


13

(b) He now wishes to edit the image to remove his friend. He edits the image by cropping it and
removing part of the image.

Describe, step by step, how he would crop the image.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [5]

© UCLES 2021 0417/13/O/N/21 [Turn over


14

12 A doctor measures the blood pressure of some of his patients regularly. The patients take home a
blood pressure machine and record their results on a spreadsheet which the doctor has created.
Part of the spreadsheet is shown.

A B C D E F G H I
1 Blood pressure readings Blood pressure warnings
2 Date Sys Dia Warning Sys Dia Warning
3 10-Feb 134 74 Normal 60 40 Low
4 11-Feb 137 67 Normal 120 80 Normal
5 12-Feb 145 81 Mild 140 90 Mild
6 13-Feb 150 86 Mild 160 100 Moderate
7 14-Feb 180 74 Severe 180 110 Severe
8 15-Feb 134 75 Normal
9 16-Feb 130 57 Normal

(a) When a reading produces a Severe or Low warning then the text automatically changes to a
red font on a light red background.

Explain how the doctor could set up automatic colour change for these warnings on the
spreadsheet.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [5]

© UCLES 2021 0417/13/O/N/21


15

The doctor has set up a named range called Bloodpressure for the cells F3 to H7.

(b) Explain why the doctor has used a named range.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [3]

The formula =VLOOKUP(B3,Bloodpressure,3) has been entered into cell D3.

(c) Explain what the formula does.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [4]

© UCLES 2021 0417/13/O/N/21 [Turn over


16

The doctor has created a graph of the readings for one patient and has displayed it on the
spreadsheet. However, there are elements missing.

A B C D E F G H I J K L M
1 Blood pressure readings Blood pressure warnings
2 Date Sys Dia Warning
Chart Title
3 10-Feb 134 74 Normal
4 11-Feb 137 67 Normal 200
180
5 12-Feb 145 81 Mild
160
6 13-Feb 150 86 Mild
140
7 14-Feb 180 74 Severe 120
8 15-Feb 134 75 Normal 100
9 16-Feb 130 67 Normal 80
10 60
11 40
20
12
0
13
09-Feb 10-Feb 11-Feb 12-Feb 13-Feb 14-Feb 15-Feb 16-Feb 17-Feb
14
Sys Dia
15
16

(d) Explain how the doctor created the graph. Write in your answer one improvement that could
be made to the graph.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [3]

© UCLES 2021 0417/13/O/N/21


17

(e) At the end of the month the doctor needs to produce a hard copy document showing
information about a patient: their name, date of birth and patient number, as well as data and
the graph from the spreadsheet.

Design a suitable document layout. The document must have appropriate spacing.

[5]

© UCLES 2021 0417/13/O/N/21


18

BLANK PAGE

© UCLES 2021 0417/13/O/N/21


19

BLANK PAGE

© UCLES 2021 0417/13/O/N/21


20

BLANK PAGE

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.

Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of
Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge.

© UCLES 2021 0417/13/O/N/21


Cambridge IGCSE™

INFORMATION AND COMMUNICATION TECHNOLOGY 0417/13


Paper 1 Theory October/November 2021
MARK SCHEME
Maximum Mark: 100

Published

This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.

Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.

Cambridge International will not enter into discussions about these mark schemes.

Cambridge International is publishing the mark schemes for the October/November 2021 series for most
Cambridge IGCSE™, Cambridge International A and AS Level components and some Cambridge O Level
components.

This document consists of 9 printed pages.

© UCLES 2021 [Turn over


0417/13 Cambridge IGCSE – Mark Scheme October/November
PUBLISHED 2021

Generic Marking Principles

These general marking principles must be applied by all examiners when marking candidate answers.
They should be applied alongside the specific content of the mark scheme or generic level descriptors
for a question. Each question paper and mark scheme will also comply with these marking principles.

GENERIC MARKING PRINCIPLE 1:

Marks must be awarded in line with:

• the specific content of the mark scheme or the generic level descriptors for the question
• the specific skills defined in the mark scheme or in the generic level descriptors for the question
• the standard of response required by a candidate as exemplified by the standardisation scripts.

GENERIC MARKING PRINCIPLE 2:

Marks awarded are always whole marks (not half marks, or other fractions).

GENERIC MARKING PRINCIPLE 3:

Marks must be awarded positively:

• marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit
is given for valid answers which go beyond the scope of the syllabus and mark scheme,
referring to your Team Leader as appropriate
• marks are awarded when candidates clearly demonstrate what they know and can do
• marks are not deducted for errors
• marks are not deducted for omissions
• answers should only be judged on the quality of spelling, punctuation and grammar when these
features are specifically assessed by the question as indicated by the mark scheme. The
meaning, however, should be unambiguous.

GENERIC MARKING PRINCIPLE 4:

Rules must be applied consistently, e.g. in situations where candidates have not followed
instructions or in the application of generic level descriptors.

GENERIC MARKING PRINCIPLE 5:

Marks should be awarded using the full range of marks defined in the mark scheme for the question
(however; the use of the full mark range may be limited according to the quality of the candidate
responses seen).

GENERIC MARKING PRINCIPLE 6:

Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should
not be awarded with grade thresholds or grade descriptors in mind.

© UCLES 2021 Page 2 of 9


0417/13 Cambridge IGCSE – Mark Scheme October/November
PUBLISHED 2021

Question Answer Mark

1(a) Two from: 2

Touchscreen
Camera
Microphone

1(b) Two from: 2

Speakers
Screen

Question Answer Marks

2 4
MICR OCR OMR

This system magnetises the special 


characters on cheques in order to read
them

This method is used to read car 


number plates

A bar code is an example of this 


system

If the media from this system is 


photocopied it cannot be read by the
recognition system

Question Answer Marks

3(a) Two from: 2

Mineral prospecting
Car engine fault diagnosis
Medical diagnosis
Chess games

3(b) Three from: 3

Knowledge base
Rules base
Inference engine
Interactive user interface
Explanation system

© UCLES 2021 Page 3 of 9


0417/13 Cambridge IGCSE – Mark Scheme October/November
PUBLISHED 2021

Question Answer Mark

4(a) ISBN: Check digit 2


Date_due_back: Format check

4(b)(i) Book_ID 1

4(b)(ii) Borrower_ID 1

4(c) Two from: 2

The field is not needed for calculation


Number starts with a zero/+ symbol
May include a space

4(d) Six from: 6

Books table opened


Borrowers table opened
First record is read from the books table
First record is read from the borrowers table
Date_due_back in books table is compared with the current date
If the Date_due_back is after the current date then…
…Move to next record
If the Date_due_back is before or equal to the current date then…
…Contact_email is located
A reminder is generated automatically
The reminder is sent to the borrower
Process continues with next record

Question Answer Marks

5(a) Four from: 4

Scrambling of data
Changes the data into a form that is not understandable
Requires a decryption key/encryption key to decode
Encrypted using a encryption key/code
Changes plain text into cypher text

5(b) Four from: 4

Use anti-spyware to prevent key logging


Change passwords regularly//Do not repeat the same password
Use a different password for each system
Avoid common/predictable patterns as they are easier to guess
Use longer passwords as they are harder to guess
Use strong passwords
Use two-factor authentication so that hackers need both parts
Use a dropdown list for password entry
Use a biometric password
Do not use passwords that directly links to the user
Do not allow webpages/device to remember the password

© UCLES 2021 Page 4 of 9


0417/13 Cambridge IGCSE – Mark Scheme October/November
PUBLISHED 2021

Question Answer Mark

6 Four from: 4

Online discussion forum/social platform/website


Do not have an administrator
Posts are not controlled/monitored
Relies on a voluntary code from its users
People write what they want
There are no rules//Users cannot be barred for what they write

Question Answer Marks

7(a) Four from: 4

The reader checks the amount to pay is less than the contactless limit
The seller’s bank's computer contacts the customer’s bank's computer
The card is checked if it is valid
An authorisation code is sent to the seller
The price of the purchase is deducted from the customer’s account
Transferred to the seller’s account
Message sent asking ‘do you require a receipt’
Receipt is sent to the printer
If valid/enough money the transaction continues
If not valid/enough money the transaction is terminated

7(b) Six from: 6

Advantages
Saves time rather than travelling to the bank/waiting in queues
Saves cost of travelling to the bank
Customers can use international banks which could have better interest rates
Better interest rates than physical banks
Safer less likely to get mugged/robbed
Operates 24/7
Can be used from any location

Disadvantages
Easier to press the wrong button and lose money
Online security issues more of a concern
Cannot deposit/withdraw cash
Internet connection is required
Mistakes are more difficult to rectify due to the speed of operation
The customer may experience internet/network problems

To gain full marks there must be at least one advantage and one
disadvantage

© UCLES 2021 Page 5 of 9


0417/13 Cambridge IGCSE – Mark Scheme October/November
PUBLISHED 2021

Question Answer Mark

7(c) Two from: 3

Secure Socket Layer


Communication protocol
Security technology
Encrypted link…
…between the server and the client

Ensures all data remains private – 1 mark

7(d) https:// 3

One from:

This is the hypertext transfer protocol secure // ensures site is secure


Set of rules//protocol

tawarabank
This shows the domain name/company name that the company have
purchased

.com
The company/domain is registered in multiple countries/USA

Question Answer Marks

8 Six from: 6

Quicker method of answering the questions for questionnaires


Questionnaires can be completed in the respondents own time whereas
interviews have to be undertaken at a set time
In interviews need to pay for time off work/employing an interviewer which is
expensive
Respondents can remain anonymous on questionnaires whereas interview
they cannot
Analysis of the results can be quicker with questionnaires
With interviews the interviewer can direct the questions to give answers they
want
People tend not to hand questionnaires back as they can be anonymous
Inflexible in the answers on questionnaires whereas interviews allow for
expansion on the answers from the previous question
If the respondent gets stuck with a question, there is no easy way to ask for
clarification in questionnaires
If they do not understand the question then they may answer differently to
what was needed in questionnaires
In questionnaires questions cannot be modified whereas interviews can add
extra questions or go into more depth
The analysis of the data in a questionnaire can be displayed easier/graphed
Both can gather information that can be used for later analysis
Both methods may not be answered honestly

© UCLES 2021 Page 6 of 9


0417/13 Cambridge IGCSE – Mark Scheme October/November
PUBLISHED 2021

Question Answer Mark

9(a) Two from: 2

Headset/head mounted displays/HMD


Data goggles
Steering wheel
Large monitor/screen/projector
Surround Speakers

9(b) Three from: 3

A computer-generated simulation
Uses a three-dimensional environment
Can be interacted within a real or physical way
The equipment is fitted with sensors

9(c) Four from: 4

Ensures consistency across all documents


Lets people know that the stationery/documents belong to the same Motor
company
Easier to recognise documents from the same company
To reduce the time spent in setting up and formatting documents
To reduce cost of setting up and formatting documents
To reduce the risk of errors e.g. misspellings, logos omitted, etc.

© UCLES 2021 Page 7 of 9


0417/13 Cambridge IGCSE – Mark Scheme October/November
PUBLISHED 2021

Question Answer Mark

10 Problem: 6

Award a mark for each problem identified


Max four from:
If I receive requests from unwanted users/people I do not know
If I get approached from people I do not know
If I receive unwanted and abusive messages
If I wish to post images of myself on the social media site
When talking to people on social media
If someone tells me private and personal information about themselves

Strategies
Max five from:
I never arrange to meet them alone/take a chaperone
I always tell a responsible adult if I plan to meet someone
I always meet in a public place
I always chat to them in the main room
I avoid giving away personal information
I block them and report them
I report the sender of the messages
I avoid publishing inappropriate images/videos
I avoid showing images of myself in school uniform
I always use appropriate language/content
I respect other people’s confidentiality
Make your account private
I only follow friends
I do not post my location until I have left it

Question Answer Marks

11(a) One from: 1

Can cause pixelation


Lose some of the resolution/image quality reduced

11(b) Five from: 5

Open graphics/image editing software


Load/import the image
Select the image
Click crop
Click an edge/crop handle of the image
Click and drag the edge/crop handle inwards …
…until cropped area appears
Click done/finish
Save the image

© UCLES 2021 Page 8 of 9


0417/13 Cambridge IGCSE – Mark Scheme October/November
PUBLISHED 2021

Question Answer Mark

12(a) Five from: 5

Highlight Column D
Select Conditional Formatting
Select Highlight Cell Rules
Select Equal to
Type in the Equal to box…Severe/Low
Click on Format
Select/Set the red font on light red background
Repeat the process for Low/Severe

12(b) Three from: 3

Removes the confusion over absolute and relative referencing


Reduces the issues involved in changing the range
Easier to understand the formula
Easier to check for errors in the formula
Easier to enter the formula//Less errors in entering the formula
Faster to write the name than to select the range

12(c) Looks up the value of B3 4


Looks in the named range Bloodpressure
Returns the corresponding value
from the 3rd column

12(d) Two from: 3

Highlight A2 to C9
Click Insert
Select table…Click Chart
Select 2D line chart/select type of graph

One from:

Add a chart title


Add axis title
Remove 09-Feb/17-Feb as not needed

12(e) Five from: 5

Include Name, Date of birth


Include Patient Number
Graph is displayed
Must look like a hard copy report
Fills the report
Suitable title at the top of the page title must relate to blood pressure readings

© UCLES 2021 Page 9 of 9



Cambridge IGCSE

INFORMATION AND COMMUNICATION TECHNOLOGY 0417/12


*4639429146*

Paper 1 Theory February/March 2022


2 hours

You must answer on the question paper.

No additional materials are needed.

INSTRUCTIONS
• Answer all questions.
• Use a black or dark blue pen.
• Write your name, centre number and candidate number in the boxes at the top of the page.
• Write your answer to each question in the space provided.
• Do not use an erasable pen or correction fluid.
• Do not write on any bar codes.
• You may use an HB pencil for any diagrams, graphs or rough working.

INFORMATION
• The total mark for this paper is 100.
• The number of marks for each question or part question is shown in brackets [ ].
• No marks will be awarded for using brand names of software packages or hardware.

This document has 16 pages. Any blank pages are indicated.

03_0417_12_2022_1.13
© UCLES 2022 [Turn over
2

1 A tablet computer consists of both hardware and software.

(a) Define the term hardware.

...........................................................................................................................................

........................................................................................................................................... [1]

(b) One input device used on a tablet computer is a touch screen.

Name two other input devices built into a tablet computer.

1 ........................................................................................................................................

2 ........................................................................................................................................

[2]

(c) Write down two examples of system software.

1 ........................................................................................................................................

2 ........................................................................................................................................

[2]

2 Circle two items that contain personal data.

bank card bar code laser printer

medical record mouse sensor

[2]

© UCLES 2022 03_0417_12_2022_1.13


3

3 The internal memory of a computer consists of both ROM and RAM.

(a) Describe the terms ROM and RAM.

ROM .................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

RAM ..................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

[4]

(b) Modern laptop computers use Solid State Drives (SSD) rather than Hard Disk Drives (HDD).

State three advantages of using SSDs rather than HDDs in a laptop computer.

1 ........................................................................................................................................

...........................................................................................................................................

2 ........................................................................................................................................

...........................................................................................................................................

3 ........................................................................................................................................

...........................................................................................................................................

[3]

© UCLES 2022 03_0417_12_2022_1.13 [Turn over


4

4 Tick (✓) whether the following statements refer to control, measurement or modelling systems.

Only tick (✓) one answer for each statement.

control measurement modelling


(✓) (✓) (✓)
Maintaining the growing conditions in a
glasshouse

Aircraft flight simulation

Monitoring the pollution in a river

Using what-ifs

[4]

5 The World Wide Web (WWW) is often mistaken for the internet.

(a) Explain the differences between the WWW and the internet.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [4]

© UCLES 2022 03_0417_12_2022_1.13


5

(b) The web address for Cambridge IGCSE is:

https://www.cambridgeinternational.org/IGCSE

Describe the following parts of the web address.

https:// ...............................................................................................................................

...........................................................................................................................................

cambridgeinternational .....................................................................................................

...........................................................................................................................................

.org ...................................................................................................................................

...........................................................................................................................................

/IGCSE .............................................................................................................................

...........................................................................................................................................

[4]

6 Global Positioning Systems (GPS) are used for many different applications.

(a) Describe how GPS is used by a smartphone to pinpoint its location.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [4]

© UCLES 2022 03_0417_12_2022_1.13 [Turn over


6

(b) Give three other examples of the use of GPS.

1 ........................................................................................................................................

...........................................................................................................................................

2 ........................................................................................................................................

...........................................................................................................................................

3 ........................................................................................................................................

...........................................................................................................................................

[3]

© UCLES 2022 03_0417_12_2022_1.13


7

7 Tawara School is presenting a concert. For previous concerts the booking of tickets was carried
out manually using pen and paper.

For this concert they are going to use an online booking system.

(a) Discuss the advantages and disadvantages of Tawara School using an online booking system
rather than the manual system.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [8]

(b) Identify the most appropriate method of implementation of the new online booking system in
this scenario.

........................................................................................................................................... [1]

© UCLES 2022 03_0417_12_2022_1.13 [Turn over


8

(c) Explain, giving reasons, why your answer to part (b) is the most appropriate method of
implementation for this scenario.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [3]

8 Describe the advantages and disadvantages of using a smartphone rather than a laptop computer
to access the internet.

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

.................................................................................................................................................. [6]

© UCLES 2022 03_0417_12_2022_1.13


9

9 The introduction of computers into the work place has affected job patterns.

(a) Explain what is meant by part-time working.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [2]

(b) Explain what is meant by compressed hours working.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [2]

(c) Employees working in an office use computers for prolonged periods of time.

Describe three items that an employee should be provided with to help reduce the health
problems related to prolonged use of computers.

1 ........................................................................................................................................

...........................................................................................................................................

2 ........................................................................................................................................

...........................................................................................................................................

3 ........................................................................................................................................

...........................................................................................................................................

[3]

© UCLES 2022 03_0417_12_2022_1.13 [Turn over


10

(d) The office must be a safe working environment.

State two physical safety issues that might exist from the introduction of computers.

1 ........................................................................................................................................

...........................................................................................................................................

2 ........................................................................................................................................

...........................................................................................................................................

[2]

10 A touch screen is both an input device and an output device. Touch screens are used on many
devices. A tablet computer uses a touch screen.

Describe the advantages and disadvantages of using a touch screen rather than a monitor and
keyboard for the tablet computer.

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

.................................................................................................................................................. [6]

© UCLES 2022 03_0417_12_2022_1.13


11

11 When creating an ICT solution, the legal, moral, ethical and cultural implications have to be
considered.

Choose the most appropriate implication that matches the descriptions given below.

(a) Ensuring that copyright laws have been followed.

........................................................................................................................................... [1]

(b) Not giving information about the ICT solution to another company.

........................................................................................................................................... [1]

12 The manager of a car garage has asked a systems analyst to create a new database system for
the checking of cars making sure they are safe to drive. The checking of cars is known as a service.

Each car has a unique licence plate.

The cars can either be powered by electric or petrol.

Cars are serviced every 10000 km, for example 10000 km, 20000 km.

The minimum cost of the service is 1500 rupees and the maximum is 5000 rupees depending on
the model of car.

Different models of car are serviced.

The date of the service is agreed.

(a) Complete this table, filling in the field names and the most appropriate data types to create
the database using the information given above. For any numeric field, specify the type of
number.

Field name Data type

Vehicle_licence_plate

Powered_by

Numeric:integer

Cost_of_service

Text

Date_of_service

[6]

© UCLES 2022 03_0417_12_2022_1.13 [Turn over


12

(b) The systems analyst is planning to create a relational database.

Discuss the advantages and disadvantages of creating a relational database rather than a flat
file database.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [6]

© UCLES 2022 03_0417_12_2022_1.13


13

(c) For each of the fields shown, name and describe one validation check that could be used on
the data. Your answers must be different in each case.

(i) Vehicle_licence_plate

Validation check ....................................................................................................

Description ............................................................................................................

................................................................................................................................

[2]

(ii) Cost_of_service

Validation check ....................................................................................................

Description ............................................................................................................

................................................................................................................................

[2]

(iii) Date_of_service

Validation check ....................................................................................................

Description ............................................................................................................

................................................................................................................................

[2]

13 A family has a number of different devices connected to the internet.

(a) Identify three items of computer hardware that may need to be purchased in order to set up
a computer network so the devices can use the internet.

1 ........................................................................................................................................

2 ........................................................................................................................................

3 ........................................................................................................................................

[3]

© UCLES 2022 03_0417_12_2022_1.13 [Turn over


14

(b) Arjun is a member of the family. He uses the internet to carry out research and send work to
his office.

Describe three other ways he could make appropriate use of the internet.

1 ........................................................................................................................................

...........................................................................................................................................

2 ........................................................................................................................................

...........................................................................................................................................

3 ........................................................................................................................................

...........................................................................................................................................

[3]

(c) Arjun uses the internet to carry out research for his work.

Describe two drawbacks of Arjun using the internet for research.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [2]

© UCLES 2022 03_0417_12_2022_1.13


15

(d) Arjun can log directly into his office system from his home computer. The office system only
requires users to enter their user id and a password.

(i) Explain why this is not very secure.

................................................................................................................................

................................................................................................................................

................................................................................................................................

................................................................................................................................ [2]

(ii) Describe two other ways the office system could identify the user securely.

1 ............................................................................................................................

................................................................................................................................

................................................................................................................................

................................................................................................................................

2 ............................................................................................................................

................................................................................................................................

................................................................................................................................

................................................................................................................................

[4]

© UCLES 2022 03_0417_12_2022_1.13


16

BLANK PAGE

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable
effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will
be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge Assessment
International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at
www.cambridgeinternational.org after the live examination series.

Cambridge Assessment International Education is part of Cambridge Assessment. Cambridge Assessment is the brand name of the University of Cambridge Local
Examinations Syndicate (UCLES), which is a department of the University of Cambridge.

© UCLES 2022 03_0417_12_2022_1.13


Cambridge IGCSE™

INFORMATION AND COMMUNICATION TECHNOLOGY 0417/12


Paper 1 Theory February/March 2022
MARK SCHEME
Maximum Mark: 100

Published

This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.

Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.

Cambridge International will not enter into discussions about these mark schemes.

Cambridge International is publishing the mark schemes for the February/March 2022 series for most
Cambridge IGCSE™, Cambridge International A and AS Level components and some Cambridge O Level
components.

This document consists of 10 printed pages.

© UCLES 2022 [Turn over


0417/12 Cambridge IGCSE – Mark Scheme February/March 2022
PUBLISHED

Generic Marking Principles

These general marking principles must be applied by all examiners when marking candidate answers.
They should be applied alongside the specific content of the mark scheme or generic level descriptors
for a question. Each question paper and mark scheme will also comply with these marking principles.

GENERIC MARKING PRINCIPLE 1:

Marks must be awarded in line with:

• the specific content of the mark scheme or the generic level descriptors for the question
• the specific skills defined in the mark scheme or in the generic level descriptors for the question
• the standard of response required by a candidate as exemplified by the standardisation scripts.

GENERIC MARKING PRINCIPLE 2:

Marks awarded are always whole marks (not half marks, or other fractions).

GENERIC MARKING PRINCIPLE 3:

Marks must be awarded positively:

• marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit
is given for valid answers which go beyond the scope of the syllabus and mark scheme,
referring to your Team Leader as appropriate
• marks are awarded when candidates clearly demonstrate what they know and can do
• marks are not deducted for errors
• marks are not deducted for omissions
• answers should only be judged on the quality of spelling, punctuation and grammar when these
features are specifically assessed by the question as indicated by the mark scheme. The
meaning, however, should be unambiguous.

GENERIC MARKING PRINCIPLE 4:

Rules must be applied consistently, e.g. in situations where candidates have not followed
instructions or in the application of generic level descriptors.

GENERIC MARKING PRINCIPLE 5:

Marks should be awarded using the full range of marks defined in the mark scheme for the question
(however; the use of the full mark range may be limited according to the quality of the candidate
responses seen).

GENERIC MARKING PRINCIPLE 6:

Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should
not be awarded with grade thresholds or grade descriptors in mind.

© UCLES 2022 Page 2 of 10


0417/12 Cambridge IGCSE – Mark Scheme February/March 2022
PUBLISHED

Question Answer Marks

1(a) Physical components of a computer system 1

1(b) Two from: 2


Microphone
Camera
Sensors

1(c) Two from: 2


Compiler
Linker
Operating system
Utilities
Device driver
Interpreter

Question Answer Marks

2 Bank card 2
Medical record

Question Answer Marks

3(a) Four from: 4


ROM
Read Only Memory
Non-volatile//Data is not lost when the computer is switched off
Used to store the startup instructions/BIOS

RAM
Random Access Memory
Volatile//Data is lost when the computer is turned off
Stores the current running program/instruction
RAM can be written to and read from

To gain full marks the description must have correct answers for both
ROM and RAM

3(b) Three from: 3


The startup of the laptop is faster
SSDs consume less power than HDD so conserves battery power
Reduces the weight of the laptop as SSD is lighter
Makes the laptop more compact

© UCLES 2022 Page 3 of 10


0417/12 Cambridge IGCSE – Mark Scheme February/March 2022
PUBLISHED

Question Answer Marks

4 4
Control Measurement Modelling

Maintaining the
growing conditions 
in a glasshouse

Aircraft flight simulation 

Monitoring the

pollution in a river

Using What-ifs 

Question Answer Marks

5(a) Four from: 4


WWW is a collection of information pages/websites/web pages
WWW is part of the internet
WWW is accessed through the internet
WWW is a service on the internet

Internet is a global network of networks/Wide Area Network


Internet is the infrastructure

To gain full marks the description must have correct answers for both
WWW and the internet

5(b) https:// 4
One from:
This is the hypertext transfer protocol secure
Set of rules/protocol to transfer web pages securely

cambridgeinternational
The domain name

.org
One from:
The top-level domain name
Registered as an organisation

/IGCSE
The folder/sub-directory in which the work is stored on Cambridge
International’s server

© UCLES 2022 Page 4 of 10


0417/12 Cambridge IGCSE – Mark Scheme February/March 2022
PUBLISHED

Question Answer Marks

6(a) Four from: 4


The location of the smartphone is calculated using GPS software
Signal is transmitted by the satellite
Signal is sent almost continuously
The data is saved in the smartphone
The coordinates of the smartphone are shown on the smartphone screen

6(b) Three from, for example: 3


Real time aircraft/ship/drone position
Tracking delivery/stolen vehicles
Ploughing fields
Surveying
Military
Sat-nav in vehicle to reach a destination

Question Answer Marks

7(a) Eight from: 8


Advantages
Prevents double booking/overbooking
The booking staff can see immediately if the concert is fully booked
Bookings can be made 24×7
Usually cheaper as lower/fewer overheads
Booking staff can more easily see the seats that are available

Disadvantages
Requires the school to purchase expensive hardware
Setting up is more expensive
Maintenance is more expensive
Internet access is needed to run the booking system therefore the cost may
be increased
More reliant on hardware

To gain full marks the discussion must have correct answers for both
advantages and disadvantages

7(b) Direct changeover 1

7(c) Three from: 3


Benefits are immediate
Cheaper as there is only one set of staff
Less chance of the new system being faulty as it is thoroughly tested
Only one system in operation therefore data is not duplicated

© UCLES 2022 Page 5 of 10


0417/12 Cambridge IGCSE – Mark Scheme February/March 2022
PUBLISHED

Question Answer Marks

8 Six from: 6
Advantages
Smartphone can access the internet in more places
Smartphone is more likely to retain the connection whilst on the move
They can access the internet quickly as they are more likely to have the
smartphone with them

Disadvantages
Websites displayed on the smartphone are not full versions of the website
Browsing/reading the website is more difficult due to smaller screen size
More difficult to type in/navigate the websites/emails due to smaller onscreen
keyboard
As children can access the internet from anywhere it leaves them more
vulnerable to exploitation

To gain full marks the description must have correct answers for both
advantages and disadvantages

Question Answer Marks

9(a) Part-time 2
Working fewer hours a week…
…than full time staff

9(b) Compressed 2
Works the required hours in a week…
…in a fewer number of days

9(c) Three from, for example: 3


Wrist rest
Ergonomic keyboards
Ergonomic chairs
Footrests
Ergonomic mouse
LCD/TFT/LED/anti-glare screens
Voice activated software
Adjustable monitors

9(d) Two from: 2


Tripping over trailing cables
Fire caused by overheating computers
Fire caused by overloaded sockets
Electrocution caused by spilling drinks on the computer
Electrocution caused by touching live wires
Injuries caused by equipment falling

© UCLES 2022 Page 6 of 10


0417/12 Cambridge IGCSE – Mark Scheme February/March 2022
PUBLISHED

Question Answer Marks

10 Six from: 6
Advantages
The footprint of the computer will be smaller
Fewer peripherals needed therefore saves money
Makes the computer lighter
Easier to select icons

Disadvantages
If the screen is damaged, then the device cannot be used to input data
Keyboards and monitors can be replaced more easily
Large fingers could mis-key data therefore more errors on data entry
Screens can become dirty more easily therefore affects reading of data

To gain full marks the description must have correct answers for both
advantages and disadvantages

Question Answer Marks

11(a) Legal 1

11(b) Ethical 1

Question Answer Marks

12(a) 6
Field name Data type

Vehicle_licence_plate Text/alphanumeric

Powered_by Boolean

Service_interval Numeric:Integer

Cost_of_service Numeric: Currency

Model Text

Date_of_service Date

© UCLES 2022 Page 7 of 10


0417/12 Cambridge IGCSE – Mark Scheme February/March 2022
PUBLISHED

Question Answer Marks

12(b) Six from: 6


Advantages
Service details only need to be entered once into the database
Mistakes are less likely to happen when entering data if it already exists
Uses data redundancy
Data can be accessed using key fields
Uses data flexibility
Uses data integrity
Uses data consistency
Better security due to user level access control
Caters for future requirements

Disadvantages
Relational databases can be more complex
Requires training to set up
Harder to set up
Requires a data administrator therefore increasing the costs

To gain full marks the discussion must have correct answers for both
advantages and disadvantages

12(c)(i) Presence check 2


To make sure that it has been entered as its unique

Format check
To fit in with the layout

12(c)(ii) Type check 2


Digits only

Range check
Between 1500 and 5000

12(c)(iii) Format check 2


To ensure it is dd/mmm/yyyy

Range check
To ensure it is between certain dates

Length check
Maximum of for example 11 characters (could be 8 or 6)

© UCLES 2022 Page 8 of 10


0417/12 Cambridge IGCSE – Mark Scheme February/March 2022
PUBLISHED

Question Answer Marks

13(a) Network cards 3


Router
Switch/hub

13(b) Three from: 3


Email
Online chat//Instant message
VOIP
Online conference
Streaming music/video/TV on demand
Gaming
Use of the Cloud
Newsgroups
FTP

13(c) Two from: 2


Information can be unreliable
Unregulated so anyone can post anything
More difficult to find what you are looking for
Vast amount of information//Information overload
Information can be biased/inaccurate
Its slower to find relevant information
Data may be out of date

13(d)(i) Two from: 2


User id and password can sometimes be easily guessed
Passwords can be hacked with key logging software
Passwords can be hacked by using random password generators
Others can see the details being typed in
If the home computer saves the log in information, then anyone can access
If the user does not logout, then others can access data

© UCLES 2022 Page 9 of 10


0417/12 Cambridge IGCSE – Mark Scheme February/March 2022
PUBLISHED

Question Answer Marks

13(d)(ii) Way 1: 4
One-use code/token
Arjun logs in then software generates a one-use code/token
Arjun enters the code/token into the system

Even if hacker intercepts code/token is no use as can only be used once


Token is time limited

Way 2:
Card/dongle
The user has a dongle/card which is inserted into the computer
The dongle/card is read by the computer

The dongle/card data is unique

Way 3:
Biometrics
Using biometric scanner to capture digital image of fingerprint/retina/iris/face

Each biometric is unique


Biometrics are nearly impossible to forge

To gain full marks the answers must correctly describe two ways

© UCLES 2022 Page 10 of 10



Cambridge IGCSE

INFORMATION AND COMMUNICATION TECHNOLOGY 0417/11


*6189791534*

Paper 1 Theory May/June 2022


2 hours

You must answer on the question paper.

No additional materials are needed.

INSTRUCTIONS
• Answer all questions.
• Use a black or dark blue pen.
• Write your name, centre number and candidate number in the boxes at the top of the page.
• Write your answer to each question in the space provided.
• Do not use an erasable pen or correction fluid.
• Do not write on any bar codes.
• You may use an HB pencil for any diagrams, graphs or rough working.

INFORMATION
• The total mark for this paper is 100.
• The number of marks for each question or part question is shown in brackets [ ].
• No marks will be awarded for using brand names of software packages or hardware.

This document has 16 pages. Any blank pages are indicated.

06_0417_11_2022_1.16
© UCLES 2022 [Turn over
2

1 Circle two network devices.

Actuator Bridge Database DVD

Hub Linker Monitor Printer

[2]

2 Complete each sentence using the most appropriate item from the list. Your answers must be
different in each case.

ADC an applet hardware HDD


a router a sensor software SSD

(a) The physical components of a computer are called

........................................................................................................................................... [1]

(b) Programs and data are examples of

........................................................................................................................................... [1]

(c) A small application performing one or two simple functions is called

........................................................................................................................................... [1]

(d) An input device used in measurement applications is called

........................................................................................................................................... [1]

3 Identify two devices which are used in control systems.

1 ...............................................................................................................................................

2 ...............................................................................................................................................

[2]

© UCLES 2022 06_0417_11_2022_1.16


3

4 Many laptop computers use the cloud to store data. A technician has produced a report on his
laptop computer but has stored the report on a memory stick rather than storing it on the cloud.

Describe two advantages of using a memory stick rather than the cloud to store data.

1 ...............................................................................................................................................

..................................................................................................................................................

2 ...............................................................................................................................................

..................................................................................................................................................

[2]

5 Many bank cards now use contactless technology.

Describe the advantages and disadvantages of using these cards rather than cards that use chip
and PIN.

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

.................................................................................................................................................. [4]

© UCLES 2022 06_0417_11_2022_1.16 [Turn over


4

6 Stylesheets are used in web pages.

(a) Explain the term stylesheets when used in web pages.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [2]

(b) Explain the differences between attached stylesheets and inline style attributes.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [4]

© UCLES 2022 06_0417_11_2022_1.16


5

7 Two types of database are relational and flat file.

(a) Compare and contrast relational databases and flat file databases. Your answer must include
similarities and differences.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [8]

(b) Give, using an example, one reason why flat file databases are used in certain applications
rather than relational databases.

Reason .............................................................................................................................

...........................................................................................................................................

Example ............................................................................................................................

...........................................................................................................................................

[2]

© UCLES 2022 06_0417_11_2022_1.16 [Turn over


6

8 When using computers people can suffer from Repetitive Strain Injury (RSI).

(a) Describe the term RSI. Include in your answer the causes of RSI.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [3]

(b) Identify three methods of reducing the effects of RSI.

1 ........................................................................................................................................

...........................................................................................................................................

2 ........................................................................................................................................

...........................................................................................................................................

3 ........................................................................................................................................

...........................................................................................................................................

[3]

9 Martin, who is a teacher, is creating a multimedia presentation to explain a topic to his students.

(a) He produces a master slide.

Write down four objects he could include in the master slide.

1 ........................................................................................................................................

2 ........................................................................................................................................

3 ........................................................................................................................................

4 ........................................................................................................................................

[4]

© UCLES 2022 06_0417_11_2022_1.16


7

(b) Martin wants to record a message for his students. His voice will be added to the presentation.
He will also need to listen to his voice to make sure the sound is of good quality.

Name two devices that he will need.

1 ........................................................................................................................................

2 ........................................................................................................................................

[2]

(c) Martin will need to use software to create different types of content before including them in
the presentation.

Name two types of software that he might use and for each one, write down what he would
use it for.

Software 1 ........................................................................................................................

...........................................................................................................................................

Use ...................................................................................................................................

...........................................................................................................................................

Software 2 ........................................................................................................................

...........................................................................................................................................

Use ...................................................................................................................................

...........................................................................................................................................

[4]

© UCLES 2022 06_0417_11_2022_1.16 [Turn over


8

10 A river authority is concerned about levels of pollution in a major river. The quality of the water in
the river needs to be monitored using sensors.

(a) Name three sensors that could be used to measure the pollution in the river.

1 ........................................................................................................................................

2 ........................................................................................................................................

3 ........................................................................................................................................

[3]

(b) Discuss the advantages and disadvantages of using computers to measure the pollution in
the river rather than humans measuring the pollution.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [6]

© UCLES 2022 06_0417_11_2022_1.16


9

11 A system can be analysed using different methods.

Discuss the advantages and disadvantages of analysing a system by interviewing staff rather than
using questionnaires.

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

.................................................................................................................................................. [6]

© UCLES 2022 06_0417_11_2022_1.16 [Turn over


10

12 Many company computer network systems use WiFi as a communication system to help prevent
the issue of tripping over trailing cables.

(a) For each of the following physical safety issues describe two ways of helping to prevent them.

(i) Fire

Prevention 1 ..........................................................................................................

................................................................................................................................

Prevention 2 ..........................................................................................................

................................................................................................................................

[2]

(ii) Electrocution

Prevention 1 ..........................................................................................................

................................................................................................................................

Prevention 2 ..........................................................................................................

................................................................................................................................

[2]

A common use of home computers is online gaming.

(b) Describe three eSafety measures which should be taken when playing games on the internet.

1 ........................................................................................................................................

...........................................................................................................................................

2 ........................................................................................................................................

...........................................................................................................................................

3 ........................................................................................................................................

...........................................................................................................................................

[3]

© UCLES 2022 06_0417_11_2022_1.16


11

(c) In order to log onto online gaming a user ID and password is needed.

Explain what is meant by a user ID and password and why they are needed.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [4]

© UCLES 2022 06_0417_11_2022_1.16 [Turn over


12

13 (a) Explain the need for copyright legislation when data is published on the internet.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [4]

(b) Describe methods that software producers use to prevent software copyright being broken.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [4]

© UCLES 2022 06_0417_11_2022_1.16


13

(c) Emails are used by people to communicate with each other. Copyright and using acceptable
language in the email are two of the constraints that affect the use of email.

(i) Describe four other constraints that may affect the use of email.

1 ............................................................................................................................

................................................................................................................................

2 ............................................................................................................................

................................................................................................................................

3 ............................................................................................................................

................................................................................................................................

4 ............................................................................................................................

................................................................................................................................

[4]

(ii) Describe two rules of the use of acceptable language in emails.

1 ............................................................................................................................

................................................................................................................................

2 ............................................................................................................................

................................................................................................................................

[2]

© UCLES 2022 06_0417_11_2022_1.16 [Turn over


14

14 The manager of a medical centre keeps the doctor’s stock records in a database. The stock for
any item is not allowed to fall below 15 items and the manager keeps a maximum of 100 items in
stock.

The table shows examples of the stock.

Name_of_item Serial_number Number_in_stock Name_of_supplier Shelf_number

Medihoney 3081043612211 15 Capimed 0126

Sodium fusidate 1437210227870 60 Brooks Medical 0112

Crepe bandage 2541233164353 100 Capimed 0064

Crepe bandage 2834954736849 89 Cams Meds 0064

As data is entered it needs to be verified and validated.

(a) Explain why verification is carried out.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [2]

(b) Write down the field name from the table that would be the most appropriate for each of these
validation checks. Each answer must be different.

Check digit ........................................................................................................................

Length ...............................................................................................................................

Type ..................................................................................................................................

[3]

(c) Name the most appropriate field from the table that could be used as a primary key in the
database.

........................................................................................................................................... [1]

© UCLES 2022 06_0417_11_2022_1.16


15

15 A customer is booking a seat on a theatre’s online booking system. The customer reserves seats
using the theatre’s website and a debit card. The website displays the seats that are available and
a database stores the customer details, the payment details and the seat details.

When the customer enters their debit card details for a seat, the theatre’s computer communicates
with the bank’s computer.

(a) Describe four checks that the bank’s computer will make on the customer’s bank account.

1 ........................................................................................................................................

...........................................................................................................................................

2 ........................................................................................................................................

...........................................................................................................................................

3 ........................................................................................................................................

...........................................................................................................................................

4 ........................................................................................................................................

...........................................................................................................................................

[4]

(b) Describe the processing carried out by the theatre’s computer when making a booking.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [4]

© UCLES 2022 06_0417_11_2022_1.16


16

BLANK PAGE

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable
effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will
be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge Assessment
International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at
www.cambridgeinternational.org after the live examination series.

Cambridge Assessment International Education is part of Cambridge Assessment. Cambridge Assessment is the brand name of the University of Cambridge Local
Examinations Syndicate (UCLES), which is a department of the University of Cambridge.

© UCLES 2022 06_0417_11_2022_1.16


Cambridge IGCSE™

INFORMATION AND COMMUNICATION TECHNOLOGY 0417/11


Paper 1 Theory May/June 2022
MARK SCHEME
Maximum Mark: 100

Published

This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.

Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.

Cambridge International will not enter into discussions about these mark schemes.

Cambridge International is publishing the mark schemes for the May/June 2022 series for most
Cambridge IGCSE, Cambridge International A and AS Level and Cambridge Pre-U components, and some
Cambridge O Level components.

This document consists of 14 printed pages.

© UCLES 2022 [Turn over


0417/11 Cambridge IGCSE – Mark Scheme May/June 2022
PUBLISHED
Generic Marking Principles

These general marking principles must be applied by all examiners when marking candidate answers. They should be applied alongside the
specific content of the mark scheme or generic level descriptors for a question. Each question paper and mark scheme will also comply with these
marking principles.

GENERIC MARKING PRINCIPLE 1:

Marks must be awarded in line with:

 the specific content of the mark scheme or the generic level descriptors for the question
 the specific skills defined in the mark scheme or in the generic level descriptors for the question
 the standard of response required by a candidate as exemplified by the standardisation scripts.

GENERIC MARKING PRINCIPLE 2:

Marks awarded are always whole marks (not half marks, or other fractions).

GENERIC MARKING PRINCIPLE 3:

Marks must be awarded positively:

 marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit is given for valid answers which go beyond the
scope of the syllabus and mark scheme, referring to your Team Leader as appropriate
 marks are awarded when candidates clearly demonstrate what they know and can do
 marks are not deducted for errors
 marks are not deducted for omissions
 answers should only be judged on the quality of spelling, punctuation and grammar when these features are specifically assessed by the
question as indicated by the mark scheme. The meaning, however, should be unambiguous.

GENERIC MARKING PRINCIPLE 4:

Rules must be applied consistently, e.g. in situations where candidates have not followed instructions or in the application of generic level
descriptors.

© UCLES 2022 Page 2 of 14


0417/11 Cambridge IGCSE – Mark Scheme May/June 2022
PUBLISHED
GENERIC MARKING PRINCIPLE 5:

Marks should be awarded using the full range of marks defined in the mark scheme for the question (however; the use of the full mark range may
be limited according to the quality of the candidate responses seen).

GENERIC MARKING PRINCIPLE 6:

Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should not be awarded with grade thresholds or
grade descriptors in mind.

© UCLES 2022 Page 3 of 14


0417/11 Cambridge IGCSE – Mark Scheme May/June 2022
PUBLISHED
Question Answer Marks

1 Hub 2
Bridge

Question Answer Marks

2(a) hardware 1

2(b) software 1

2(c) an applet 1

2(d) a sensor 1

Question Answer Marks

3 Two from: 2
Computer
Analogue to digital convertor/ADC
Digital to Analogue convertor/DAC
Actuator

Question Answer Marks

4 Two from: 2
Does not need access to the internet
Fewer issues storing the data as the connection could drop during storage if the cloud is used
More control over the stored data

© UCLES 2022 Page 4 of 14


0417/11 Cambridge IGCSE – Mark Scheme May/June 2022
PUBLISHED
Question Answer Marks

5 Four from: 4
Advantages
Less wear on the card as it is not used in a device
Transaction is quicker
Can be read from a pocket
No shoulder surfing

Disadvantages
Transaction can be read by hacker’s device
Does not use a PIN therefore money can be taken if lost
Limit on spending on the card
If lost the card could be used by anyone so is less secure

To gain full marks the description must have correct answers for both advantages and disadvantages

Question Answer Marks

6(a) Used to describe the presentation of a document written in HTML 2


Enables the separation of presentation and content
Part of the presentation layer

6(b) Four from: 4


Attached stylesheets are separate from the web page whereas Inline style attributes are within each web page
An attached stylesheet is edited in one file whereas Inline style attributes are edited by changing each web page
Attached stylesheet link has to go into the head section of the web page whereas Inline style attributes can be anywhere in
the web page
Inline style attributes can be within HTML tags
Attached stylesheets can be applied to multiple pages whereas Inline style attributes only apply to individual web pages
Inline style attributes can be used to override the attached stylesheet

© UCLES 2022 Page 5 of 14


0417/11 Cambridge IGCSE – Mark Scheme May/June 2022
PUBLISHED
Question Answer Marks

7(a) Eight from: 8


Similarity
Both use a primary key
Both can create searches/reports
Both store data in records and fields in the table
Both use indexes

Differences
Flat file database is a plain text file
Flat file is a simple structure
Flat file uses one table
Relational database has linked tables/relationships
Relational database allows searches/reports to be created over multiple tables
Relational database allows cross referencing between tables
Relational database records are easier to add
Relational databases are more powerful
Relational database reduces duplicate data
Relational database uses foreign keys

To gain full marks there must be correct answers for both similarities and differences

7(b) One from: 2


The data is in a list
There is only a small amount of data
A single table is to be used

One mark:
Example of a list such as name, address/CSV files

© UCLES 2022 Page 6 of 14


0417/11 Cambridge IGCSE – Mark Scheme May/June 2022
PUBLISHED
Question Answer Marks

8(a) One from: 3


Aches and pains in the hands and fingers
Painful swelling of the wrist and fingers

Two from:
Caused by repetitive movements
Caused by holding a mouse and clicking the buttons repetitively
Caused by constant typing on a keyboard
Caused by sitting in a poor posture for a long period of time

8(b) Three from: 3


Use of a wrist rest
Use of a mouse rest
Take regular breaks
Exercise the hand and fingers
Use an ergonomic keyboard/ergonomic mouse
Arrange workspace so that it is not cramped
Using an ergonomic chair

Question Answer Marks

9(a) Four from: 4


Text
Images
Logos
Slide footer/header
Automatic slide number
Link/button to other slide/file/web page
Lines for layout
Animation/video/sound

9(b) Two from: 2


Microphone
Headphones/speakers
Sound card

© UCLES 2022 Page 7 of 14


0417/11 Cambridge IGCSE – Mark Scheme May/June 2022
PUBLISHED
Question Answer Marks

9(c) Matched pairs: 4


Word processing
Type/enter the text for the presentation
Image editing software/graphics package/photo editing
To prepare images for inclusion in the presentation
Sound editing software
To record the message for the presentation
Video editing software
To change the video of Martin
Spreadsheet
To create a chart/graph

Question Answer Marks

10(a) Three from: 3


Oxygen
Light
pH
Turbidity

© UCLES 2022 Page 8 of 14


0417/11 Cambridge IGCSE – Mark Scheme May/June 2022
PUBLISHED
Question Answer Marks

10(b) Six from: 6


Advantages
More accurate results produced
Computer does not forget to take a reading
Results are processed automatically
Readings can be taken at more points as many humans are needed
Readings can be taken that would be impossible for humans
Data can be analysed continuously
Readings can be taken more frequently
Safer than using humans
Better response time
Can work 24/7
Can be placed in remote areas where humans could not work
Fewer humans required therefore reducing the cost

Disadvantages
Computer responds less to unusual circumstances
Computer equipment can be more susceptible to atmospheric conditions
Computer equipment is more likely to be damaged or stolen by vandals

To gain full marks the discussion must have correct answers for both advantages and disadvantages

© UCLES 2022 Page 9 of 14


0417/11 Cambridge IGCSE – Mark Scheme May/June 2022
PUBLISHED
Question Answer Marks

11 Interviews 6
Advantages
Questions can be explained if they are misunderstood this cannot happen withquestionnaires
Questions can be asked relating to the answers given previously
More detailed answers can be given
More complex questions can be asked
Questions can be changed to suit the person being interviewed
The person being interviewed tends to answer all the questions
Can see body language
Disadvantages
They are not anonymous whereas questionnaires are
Takes far longer to complete than a questionnaire
The interviewer and interviewee must be available at the same time
More expensive as the interviewer has to be hired and interviewee needs time off
Answers may not be honest//more honest with a questionnaire as the person isanonymous
Answers may be skewed by the interviewer
Answers in a questionnaire can be analysed quicker through OMR
Questionnaires tend to be sent to more people

To gain full marks the discussion must have correct answers for both interviews and questionnaires

Question Answer Marks

12(a)(i) Fire 2
Two from:
CO2 fire extinguisher
Don’t overload sockets
Have fans/cooling system
Use Residual Circuit Breaker/RCB

12(a)(ii) Electrocution 2
Don’t bring drinks close to computers
Cover/insulate live/bare wires

© UCLES 2022 Page 10 of 14


0417/11 Cambridge IGCSE – Mark Scheme May/June 2022
PUBLISHED
Question Answer Marks

12(b) Three from: 3


Report/block cyberbullies
Respect other players
Check game ratings for age
Reduce the amount of time spent gaming
Be careful of in-app purchases
Turn on privacy settings
Don’t use your real name//use a nick name
Don’t give away personal information

12(c) Max two from: 4


Part of the authentication system
Needed to improve security

Max three from:


Combined they are unique
User ID is an identifier for the user
Password is a string of characters
Passwords verify the user in the authentication process

Question Answer Marks

13(a) Four from: 4


Copyright is the legal and exclusive right to copy, or permit to be copied, some specific work
If you own the copyright on the content of a web page someone else cannot make a copy of it without your permission
Copyright usually originates with the creator of a work, but can be sold, traded, orinherited by others
If you blog, take photographs, publish music, or otherwise produce copyrightable content, you legally own that content
Whether you want to let other people use it or not is your decision
If you want to use other people’s content, you have to understand permissions andlicensing, what is legal and what
isn’t//Read Terms and Conditions
Supports the original producers of the software/content

© UCLES 2022 Page 11 of 14


0417/11 Cambridge IGCSE – Mark Scheme May/June 2022
PUBLISHED
Question Answer Marks

13(b) Serial numbers/product keys 4


When software is being installed, users are often asked to enter a unique number which proves the software is original
Serial numbers and product keys are supplied with the original copy of the software

Holograms
Holograms are often used on the packaging of software and they indicate that the copy is genuine
Software without a hologram on the packaging is usually an illegal copy as they are too difficult and costly for pirates to
implement

Licence agreements
Licence agreements are part of the software installation process and they inform the user exactly how they are legally
allowed to use the product
Users are required to 'agree to terms of use' before they can complete the installation Any breach of this can mean
prosecution and fines

One mark for naming the method then one mark for each reason
To gain full marks candidates must have at least one description in addition to naming the methods

13(c)(i) Four from: 4


The laws within a country//In some countries emails are monitored and people arepunished for what they write
Using emails for marketing purposes//Laws differ in different countries
Netiquette
Local guidelines set by an employer
The need for security//Some countries monitor keywords in emails
Password protection does not allow people to see the contents
Cultural offences

© UCLES 2022 Page 12 of 14


0417/11 Cambridge IGCSE – Mark Scheme May/June 2022
PUBLISHED
Question Answer Marks

13(c)(ii) Two from for example: 2


Include a clear, direct subject line
Use a professional email address
Use professional salutations
Use exclamation points sparingly
Be cautious with humour/sarcasm/slang
Proofread the message before you click send
Do not use capital letters as it implies shouting
Do not use swear/offensive words
Do not use defamatory comments
Protect others privacy

Question Answer Marks

14(a) Checks the data entered/transferred/copied correctly 2


Matches the original document

14(b) Check digit: Serial_number 3


Length: Shelf_number
Type: Number_in_stock//Name_of_supplier//Name_of_item

14(c) Serial_number 1

Question Answer Marks

15(a) Four from: 4


Is debit card number valid/exists
Does name entered match that on system
Is expiry/start date valid/matches date stored on system
Does security code/CVV entered match that stored on system
Is there available credit/funds in the bank account
Checks for unusual spending patterns
Is card blocked/reported stolen/lost

© UCLES 2022 Page 13 of 14


0417/11 Cambridge IGCSE – Mark Scheme May/June 2022
PUBLISHED
Question Answer Marks

15(b) Four from: 4


Computer looks up the date of performance/performance reference number
Matching record is retrieved
Checks/Searches if the seats are available
Flags the seats to stop double booking as temporary hold
Reduced number of available seats by the number booked//seats flagged as fully booked
Calculate cost of seats
Prints ticket/generates e-ticket
E-ticket/ticket sent to customer
Receipt is printed/Verification email sent
Data is checked for accuracy
If booking not completed, then temporarily hold flag is removed from the seat
Reduce number of seats available once the booking is complete

© UCLES 2022 Page 14 of 14



Cambridge IGCSE

INFORMATION AND COMMUNICATION TECHNOLOGY 0417/12


*8667658371*

Paper 1 Theory May/June 2022


2 hours

You must answer on the question paper.

No additional materials are needed.

INSTRUCTIONS
• Answer all questions.
• Use a black or dark blue pen.
• Write your name, centre number and candidate number in the boxes at the top of the page.
• Write your answer to each question in the space provided.
• Do not use an erasable pen or correction fluid.
• Do not write on any bar codes.
• You may use an HB pencil for any diagrams, graphs or rough working.

INFORMATION
• The total mark for this paper is 100.
• The number of marks for each question or part question is shown in brackets [ ].
• No marks will be awarded for using brand names of software packages or hardware.

This document has 16 pages.

06_0417_12_2022_1.15
© UCLES 2022 [Turn over
2

1 Circle two input devices.


Digital
3D printer Actuator CD ROM
camera

Keyboard Linker Monitor Speaker

[2]

2 A computer-controlled glasshouse is used to grow plants.

Identify two output devices used in this glasshouse.

1 ...............................................................................................................................................

2 ...............................................................................................................................................

[2]

3 Network devices are used in computer systems.

Complete each sentence by identifying the most appropriate network device.

(a) The network device that is used to transmit the data along an analogue telephone line is a

........................................................................................................................................... [1]

(b) The network device that connects a LAN to a WAN is a

........................................................................................................................................... [1]

(c) The network device that allows data to be directed to a specific computer on a LAN is a

........................................................................................................................................... [1]

(d) The internal network device that allows a computer to connect to a LAN is a

........................................................................................................................................... [1]

© UCLES 2022 06_0417_12_2022_1.15


3

4 Many word processing packages have a number of formatting features.

The paragraph below shows some of the formatting features that can be used.

(a) Write down four of the formatting features that have been used in the paragraph shown.

1 ........................................................................................................................................

2 ........................................................................................................................................

3 ........................................................................................................................................

4 ........................................................................................................................................

[4]

© UCLES 2022 06_0417_12_2022_1.15 [Turn over


4

(b) The logo for the Summer Steam Festival is shown and labelled A. The organisers of the event
are planning to create a second logo for all their correspondence. This is shown and labelled B.

Summer
Steam Festival Summer
2022 Steam Festival
2022

A B

Describe the steps that have been used to transform logo A into logo B.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [4]

© UCLES 2022 06_0417_12_2022_1.15


5

5 A library is considering the way it issues books. The librarians are planning to use RFID rather than
bar codes.

Describe the advantages of using RFID rather than bar codes.

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

.................................................................................................................................................. [4]

6 Laptop computers use Solid State Drives (SSD) rather than Hard Disc Drives (HDD).

Describe two disadvantages of using an SSD rather than an HDD in a laptop computer.

1 ...............................................................................................................................................

..................................................................................................................................................

2 ...............................................................................................................................................

..................................................................................................................................................

[2]

© UCLES 2022 06_0417_12_2022_1.15 [Turn over


6

7 A patient has an injury and the doctor treating him needs to find out information about the patient.
Most of the data he needs to collect is personal data.

The data collected is protected by data protection legislation. Most data protection acts include the
principle that data should be kept confidential and secure.

(a) List four other principles of a typical data protection act.

1 ........................................................................................................................................

...........................................................................................................................................

2 ........................................................................................................................................

...........................................................................................................................................

3 ........................................................................................................................................

...........................................................................................................................................

4 ........................................................................................................................................

...........................................................................................................................................

[4]

(b) Explain what is meant by personal data. Include two examples of personal data in your answer.

Explanation .......................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

Example 1 .........................................................................................................................

...........................................................................................................................................

Example 2 .........................................................................................................................

...........................................................................................................................................

[3]

© UCLES 2022 06_0417_12_2022_1.15


7

(c) Explain why personal data should be kept confidential and secure.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [4]

8 Uniform Resource Locators (URL) are used to locate websites and resources. A teacher needs to
find a teaching guide from Cambridge Assessment International Education. To download the
teaching guide she types in:

(a) Write down only the part of the URL which shows the file name of the teaching guide.

........................................................................................................................................... [1]

(b) Write down only the part of the URL which is the folder where the teaching guide is stored.

........................................................................................................................................... [1]

(c) Write down only the part of the URL which is the domain name.

........................................................................................................................................... [1]

(d) Explain what is meant by https.

...........................................................................................................................................

........................................................................................................................................... [1]

© UCLES 2022 06_0417_12_2022_1.15 [Turn over


8

9 A student is creating a spreadsheet of airports for a project.

The formula in G2 is:

=VLOOKUP(F2,A2:B9,2,0)

(a) Explain, in detail, what the formula in G2 does.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [4]

(b) Before the spreadsheet can be used, data needs to be entered to test the spreadsheet.

There are three types of test data: normal, abnormal and extreme.

Explain what is meant by these three types of test data.

Normal ..............................................................................................................................

...........................................................................................................................................

Abnormal ..........................................................................................................................

...........................................................................................................................................

Extreme ............................................................................................................................

...........................................................................................................................................

[3]

© UCLES 2022 06_0417_12_2022_1.15


9

(c) Explain, using examples, the differences between a function and a formula.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [6]

(d) The completed file could have been created using a database.

Describe two reasons why databases are used in certain applications rather than spreadsheets.

1 ........................................................................................................................................

...........................................................................................................................................

2 ........................................................................................................................................

...........................................................................................................................................

[2]

© UCLES 2022 06_0417_12_2022_1.15 [Turn over


10

10 The prolonged use of computers can cause several health problems particularly when sitting down
and using monitors.

Discuss the strategies that you have developed to minimise health risks which only relate to sitting
down and using a monitor.

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

.................................................................................................................................................. [8]

© UCLES 2022 06_0417_12_2022_1.15


11

11 A car manufacturing company uses computer-controlled robots to manufacture its cars.

Discuss the advantages and disadvantages to the company of using computer-controlled robots
rather than using humans to manufacture the cars.

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

.................................................................................................................................................. [6]

© UCLES 2022 06_0417_12_2022_1.15 [Turn over


12

12 Different methods can be used to analyse a system.

Discuss the benefits and drawbacks of analysing a system by observing staff rather than looking
at the current systems documentation.

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

.................................................................................................................................................. [6]

13 A librarian in a college department library is entering data into a student borrowers’ file. As the data
is entered it needs to be verified.

(a) Describe the two types of verification.

1 ........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

2 ........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

[4]

© UCLES 2022 06_0417_12_2022_1.15


13

(b) Explain, using examples, why it is necessary to carry out validation as well as verification for
this system.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [4]

© UCLES 2022 06_0417_12_2022_1.15 [Turn over


14

14 Spam is associated with ICT systems.

(a) Explain what is meant by the term spam.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [2]

(b) Describe the ways that a user can recognise spam and methods to help prevent it.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [6]

© UCLES 2022 06_0417_12_2022_1.15


15

15 (a) Explain what is meant by cloud storage and how it is used.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [6]

(b) Describe two issues related to the security of data in the cloud.

1 ........................................................................................................................................

...........................................................................................................................................

2 ........................................................................................................................................

...........................................................................................................................................

[2]

© UCLES 2022 06_0417_12_2022_1.15 [Turn over


16

16 A company uses corporate house style within the headers and footers in its documents.

(a) Explain what is meant by corporate house style.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [2]

(b) Explain why headers and footers are needed.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [2]

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable
effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will
be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge Assessment
International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at
www.cambridgeinternational.org after the live examination series.

Cambridge Assessment International Education is part of Cambridge Assessment. Cambridge Assessment is the brand name of the University of Cambridge Local
Examinations Syndicate (UCLES), which is a department of the University of Cambridge.

© UCLES 2022 06_0417_12_2022_1.15


Cambridge IGCSE™

INFORMATION AND COMMUNICATION TECHNOLOGY 0417/12


Paper 1 Theory May/June 2022
MARK SCHEME
Maximum Mark: 100

Published

This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.

Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.

Cambridge International will not enter into discussions about these mark schemes.

Cambridge International is publishing the mark schemes for the May/June 2022 series for most
Cambridge IGCSE, Cambridge International A and AS Level and Cambridge Pre-U components, and some
Cambridge O Level components.

This document consists of 15 printed pages.

© UCLES 2022 [Turn over


0417/12 Cambridge IGCSE – Mark Scheme May/June 2022
PUBLISHED
Generic Marking Principles

These general marking principles must be applied by all examiners when marking candidate answers. They should be applied alongside the
specific content of the mark scheme or generic level descriptors for a question. Each question paper and mark scheme will also comply with these
marking principles.

GENERIC MARKING PRINCIPLE 1:

Marks must be awarded in line with:

 the specific content of the mark scheme or the generic level descriptors for the question
 the specific skills defined in the mark scheme or in the generic level descriptors for the question
 the standard of response required by a candidate as exemplified by the standardisation scripts.

GENERIC MARKING PRINCIPLE 2:

Marks awarded are always whole marks (not half marks, or other fractions).

GENERIC MARKING PRINCIPLE 3:

Marks must be awarded positively:

 marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit is given for valid answers which go beyond the
scope of the syllabus and mark scheme, referring to your Team Leader as appropriate
 marks are awarded when candidates clearly demonstrate what they know and can do
 marks are not deducted for errors
 marks are not deducted for omissions
 answers should only be judged on the quality of spelling, punctuation and grammar when these features are specifically assessed by the
question as indicated by the mark scheme. The meaning, however, should be unambiguous.

GENERIC MARKING PRINCIPLE 4:

Rules must be applied consistently, e.g. in situations where candidates have not followed instructions or in the application of generic level
descriptors.

© UCLES 2022 Page 2 of 15


0417/12 Cambridge IGCSE – Mark Scheme May/June 2022
PUBLISHED
GENERIC MARKING PRINCIPLE 5:

Marks should be awarded using the full range of marks defined in the mark scheme for the question (however; the use of the full mark range may
be limited according to the quality of the candidate responses seen).

GENERIC MARKING PRINCIPLE 6:

Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should not be awarded with grade thresholds or
grade descriptors in mind.

© UCLES 2022 Page 3 of 15


0417/12 Cambridge IGCSE – Mark Scheme May/June 2022
PUBLISHED
Question Answer Marks

1 Keyboard 2
Digital camera

Question Answer Marks

2 Two from, for example: 2


Sprinkler
Lamp
Heater
Vents/Window openers/Motor
Actuator

Question Answer Marks

3(a) Modem 1

3(b) Router 1

3(c) Switch 1

3(d) Network interface Card/NIC 1

© UCLES 2022 Page 4 of 15


0417/12 Cambridge IGCSE – Mark Scheme May/June 2022
PUBLISHED
Question Answer Marks

4(a) Four from: 4


Bold
Full justification
Highlight
Underlined
Italic

4(b) Four from: 4


Click on the shape/logo A
Slide the corners in to reduce the size of the shape/logo
Keep the aspect ratio//type in the height and width
Fill the shape/logo with black
Highlight the text
Reduce the size of the text
Change the colour of the text to white
Click on the image/train
Reduce the height and width//reduce the size of the image/train

Question Answer Marks

5 Four from: 4
RFID are faster to read than bar codes
RFID scanning is more accurate than bar codes
RFID does not need line of sight to read but bar code does
RFID will read the data if the reader is further away
RFID can scan multiple items at the same time
RFID allows greater security
RFID can store more data than a bar code
RFID tags can be rewritten, so can be reused
RFID tags are more robust as bar codes will not scan if damaged

© UCLES 2022 Page 5 of 15


0417/12 Cambridge IGCSE – Mark Scheme May/June 2022
PUBLISHED
Question Answer Marks

6 They tend to have a more limited number of read and writes 2


More expensive per Gb than HDD

Question Answer Marks

7(a) Four from: 4


Data should be fairly and lawfully processed//Data should be processed in a transparent manner
Data should only be processed for the stated purpose
Data should be adequate, relevant and not excessive/limited
Data should not be kept longer than necessary
Data should be processed in accordance with the data subject’s rights
Data should be collected for specific purposes
Data should only be further processed for archive purposes which is compatible with the initial purposes
Data kept for archiving should safeguard the rights and freedoms of individuals
Explicit consent required for processing sensitive data
Data subjects are allowed access to their personal data
Data should be accurate and kept up to date
Data should not be transferred to another country unless they have adequate protection
Parental consent required for processing personal data of children including online services

7(b) One mark for the explanation 3


Personal data is data relating to an individual/person that can be identified

One mark per example


Name, address, date of birth, gender, biometrics, mobile/cell phone number, credit/debit card number, personnel ID
number, personal appearance, medical record, criminal record, ethnic origin, picture of yourself, political opinions, religious
or philosophical beliefs, trade-union membership record, genetic data, IP address, racial identity

7(c) Four from: 4


The person can be identified from the data
The data is confidential as it links directly to the person
If someone gets access to the data then they can use the information to attack the person
If not kept confidential and secure it could lead to home burglaries as people post holiday details on social media
If not kept confidential and secure it could lead to the chance of users suffering physical harm
Protects sensitive data

© UCLES 2022 Page 6 of 15


0417/12 Cambridge IGCSE – Mark Scheme May/June 2022
PUBLISHED
Question Answer Marks

8(a) 2193733.pdf 1

8(b) igcse-ICT-0417 1

8(c) www.cambridgeinternational.org 1

8(d) Secure internet protocol 1

Question Answer Marks

9(a) =VLOOKUP(F2,A2:B9,2,0) 4

Four from:
Looks up F2/Airport name
Looks up in the range A2:B9/Code and Name
Finds the corresponding value from the 2nd column
Displays the value in G2
Finds exact match

9(b) Normal 3
Data that is within the boundary of acceptability

Abnormal
Data that is outside the boundary/limit of acceptability/incorrect data

Extreme
Data on the edge of acceptability

© UCLES 2022 Page 7 of 15


0417/12 Cambridge IGCSE – Mark Scheme May/June 2022
PUBLISHED
Question Answer Marks

9(c) Max two from: 6


Formula
A formula is a statement written by the user
A formula is an equation
A formula can contain values/references to cells/defined names
A formula can contain functions

One mark
Examples =A1+B1, =SUM(A2:B2)

Max two from:


Function
A function is a named piece of code designed to calculate specific values
Functions are used inside formulas
A function is a built in/predefined operation

One mark
Examples SUM/AVERAGE etc

9(d) Two from: 2


A database can use queries
A database can use relationships
Referential integrity can be enforced in a database
Easier to create forms on a database
Easier to create reports on a database
Better user security
Data is easier to manage in a database
A database can reduce data duplication

© UCLES 2022 Page 8 of 15


0417/12 Cambridge IGCSE – Mark Scheme May/June 2022
PUBLISHED
Question Answer Marks

10 Eight from: 8
Use of the monitor
Using a flat screen monitor can reduce eye strain and headaches
I turn the monitor 90 deg to the window to reduce the glare on the screen
If I turn the monitor this can cause problems with the layout of the room
I need to buy a monitor that could tilt to reduce neck ache
I close the window blinds to avoid glare on monitor/headaches
I should not use rooms with more than one window but this could be difficult
I could use a matt screen to prevent glare/headaches
I use a flat screen monitor as there is less flicker therefore reduces the chance of an epileptic seizure/eye strain/headaches
I keep the screen clear of dust to reduce static and eye strain
I could have my eyesight tested regularly
Brightness of the room should equal the brightness of the screen to prevent eye strain
Enable blue light filter/blue light glasses to prevent eye strain
I could set night light on the computer to prevent eye strain
I sit at arms length from the screen to prevent eye strain

Sitting down
I use an ergonomic chair/standing desk to reduce back and neck pains
I sit with correct posture to help reduce back and neck pain
I use a footrest to reduce DVT/improve posture
If there are wheels on the chair for easy movement I should be careful to avoid injury problems with the chair moving
backwards

Maximum of six marks if candidate only mention strategies for either sitting down or using a monitor

© UCLES 2022 Page 9 of 15


0417/12 Cambridge IGCSE – Mark Scheme May/June 2022
PUBLISHED
Question Answer Marks

11 Six from: 6
Advantages
Robots can work in sterile/harmful areas which are dangerous for humans
Humans would need protective clothing which would cost the company more money
Robots can more easily be used for transferring large delicate items
Robots can work 24/7
Cheaper in the long run
Higher productivity
More accurate/precise engineering
More frequent checking of the equipment
Fewer workers are needed therefore lowering costs
Production of the cars is more consistent

Disadvantages
Expensive to buy robots
Maintenance is expensive
Requires backup systems, which are expensive
They replace skilled workers, leading to de-skilling
They need constant observation which increases the cost of maintenance crews

To gain full marks the discussion must have correct answers for both advantages and disadvantages

© UCLES 2022 Page 10 of 15


0417/12 Cambridge IGCSE – Mark Scheme May/June 2022
PUBLISHED
Question Answer Marks

12 Observation 6
The analyst sees it with their own eyes
Get a complete picture of the whole system
Cheaper as it does not take the worker away from work
Description of the Hawthorne effect
The quality and accuracy of information is highly dependent on the skill of the observer

Examining documents
Can see exact details of inputs, processing and outputs
Saves time as there could be copies of previous analysis
Allows the analyst to predict the size of the new system by analysing the amount of data
Very time consuming to look through all the documents
Very expensive to pay for an analyst to look through all the documents

To gain full marks the discussion must have correct answers for both observation and examining documents

Question Answer Marks

13(a) One mark for naming the verification and one mark for explanation 4
Visual verification
Person enters the data it is read through and corrected as needed using the original copy

Double data entry


One from:
Person types the data then retypes the data from the original copy/source
Person types the data and another types the data from the original copy/source

© UCLES 2022 Page 11 of 15


0417/12 Cambridge IGCSE – Mark Scheme May/June 2022
PUBLISHED
Question Answer Marks

13(b) Max three from: 4


Not all errors are found by validation and verification separately
Source document may contain errors
Verification only checks that data is copied correctly
Verification does not check if data is reasonable/sensible
Validation checks are carried out automatically by the computer

Max two examples:


Correct appropriate example of a verification check
e.g. data supplied by the borrower is incorrect on the source document and was copied
Correct appropriate explanation of an example of a validation check
e.g. (Number of books borrowed is 1 misread as a 7; in a range check of 1–10)

Question Answer Marks

14(a) Two from: 2


Spam is junk mail
Sent in large numbers to inboxes
Unwanted/unsolicited emails
Fills the inbox
Used for advertising
Used for phishing/spreading malware

© UCLES 2022 Page 12 of 15


0417/12 Cambridge IGCSE – Mark Scheme May/June 2022
PUBLISHED
Question Answer Marks

14(b) Max four from: 6


Multiple spelling/grammatical errors
Asked to carry out tasks immediately
Asking to click on a link
Does not ask for you by name
Stored in a SPAM folder
Email asks for personal information
Large amount of repeated emails from same user
Lots of other similar email addresses in the send to box

Max four from:


Use a spam filter
Not filling your details on online form
Not replying to spam emails
Not having an auto reply set
Not consenting to marketing when providing details to a company
Do not give email address

© UCLES 2022 Page 13 of 15


0417/12 Cambridge IGCSE – Mark Scheme May/June 2022
PUBLISHED
Question Answer Marks

15(a) Six from: 6


What it is:
Cloud storage involves storing data in a remote physical location
Online storage platform
Cloud storage systems use hundreds of interlinked data servers
Storage system that requires access to the internet

How is it used:
User accesses the cloud storage using the internet
Cloud data can be accessed from any device
Clients send files to a data server
The server is maintained by a cloud provider
Data can be shared with other users
Cloud storage automatically backs up data
If one server fails there are others used as backup
Users pay a monthly/annual fee for storage used

To gain full marks the explanation must have correct answers for both what it is and how it is used

15(b) Two from: 2


Easier to hack as data is always available
Lose control of your data
More than one copy available to access therefore security is reduced
More difficult to delete all copies of the data

Question Answer Marks

16(a) Two from: 2


A set of rules
House style states how all documents and written communication should be formatted
Consistency across all documents in the portfolio of the company
Used to promote the company
Controls how the colours/font style/font size/font type/position of logo/justification of text/position and style of address
details to be used – 1 mark for any two items

© UCLES 2022 Page 14 of 15


0417/12 Cambridge IGCSE – Mark Scheme May/June 2022
PUBLISHED
Question Answer Marks

16(b) Two from: 2


To display descriptive information on each page
Helps the user to navigate through the document
Used for repeatable items
Headers and footers can be on every page
Maintains consistency in the document
Saves time rather than writing the same things on each page

© UCLES 2022 Page 15 of 15



Cambridge IGCSE

INFORMATION AND COMMUNICATION TECHNOLOGY 0417/13


*2949337011*

Paper 1 Theory May/June 2022


2 hours

You must answer on the question paper.

No additional materials are needed.

INSTRUCTIONS
• Answer all questions.
• Use a black or dark blue pen.
• Write your name, centre number and candidate number in the boxes at the top of the page.
• Write your answer to each question in the space provided.
• Do not use an erasable pen or correction fluid.
• Do not write on any bar codes.
• You may use an HB pencil for any diagrams, graphs or rough working.

INFORMATION
• The total mark for this paper is 100.
• The number of marks for each question or part question is shown in brackets [ ].
• No marks will be awarded for using brand names of software packages or hardware.

This document has 16 pages. Any blank pages are indicated.

06_0417_13_2022_1.12
© UCLES 2022 [Turn over
2

1 Circle two storage devices.

Digital DVD RAM


Bridge Linker
camera Drive

Memory
Mouse Printer Spreadsheet
stick

[2]

2 Name an appropriate validation routine for each statement. Each answer must be different.

(a) The last digit in a code used to ensure the other digits have been entered correctly.

........................................................................................................................................... [1]

(b) This validation routine ensures a password is always 8 characters.

........................................................................................................................................... [1]

(c) This validation routine ensures data has been entered into a field.

........................................................................................................................................... [1]

(d) This validation routine ensures that a date is entered as DD/MM/YYYY.

........................................................................................................................................... [1]

3 Identify two input devices which are used in computer control systems.

1 ...............................................................................................................................................

2 ...............................................................................................................................................

[2]

© UCLES 2022 06_0417_13_2022_1.12


3

4 Computers can store data in the cloud rather than using storage devices in the computer.

(a) Describe three benefits of storing data in the cloud.

1 ........................................................................................................................................

...........................................................................................................................................

2 ........................................................................................................................................

...........................................................................................................................................

3 ........................................................................................................................................

...........................................................................................................................................

[3]

(b) Describe three drawbacks of storing data in the cloud.

1 ........................................................................................................................................

...........................................................................................................................................

2 ........................................................................................................................................

...........................................................................................................................................

3 ........................................................................................................................................

...........................................................................................................................................

[3]

5 The manager of a cinema has purchased a new booking system. There are 26 rows in the cinema
with 20 seats on a row. Each seat is identified by a unique ID. The seat ID consists of the row letter
followed by the position of the seat on the row. An example of the seat on row F position 12 would
be F12.

He is setting up a test plan to test the system.

(a) Write down one example of each of the following types of test data. The answers must be
different in each case.

Normal ..............................................................................................................................

Abnormal ..........................................................................................................................

[2]

© UCLES 2022 06_0417_13_2022_1.12 [Turn over


4

(b) When a ticket is produced for the new system it contains a QR code.

Here is an example of a QR code.

Describe the benefits of using a QR code.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [5]

© UCLES 2022 06_0417_13_2022_1.12


5

(c) Discuss the advantages and disadvantages of using manual booking systems rather than
online booking systems.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [8]

© UCLES 2022 06_0417_13_2022_1.12 [Turn over


6

6 Eye strain is one of the health issues associated with using computers.

(a) Explain three causes of eye strain when using computers.

1 ........................................................................................................................................

...........................................................................................................................................

2 ........................................................................................................................................

...........................................................................................................................................

3 ........................................................................................................................................

...........................................................................................................................................

[3]

(b) Identify four methods of reducing the effects of eye strain.

1 ........................................................................................................................................

...........................................................................................................................................

2 ........................................................................................................................................

...........................................................................................................................................

3 ........................................................................................................................................

...........................................................................................................................................

4 ........................................................................................................................................

...........................................................................................................................................

[4]

© UCLES 2022 06_0417_13_2022_1.12


7

7 Tawara Stores has realised that the number of people shopping for food online has increased over
the past few years.

(a) Discuss the advantages and disadvantages to the customer of shopping for food online.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [8]

© UCLES 2022 06_0417_13_2022_1.12 [Turn over


8

(b) Tawara Stores are also aware that many current websites do not cater for older people. They
intend to create a version of their website for this audience.

Describe the features of this website to meet the needs of an older audience, giving reasons
for your choice of features.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [4]

8 Tawara Hotel uses magnetic stripe cards to allow guests access to their bedrooms. The hotel is
changing the electronic lock it uses on its bedroom doors so the lock can work with RFID cards.

Compare the use of magnetic stripe cards and RFID cards for key entry. Your answer must include
similarities and differences.

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

.................................................................................................................................................. [6]

© UCLES 2022 06_0417_13_2022_1.12


9

9 The Internet of Things (IoT) allows devices as well as computers to connect to the internet using
a router. Each device uses an IP address.

(a) Explain what is meant by an IP address.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [3]

(b) Explain how a router sends data packets to another network.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [3]

(c) The network has a firewall.

Explain why a firewall is needed.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [4]

© UCLES 2022 06_0417_13_2022_1.12 [Turn over


10

10 Both the internet and the intranet are used for communication.

(a) Define the terms internet and intranet.

(i) Internet

................................................................................................................................

................................................................................................................................

................................................................................................................................

................................................................................................................................ [2]

(ii) Intranet

................................................................................................................................

................................................................................................................................

................................................................................................................................

................................................................................................................................ [2]

(b) The World Wide Web is part of the internet.

Explain why the World Wide Web has become so popular.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [6]

© UCLES 2022 06_0417_13_2022_1.12


11

11 An image has been taken of a bird watcher and a bird. The original image has been saved as a
jpg file type. You have been asked to remove parts of the image to just show the bird and to save
it as a png file type to become the new image.

Original image

New image

(a) Explain the steps needed to change the original image to the new image.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [4]

© UCLES 2022 06_0417_13_2022_1.12 [Turn over


12

(b) Explain the differences between a jpg and a png file type.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [4]

12 The protection of personal data is important as many transactions are carried out online.

(a) Explain how to avoid inappropriate disclosure of personal data.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [4]

© UCLES 2022 06_0417_13_2022_1.12


13

(b) Controlling the freedom of speech is part of policing the internet.

Discuss whether the internet should be policed or not.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [4]

13 In a college library if a book is not available students can reserve the book. When the book becomes
available the librarian needs to inform the student. He does this by typing a letter and printing it.
He has a database of students and has decided that in future he will use mail merge to produce
the letters.

Give four advantages of using mail merge instead of typing out the letter each time.

1 ...............................................................................................................................................

..................................................................................................................................................

2 ...............................................................................................................................................

..................................................................................................................................................

3 ...............................................................................................................................................

..................................................................................................................................................

4 ...............................................................................................................................................

..................................................................................................................................................

[4]

© UCLES 2022 06_0417_13_2022_1.12 [Turn over


14

14 People can manage their banking transactions using the internet. However, if the internet signal is
poor telephone banking can be used.

A person wishes to use telephone banking without speaking to an operator to transfer money from
one bank account to another.

Describe the steps needed to do this.

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

.................................................................................................................................................. [6]

© UCLES 2022 06_0417_13_2022_1.12


15

BLANK PAGE

© UCLES 2022 06_0417_13_2022_1.12


16

BLANK PAGE

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable
effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will
be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge Assessment
International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at
www.cambridgeinternational.org after the live examination series.

Cambridge Assessment International Education is part of Cambridge Assessment. Cambridge Assessment is the brand name of the University of Cambridge Local
Examinations Syndicate (UCLES), which is a department of the University of Cambridge.

© UCLES 2022 06_0417_13_2022_1.12


Cambridge IGCSE™

INFORMATION AND COMMUNICATION TECHNOLOGY 0417/13


Paper 1 Theory May/June 2022
MARK SCHEME
Maximum Mark: 100

Published

This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.

Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.

Cambridge International will not enter into discussions about these mark schemes.

Cambridge International is publishing the mark schemes for the May/June 2022 series for most
Cambridge IGCSE, Cambridge International A and AS Level and Cambridge Pre-U components, and some
Cambridge O Level components.

This document consists of 15 printed pages.

© UCLES 2022 [Turn over


0417/13 Cambridge IGCSE – Mark Scheme May/June 2022
PUBLISHED
Generic Marking Principles

These general marking principles must be applied by all examiners when marking candidate answers. They should be applied alongside the
specific content of the mark scheme or generic level descriptors for a question. Each question paper and mark scheme will also comply with these
marking principles.

GENERIC MARKING PRINCIPLE 1:

Marks must be awarded in line with:

 the specific content of the mark scheme or the generic level descriptors for the question
 the specific skills defined in the mark scheme or in the generic level descriptors for the question
 the standard of response required by a candidate as exemplified by the standardisation scripts.

GENERIC MARKING PRINCIPLE 2:

Marks awarded are always whole marks (not half marks, or other fractions).

GENERIC MARKING PRINCIPLE 3:

Marks must be awarded positively:

 marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit is given for valid answers which go beyond the
scope of the syllabus and mark scheme, referring to your Team Leader as appropriate
 marks are awarded when candidates clearly demonstrate what they know and can do
 marks are not deducted for errors
 marks are not deducted for omissions
 answers should only be judged on the quality of spelling, punctuation and grammar when these features are specifically assessed by the
question as indicated by the mark scheme. The meaning, however, should be unambiguous.

GENERIC MARKING PRINCIPLE 4:

Rules must be applied consistently, e.g. in situations where candidates have not followed instructions or in the application of generic level
descriptors.

© UCLES 2022 Page 2 of 15


0417/13 Cambridge IGCSE – Mark Scheme May/June 2022
PUBLISHED
GENERIC MARKING PRINCIPLE 5:

Marks should be awarded using the full range of marks defined in the mark scheme for the question (however; the use of the full mark range may
be limited according to the quality of the candidate responses seen).

GENERIC MARKING PRINCIPLE 6:

Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should not be awarded with grade thresholds or
grade descriptors in mind.

© UCLES 2022 Page 3 of 15


0417/13 Cambridge IGCSE – Mark Scheme May/June 2022
PUBLISHED
Question Answer Marks

1 DVD RAM Drive 2


Memory stick

Question Answer Marks

2(a) Check digit 1

2(b) Length check 1

2(c) Presence check 1

2(d) Format check 1

Question Answer Marks

3 Two from: 2
Sensors
Keypad/Number pad
Touch screen
Microphone
Camera

Question Answer Marks

4(a) Three from: 3


Automatic backup
More storage
Difficult to lose the data as many copies are made of it
Many people can share access to the data
Can be accessed anywhere there is internet connection
Can be accessed from many devices

© UCLES 2022 Page 4 of 15


0417/13 Cambridge IGCSE – Mark Scheme May/June 2022
PUBLISHED
Question Answer Marks

4(b) Three from: 3


No control over data/security
Requires internet access
If the company goes out of business can lose data
If the internet crashes during sending or receiving then data could be lost
Many copies are made of the data which increases security issues
More expensive in the long run due to monthly charges

Question Answer Marks

5(a) Normal 2
Any seat from A1 to Z20//Any letter from A to Z inclusive followed by any number 1 to 20 inclusive
Abnormal
Any incorrect seat row or number/Any character other than A to Z and/or any number outside range 120 or anything that’s
incorrect

5(b) Five from: 5


Can be used for multiple elements
Fast access to additional information
Can be linked into a website
Can automatically link to email
The QR code is unique to the ticket
More robust than bar codes
Secure as the code cannot be swapped

© UCLES 2022 Page 5 of 15


0417/13 Cambridge IGCSE – Mark Scheme May/June 2022
PUBLISHED
Question Answer Marks

5(c) Eight from: 8


Advantages
The customer does not need an email address for the booking
The customer can pay by cash or electronic means whereas is an online system cards/apps are needed
Customers do not need an internet connection
More control of the booking therefore less errors for customers
Easier to cancel a booking once made
It is easier for the customer to gain information/help on the purchase

Disadvantages
Manual systems can result in double booking
Manual booking systems update the data less often than online systems
Difficult to see if a seat is taken as the seats are not updated when booked
Bookings can only be made when the booking office is open
Can only book at a booking office
People have to travel to the booking office to book, therefore wastes time
People have to travel to the booking office to book wastes cost
More difficult to change bookings
Physical tickets are issued which can be lost more easily

To gain full marks the discussion must have correct answers for both advantages and disadvantages

Question Answer Marks

6(a) Three from: 3


Staring at a computer screen for prolonged periods of time
Working in a room with poor lighting/Screen brightness too high/blue light of screen
Wrong setting on contrast
Glare from windows
Flickering screens
Dirty screens
Sitting too close to a screen
Text too small/font colour is contrasting with background/incorrect resolution/screen too small

© UCLES 2022 Page 6 of 15


0417/13 Cambridge IGCSE – Mark Scheme May/June 2022
PUBLISHED
Question Answer Marks

6(b) Four from: 4


Take regular breaks/look into the distance to relax the eyes/look at green objects
Use TFT/LCD/LED/flat screens to reduce the flicker
Use anti-glare screens/TFT/matt screens/window blinds to reduce the glare
Match the lighting in the room with the brightness of the computer screen
Turn the screens 90 degrees to the window to reduce the glare on the screen
Enable blue light filter/wear blue light glasses
Use night screen light on the computer
Have eyes tested regularly
Use a LED/LCD/flat screen monitor can reduce eye strain and headaches
Keep the screen clear of dust/dirt

© UCLES 2022 Page 7 of 15


0417/13 Cambridge IGCSE – Mark Scheme May/June 2022
PUBLISHED
Question Answer Marks

7(a) Eight from: 8


Advantages
No longer need to travel to the store so it saves the cost of travelling
No longer need to travel to the store so it saves the time of travelling
Saves time shopping as favourite lists can be produced
Saves time shopping around different stores
Wider range of shops
Customers can shop 24/7
Customers can compare the prices of different stores without travel
Shopping can take place using mobile devices anywhere there is an internet connection
Regular shopping schedules can be set up
Can see the physical objects in store and then have the advantages of shopping online

Disadvantages
Makes people lazy/lack of exercise
Over-reliance on computers
More security issues
Needs a reliable internet connection
Goods can take time to arrive
Goods could be damaged in transit
More chance of errors in the ordering
More difficult to amend an order after purchase
No way of checking the goods before buying
There may be delivery/packaging costs

To gain full marks the discussion must have correct answers for both advantages and disadvantages

7(b) Four from: 4


Bold colours/contrasting colours making it easier to read
Larger font sizes/clear font so it is easier for people reading the text
Simple navigation makes it easier to find the products
Larger buttons so they can be easily seen
Interactive screens/buttons/drop down menus to reduce typing
Larger bold heading to make it an easy to read layout

© UCLES 2022 Page 8 of 15


0417/13 Cambridge IGCSE – Mark Scheme May/June 2022
PUBLISHED
Question Answer Marks

8 Six from: 6
Similarities
Both have improved security by using encryption
Data cannot be read by eye so more secure
Data can be re-written
Direct data entry
Both allow fast access to the room
Both are read by a reader/scanner
Both can be easily damaged

Differences
RFID is contactless therefore has less wear and tear whereas magnetic is placed in reader
RFID reads the data faster
More data on RFID card
RFID cannot be left in the lock accidentally
RFID cards can be read by others from a distance using a device
Easier to clone a magnetic stripe card
Magnetic cards can only be read in one direction whereas RFID are only tapped
Magnetic stripe can be affected by magnets/mobile phones
RFID cards are more robust

To gain full marks the comparison must have correct answers for both similarities and differences

© UCLES 2022 Page 9 of 15


0417/13 Cambridge IGCSE – Mark Scheme May/June 2022
PUBLISHED
Question Answer Marks

9(a) Three from: 3


Internet protocol address
Assigned to your computer/NIC/device when it connects to a network
Uniquely identifies NIC/device on an IP network/unique number
Locates individual devices on a network/internet
Can show/indicate/track the physical location of the device

9(b) Three from: 3


The router creates data packets
The router receives the data packet
The data packet contains the destination/IP address
The router looks at the destination/IP address in the packet
The router uses its/has a routing table
Router compares the destination address in the packet with the addresses in its routing table
The router then determines the best route to the next router/network/destination

9(c) Four from: 4


It is needed for network security
It controls/checks the incoming and outgoing network traffic
A firewall is a barrier between a trusted secure internal network and the internet//network and the user
It can log incoming and outgoing traffic
It stops malicious traffic/cyber attacks/checks incoming data against criteria
It prevents computers connecting to unwanted sites
It prevents untrusted/un-recognised/un-authorised computers/users accessing data on the system
Protects data
Sends warnings/alerts the user

© UCLES 2022 Page 10 of 15


0417/13 Cambridge IGCSE – Mark Scheme May/June 2022
PUBLISHED
Question Answer Marks

10(a)(i) Two from: 2


Public access
Its world wide/International
Vast collection of computers and networks/network of networks/WAN/Wide Area Network

10(a)(ii) Two from: 2


Private network
Restricted access
Used in companies and organisations
Used to share internal documents, internal emails
Uses internet technology

10(b) Six from: 6


Vast amount of information
Faster to access information
Search engines allow the user to search quickly vast amounts of information
Information increases all the time
Its widely available
Allows users to meet other people/like minded people/communicate with friends over long distances
Easy for all people to use
Allows people to easily join specialist world wide groups
Allows social networking
Pages are hyperlinked so easier/quicker to find related pages
Allows online shopping/banking
Allows online up to date news, sports around the world/TV on demand
Allows interactivity, such as watching a video to see how to do a task/training aid
Helps vulnerable people to communicate with others
Allows people to be creative/make own websites

© UCLES 2022 Page 11 of 15


0417/13 Cambridge IGCSE – Mark Scheme May/June 2022
PUBLISHED
Question Answer Marks

11(a) Four from: 4


Load the image/photo editing software
Load/import the image
Click on image
Click on crop
Move arrows to select area to be cropped/Draw around the area to be cut out
Click on delete/Click outside the image
Select Save As/export and then select png format

11(b) Four from: 4


jpg is lossy format
Smaller file size
Joint photographic experts group
Loses quality when compressed

png is lossless format


Does not lose quality when compressed
Portable network graphics

© UCLES 2022 Page 12 of 15


0417/13 Cambridge IGCSE – Mark Scheme May/June 2022
PUBLISHED
Question Answer Marks

12(a) Four from: 6


Be careful of impersonators/people pretending to be officials
Safely dispose of personal information
Encrypt your data
Keep passwords private/Use a strong password
Don’t share personal data
Keep privacy settings high
Use security software/anti-spyware
Avoid phishing emails
Use a nickname/alias online

12(b) Four from: 4


For policed
Prevents illegal material being readily available
Prevents young children accessing unsuitable material
Ensures copyright laws are maintained
Stops extreme viewpoints from being seen
Prevents libelous text being added
Prevents hate comments/foul language/racial comments

Against policed
Governments block text/viewpoints/their own bias viewpoint
Unsuitable material is easily available in other ways
Control would cost money and users would have to pay
Control would be very difficult to enforce
Could cause less people to use it
Laws are different in each country but the internet is world wide
Creates a feeling of big brother/always being watched

To gain full marks the discussion must have correct answers for both for and against policed

© UCLES 2022 Page 13 of 15


0417/13 Cambridge IGCSE – Mark Scheme May/June 2022
PUBLISHED
Question Answer Marks

13 Four from: 4
Letters can be personalised for each student
The data is from the file therefore fewer errors
Saves time than typing in all the details each time
Letter can be saved and used again
Standard letter can be used each time/More consistency
Data in the database need only be checked
Easier to make changes to the letters

© UCLES 2022 Page 14 of 15


0417/13 Cambridge IGCSE – Mark Scheme May/June 2022
PUBLISHED
Question Answer Marks

14 Six from: 6
User telephones the bank telephone centre
System asks for the long number on the credit/debit card/sort code and account number/customer Access/ID number
The user taps out the number on the phone keypad and presses #/speaks the number
System asks for certain characters in a password/phone banking security number
The user taps out the characters asked for/security number and presses #
System checks the number is correct
System rejects the password/security number
The user re-enters the characters/security number
After three attempts the telephone connection drops
System asks other security answers
The user taps it in/speaks the answer
System asks which service you require/options given
Users tap in the number to select transfer from one account to another
System asks number of account transfer from
User taps in account number
System connects with the bank account
System asks for number of account transfer money to
User taps in account number
System asks amount to transfer
User taps in the amount
Checks the amount in the account/maximum not exceeded
Approves request
If amount exceeded the call is terminated/transaction declined/insufficient funds
System asks when the transfer should happen
The user taps in the date
System asks you to confirm it/sends a text message/send email
Customer hangs up to end the transaction

© UCLES 2022 Page 15 of 15



Cambridge IGCSE

INFORMATION AND COMMUNICATION TECHNOLOGY 0417/11


*8329717149*

Paper 1 Theory October/November 2022


2 hours

You must answer on the question paper.

No additional materials are needed.

INSTRUCTIONS
• Answer all questions.
• Use a black or dark blue pen.
• Write your name, centre number and candidate number in the boxes at the top of the page.
• Write your answer to each question in the space provided.
• Do not use an erasable pen or correction fluid.
• Do not write on any bar codes.
• You may use an HB pencil for any diagrams, graphs or rough working.

INFORMATION
• The total mark for this paper is 100.
• The number of marks for each question or part question is shown in brackets [ ].
• No marks will be awarded for using brand names of software packages or hardware.

This document has 16 pages. Any blank pages are indicated.

11_0417_11_2022_1.16
© UCLES 2022 [Turn over
2

1 Complete the following sentences using the most appropriate words from the list.

centre double line space footer gutter hanging


header indented justified left wrapping

(a) A margin between the main content of the page and the fold of a book is called a

........................................................................................................................................... [1]

(b) An area at the top of a page is called a

........................................................................................................................................... [1]

(c) Feature of word processing that causes text to flow around an image is called

........................................................................................................................................... [1]

(d) When text is aligned along both the left and right margins this is called

........................................................................................................................................... [1]

2 Smartphones and smartwatches can be used in everyday life. A smartwatch is a wearable computer
in the form of a wrist-watch.

(a) Apart from accessing the internet, give three other uses of a smartphone.

1 ........................................................................................................................................

...........................................................................................................................................

2 ........................................................................................................................................

...........................................................................................................................................

3 ........................................................................................................................................

...........................................................................................................................................

[3]

© UCLES 2022 11_0417_11_2022_1.16


3

(b) Give two advantages of using a smartwatch rather than a smartphone.

1 ........................................................................................................................................

...........................................................................................................................................

2 ........................................................................................................................................

...........................................................................................................................................

[2]

(c) Give two disadvantages of using a smartwatch rather than a smartphone.

1 ........................................................................................................................................

...........................................................................................................................................

2 ........................................................................................................................................

...........................................................................................................................................

[2]

3 According to research carried out on passwords the top three most used passwords are 12345,
qwerty and sunshine.

Describe, using other examples, the difference between a weak password and a strong password.

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

.................................................................................................................................................. [4]

© UCLES 2022 11_0417_11_2022_1.16 [Turn over


4

4 A teacher is setting up a database which she will use to record her student’s exam marks.

(a) The teacher is planning to test the mark range using different types of test data. The range of
marks that the teacher can award is 0 to 100.

(i) Write down one example of extreme test data that the teacher can use to check the
range.

................................................................................................................................ [1]

(ii) Extreme test data is one type of test data. The teacher uses two other pieces of test
data.

Write down the type of test data for each of the examples.

TEN .......................................................................................................................

55 ..........................................................................................................................

[2]

(b) Part of the database is shown.

Student_name Date_of_birth Gender Exam_mark Average_mark

Seth 25/02/2007 M 22 43.4

Adom 17/07/2007 M 67 73.1

Maria 02/05/2007 F 78 67.9

Lesedi 15/12/2006 F 45 50.0

Write down the field name which is the most appropriate for the data type, based on the data
shown in the table. Your answers must be different in each case.

Boolean ............................................................................................................................

Numeric: integer ...............................................................................................................

Numeric: decimal ..............................................................................................................

Alphanumeric ....................................................................................................................

[4]

© UCLES 2022 11_0417_11_2022_1.16


5

5 A student is carrying out a scientific experiment to measure the temperature of a liquid as it cools
down. The student uses a sensor connected to a computer to read the temperature.

(a) Give three advantages of using computers and sensors rather than the student taking the
temperature readings herself.

1 ........................................................................................................................................

...........................................................................................................................................

2 ........................................................................................................................................

...........................................................................................................................................

3 ........................................................................................................................................

...........................................................................................................................................

[3]

(b) Describe how the readings taken by the sensor are displayed on a graph using the computer.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [6]

© UCLES 2022 11_0417_11_2022_1.16 [Turn over


6

(c) Explain the differences between measurement systems and control systems.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [4]

© UCLES 2022 11_0417_11_2022_1.16


7

6 There have been major issues regarding the accuracy of facial recognition systems for identifying
suspects by the police.

Tawara Airport has installed biometric security including facial recognition systems to help the
police recognise known criminals entering and leaving the country. Previously video was taken of
all passengers and then checked manually.

(a) Discuss the effectiveness of using facial recognition systems rather than the manual video
system to increase security in this way.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [8]

(b) Give three examples of biometric data.

1 ........................................................................................................................................

2 ........................................................................................................................................

3 ........................................................................................................................................

[3]

© UCLES 2022 11_0417_11_2022_1.16 [Turn over


8

7 Instant messaging involves users sending text messages to each other.

Evaluate how you would use eSafety strategies in your own use of instant messaging.

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

.................................................................................................................................................. [6]

8 Discuss the moral implications which need to be considered when creating an ICT solution.

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

.................................................................................................................................................. [4]

© UCLES 2022 11_0417_11_2022_1.16


9

9 Use of smartphones to access the internet has increased by over 200% in the past five years.

Compare the use of smartphones to access the internet with the use of desktop computers to
access the internet. Your answer must include similarities and differences.

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

.................................................................................................................................................. [6]

© UCLES 2022 11_0417_11_2022_1.16 [Turn over


10

10 A group of students in a school are planning to publicise a school concert. They can either produce
a web page which will be sent to the company that runs the school website or create a multimedia
presentation and show this to students and visitors.

(a) Give two types of content which could be used in a multimedia presentation that cannot be
used in a printed leaflet.

1 ........................................................................................................................................

2 ........................................................................................................................................

[2]

(b) Describe the advantages and disadvantages of using a multimedia presentation rather than
a web page on the school website.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [6]

© UCLES 2022 11_0417_11_2022_1.16


11

The students need to test their multimedia presentation before it can be used.

(c) Name two output devices they can use and for each one, write down a reason for its use.

Output device 1 ................................................................................................................

Reason .............................................................................................................................

...........................................................................................................................................

Output device 2 ................................................................................................................

Reason .............................................................................................................................

...........................................................................................................................................

[4]

11 A receptionist in a medical centre is going to send out emails to patients about medical results. The
receptionist will use the data from patients’ medical and personal records and mail merge these.
One of the disadvantages of this system is that the receptionist will have access to personal data.

(a) Describe four other disadvantages of using mail merge.

1 ........................................................................................................................................

...........................................................................................................................................

2 ........................................................................................................................................

...........................................................................................................................................

3 ........................................................................................................................................

...........................................................................................................................................

4 ........................................................................................................................................

...........................................................................................................................................

[4]

© UCLES 2022 11_0417_11_2022_1.16 [Turn over


12

Due to data protection laws, personal data should be kept confidential and secure.

(b) Explain why personal data should be kept confidential and secure.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [6]

12 Many students prefer to store data on external storage devices like pen drives or portable hard disk
drives.

Describe four advantages of using a pen drive rather than a portable hard disk drive.

1 ...............................................................................................................................................

..................................................................................................................................................

2 ...............................................................................................................................................

..................................................................................................................................................

3 ...............................................................................................................................................

..................................................................................................................................................

4 ...............................................................................................................................................

..................................................................................................................................................

[4]

© UCLES 2022 11_0417_11_2022_1.16


13

13 Hyperlinks, bookmarks and anchors are software tools used in web pages and web browsers.

(a) Describe the function of a hyperlink.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [2]

(b) Describe the term bookmark.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [2]

(c) Describe the function of an anchor.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [2]

© UCLES 2022 11_0417_11_2022_1.16 [Turn over


14

14 A research student is undertaking a study of endangered animals in the Amazon rainforest. She
is using a drone to replace surveys carried out on foot. A drone is a remote-controlled flying vehicle.

Describe the benefits and drawbacks of using a drone to monitor the animals in the rainforest.

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

.................................................................................................................................................. [6]

© UCLES 2022 11_0417_11_2022_1.16


15

BLANK PAGE

© UCLES 2022 11_0417_11_2022_1.16


16

BLANK PAGE

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable
effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will
be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge Assessment
International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at
www.cambridgeinternational.org after the live examination series.

Cambridge Assessment International Education is part of Cambridge Assessment. Cambridge Assessment is the brand name of the University of Cambridge Local
Examinations Syndicate (UCLES), which is a department of the University of Cambridge.

© UCLES 2022 11_0417_11_2022_1.16


Cambridge IGCSE™

INFORMATION & COMMUNICATION TECHNOLOGY 0417/11


Paper 1 Theory October/November 2022
MARK SCHEME
Maximum Mark: 100

Published

This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.

Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.

Cambridge International will not enter into discussions about these mark schemes.

Cambridge International is publishing the mark schemes for the October/November 2022 series for most
Cambridge IGCSE™, Cambridge International A and AS Level components and some Cambridge O Level
components.

This document consists of 10 printed pages.

© UCLES 2022 [Turn over


0417/11 Cambridge IGCSE – Mark Scheme October/November
PUBLISHED 2022

Generic Marking Principles

These general marking principles must be applied by all examiners when marking candidate answers.
They should be applied alongside the specific content of the mark scheme or generic level descriptors
for a question. Each question paper and mark scheme will also comply with these marking principles.

GENERIC MARKING PRINCIPLE 1:

Marks must be awarded in line with:

• the specific content of the mark scheme or the generic level descriptors for the question
• the specific skills defined in the mark scheme or in the generic level descriptors for the question
• the standard of response required by a candidate as exemplified by the standardisation scripts.

GENERIC MARKING PRINCIPLE 2:

Marks awarded are always whole marks (not half marks, or other fractions).

GENERIC MARKING PRINCIPLE 3:

Marks must be awarded positively:

• marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit
is given for valid answers which go beyond the scope of the syllabus and mark scheme,
referring to your Team Leader as appropriate
• marks are awarded when candidates clearly demonstrate what they know and can do
• marks are not deducted for errors
• marks are not deducted for omissions
• answers should only be judged on the quality of spelling, punctuation and grammar when these
features are specifically assessed by the question as indicated by the mark scheme. The
meaning, however, should be unambiguous.

GENERIC MARKING PRINCIPLE 4:

Rules must be applied consistently, e.g. in situations where candidates have not followed
instructions or in the application of generic level descriptors.

GENERIC MARKING PRINCIPLE 5:

Marks should be awarded using the full range of marks defined in the mark scheme for the question
(however; the use of the full mark range may be limited according to the quality of the candidate
responses seen).

GENERIC MARKING PRINCIPLE 6:

Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should
not be awarded with grade thresholds or grade descriptors in mind.

© UCLES 2022 Page 2 of 10


0417/11 Cambridge IGCSE – Mark Scheme October/November
PUBLISHED 2022

Question Answer Marks

1(a) Gutter 1

1(b) Header 1

1(c) Wrapping 1

1(d) Justified 1

Question Answer Marks

2(a) Three from, for example: 3


SMS
Making/receiving a phone call
Checking the time
Use appointments/calendar
Taking pictures
Record sound
Bluetooth to share files

2(b) Two from: 2


More accessible/portable as it is on the wrist
Less chance of being lost/stolen/forgotten
Less chance of it being dropped as it is fastened to the wrist
Can access simple apps easier for example heart rate/timer

2(c) Two from: 2


Smaller screen size therefore difficult to see
More difficult to enter the data
More difficult to access detailed apps for example, email

Question Answer Marks

3 Max three from: 4


Weak password is easy to guess
Weak passwords consist of all letters or all digits or all digits with one letter/all
letters with one digit//words found in a dictionary//Strong passwords use a
mixture of upper case, lower case, symbols and digits
Weak password is one that has less than 8 characters
Weak password has repeated characters
Weak password has characters next to each other on a QWERTY keyboard
Weak passwords are ones that are similar to the username
Weak passwords can use personal information
All of the examples given in the question are weak passwords

Max two from:


A good example of a strong password
A good example of a different weak password

© UCLES 2022 Page 3 of 10


0417/11 Cambridge IGCSE – Mark Scheme October/November
PUBLISHED 2022

Question Answer Marks

4(a)(i) One from: 1


0
100

4(a)(ii) Abnormal 2
Normal

4(b) Boolean Gender 4


Numeric: integer Exam_mark
Numeric: decimal Average_mark
Alphanumeric Student_name

Question Answer Marks

5(a) Three from: 3


Measurements can be taken continually
Safer to take the measurements
Measurements can be taken outside school hours
The computer will not forget to take readings
Readings are taken at a more consistent time interval
The computer reads the data more accurately

5(b) Six from: 6


The data from the sensor is read/received by the computer
The data is converted to digital by the ADC
The software is opened on the computer
The graph type is loaded/selected
The data is uploaded to the graph
The graph is plotted/created
Axes/legend/title added

5(c) Four from: 4


Measurement
Automatically detects changes in the environment
Measurement takes the readings and stores the result
Measures/reads physical quantities

Control
Changes the environment
Compares against preset value
Action taken depending on comparison to preset value

To gain full marks the description must have correct answers for both
measurement and control

© UCLES 2022 Page 4 of 10


0417/11 Cambridge IGCSE – Mark Scheme October/November
PUBLISHED 2022

Question Answer Marks

6(a) Eight from: 8


For
Face can be identified faster
Face can be identified by electronic comparison therefore relative higher level
of accuracy
Facial recognition can uniquely identify individuals
Can automatically compare faces from older images
System can work continuously but a human checker would need to take
breaks

Against
Dark glasses/facial hair/face coverings may cause the facial recognition
systems to not work
More difficult to change biometric data
Recognising a person can be slower as more checking is carried out
Harder to set up the facial recognition system
Takes longer to add new people to the system
Biometrics can use a lot of memory to store the data
Intrusive as personal details have to be stored
More likely to be affected by the environment
With the video system each frame needs to be checked with known images
which can lead to errors

To gain full marks the discussion must have correct answers for both
for and against

6(b) Three from: 3


Finger print
Hand print
Vein geometry
Retina
Iris
Speech/Voice

© UCLES 2022 Page 5 of 10


0417/11 Cambridge IGCSE – Mark Scheme October/November
PUBLISHED 2022

Question Answer Marks

7 Six from: 6
I block unwanted messages/suspicious users…
…and report the sender
Before using the messaging system, I check how to block and report
unwanted users…
…this stops predators
I never arrange to meet strangers alone
I always tell a responsible adult if I plan to meet someone
I always meet in a public place
I avoid giving away personal information
I report abusive messages from a sender of the messages
I report cyber-bullying
When sending messages I always use appropriate language
If someone messages me with private and personal information about
themselves I respect their confidentiality/privacy
I always read carefully the messages before I send
I avoid sarcasm
I am not offensive when replying
I carefully check that I am replying to the correct person
I do not enable my location when messaging

Question Answer Marks

8 Four from: 4
What may be immoral in some cultures may be acceptable in others
Just because something is immoral doesn't mean that it is illegal
The ICT solution can cause distress to others/be offensive
Becomes immoral if the person gains from their actions

Max two marks for examples:


Not creating a website full of false facts/news
Not including obscene/offensive/inappropriate/extreme/blasphemy
/discriminatory content
Not creating a video solution that earns you money by stating false facts/lies
Not creating an ICT solution that coerces people to give money
Invasion of privacy

© UCLES 2022 Page 6 of 10


0417/11 Cambridge IGCSE – Mark Scheme October/November
PUBLISHED 2022

Question Answer Marks

9 Six from: 6
Similarities
Both can use Wi-Fi to access the internet
Both can access the internet use hotspots
Both can use Bluetooth Tethering to allow access to the internet

Differences
Desktops
More websites will work with the desktop
Larger keyboards to type in a web address
Larger screens to see the whole webpage
More stable and reliable connections
Tends to be a clearer layout to make it easier to access the internet
More accessible information
A desktop can connect to the internet via an ethernet cable

Smartphones
Access the internet from more locations
Easier to look things up on the go
Screen/keyboard built into the device therefore easier to access websites
A smartphone can use mobile data/4G/3G to access the internet
A smartphone is more portable therefore you can access the internet while
travelling

To gain full marks the comparison must have correct answers for both
similarities and differences

Question Answer Marks

10(a) Two from: 2


Moving images/video
Sound/Audio
Animation

© UCLES 2022 Page 7 of 10


0417/11 Cambridge IGCSE – Mark Scheme October/November
PUBLISHED 2022

Question Answer Marks

10(b) Six from: 6


Advantages
Easier to display to parents
Can take less time to display the information
Quicker to change/update content of the multimedia presentation
More control over the layout of the presentation as not using a third party
browser
More control over the sound in the presentation as using own equipment
People viewing the Multimedia Presentation will be school based
Can be viewed without internet access

Disadvantages
The multimedia presentation is only available in the school during school time
whereas a web page can be used in other places
The visitor may not see the whole presentation
The multimedia presentation may not include sound due to being shown in
the school
Multimedia presentations can require expensive hardware to produce and
view
Multimedia seen by less people
Multimedia more expensive software needed to produce the presentation
More specialist training needed to produce it

To gain full marks the description must have correct answers for both
advantages and disadvantages

10(c) Monitor/data projector – 1 mark 4


One from:
To show what the presentation looks like
To show the layout of the presentation

Speaker – 1 mark
To listen if the sound matches the images – 1 mark

Printer – 1 mark
To check that handout format works – 1 mark

Question Answer Marks

11(a) Four from: 4


The email appears generic
If the email is not checked and the data not kept up to date before the mail
merge the errors are more difficult to change
If a mistake is made on the master/template then all emails are affected
Emails can be sent with wrong data/records which could be embarrassing
Emails could be sent to the wrong patient
Moving the data file/source/renaming the file can cause the mail merge to fail
The emails may be directed to junk mail folders

© UCLES 2022 Page 8 of 10


0417/11 Cambridge IGCSE – Mark Scheme October/November
PUBLISHED 2022

Question Answer Marks

11(b) Six from: 6


The data will have the name/medical information attached therefore it needs
protecting
The data is confidential as it links directly to the person
The data will be sensitive
To prevent blackmail/bullying from using medical results
To prevent fraud from using financial information
To prevent identity theft using contact details
To avoid the doctor’s surgery getting fined if it got made public
The doctor’s surgery’s reputation would suffer
Patients would lose trust

Question Answer Marks

12 Four from: 4
Is more robust as no moving parts
Can be more easily carried
Use less power
Have faster data access
Have faster data transfer times

Question Answer Marks

13(a) Two from: 2


Method of accessing/linking other resources/web pages from the current web
page
Clicking on the word/phrase/image/area of page
Navigation/re-directed to another web page

13(b) Two from: 2


Method of saving a web page’s address
Used for easy retrieval of the website
Storing a link to a website

13(c) Two from: 2


An anchor is a specific location/reference point within a web page
When clicked it can move the pointer to the start/end of a page
Used on very long pages to save you having to physically scroll all the way
down/up the page.
The browser will automatically jump to the corresponding heading within the
page/destination anchor

© UCLES 2022 Page 9 of 10


0417/11 Cambridge IGCSE – Mark Scheme October/November
PUBLISHED 2022

Question Answer Marks

14 Six from: 6
Benefits
Safer to use drones than human life being risked in forest areas
Drones can gain a better overall view of the forest than the human
Drones can be used in areas that would not be accessible to humans
Drones can cover a greater area than a human in the time available
Data from the drone can be automatically uploaded to computer system
May change animal behaviour if humans are used//Less invasive for the
animals

Drawbacks
Damp conditions/environment/weather may cause issues with the electronics
Difficult to navigate in the tree areas
Noise/sight of the drone may affect the animals
More chance of collision/bird attack
If drone crashes it could be difficult to find/retrieve
Potential danger to other animals/birds

To gain full marks the description must have correct answers for both
benefits and drawbacks

© UCLES 2022 Page 10 of 10



Cambridge IGCSE

INFORMATION AND COMMUNICATION TECHNOLOGY 0417/12


*5122596074*

Paper 1 Theory October/November 2022


2 hours

You must answer on the question paper.

No additional materials are needed.

INSTRUCTIONS
• Answer all questions.
• Use a black or dark blue pen.
• Write your name, centre number and candidate number in the boxes at the top of the page.
• Write your answer to each question in the space provided.
• Do not use an erasable pen or correction fluid.
• Do not write on any bar codes.
• You may use an HB pencil for any diagrams, graphs or rough working.

INFORMATION
• The total mark for this paper is 100.
• The number of marks for each question or part question is shown in brackets [ ].
• No marks will be awarded for using brand names of software packages or hardware.

This document has 16 pages. Any blank pages are indicated.

11_0417_12_2022_1.13
© UCLES 2022 [Turn over
2

1 Complete the following sentences using the most appropriate words from this list of word processing
terms.

bullet centred gutter hanging header


justified landscape orphan portrait widow

(a) The orientation of a page that is wider than it is high is called

........................................................................................................................................... [1]

(b) A symbol placed in front of each item in a list is called a

........................................................................................................................................... [1]

(c) The indentation of a paragraph where all the lines except the first are indented is called

........................................................................................................................................... [1]

(d) The last line of a paragraph that appears as the first line of the next page is called a

........................................................................................................................................... [1]

2 Database, presentation, spreadsheet and word processing software are used by a medical centre.

Tick (✓) the most appropriate piece of software to carry out the tasks shown.

database presentation spreadsheet word processing


(✓) (✓) (✓) (✓)
Producing a letter to send out to
patients

Creating graphs to show


numbers of people attending the
medical centre

Creating queries from patients’


details

Creating an interactive display


of services offered

[4]

© UCLES 2022 11_0417_12_2022_1.13


3

3 Smartphones use a Graphical User Interface (GUI).

(a) Give three benefits of using a GUI.

1 ........................................................................................................................................

...........................................................................................................................................

2 ........................................................................................................................................

...........................................................................................................................................

3 ........................................................................................................................................

...........................................................................................................................................

[3]

(b) Give three characteristics of a smartphone.

1 ........................................................................................................................................

...........................................................................................................................................

2 ........................................................................................................................................

...........................................................................................................................................

3 ........................................................................................................................................

...........................................................................................................................................

[3]

© UCLES 2022 11_0417_12_2022_1.13 [Turn over


4

4 Workers in an office log onto the office computer network using a password.

(a) Aaron is using his name as his password.

Give two reasons why this is not a good idea.

1 ........................................................................................................................................

...........................................................................................................................................

2 ........................................................................................................................................

...........................................................................................................................................

[2]

(b) One method that hackers use to find people’s passwords is to install key-logging spyware onto
computers.

Give two methods that could be used to safely enter passwords even if key-logging spyware
has been installed on a computer.

1 ........................................................................................................................................

...........................................................................................................................................

2 ........................................................................................................................................

...........................................................................................................................................

[2]

© UCLES 2022 11_0417_12_2022_1.13


5

5 The secretary of a sports club is setting up a database of members to replace the current manual
system. He will need to create a database structure.

(a) Describe the steps involved in setting up and testing the database structure before it can be
used in the new system.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [4]

When the new system is completed it needs to be implemented. The secretary of the sports club
can implement it using direct changeover or parallel running.

(b) Describe the term parallel running, giving one benefit and one drawback of using this method
of implementation.

Parallel running .................................................................................................................

...........................................................................................................................................

Benefit ..............................................................................................................................

...........................................................................................................................................

Drawback ..........................................................................................................................

...........................................................................................................................................

[3]

© UCLES 2022 11_0417_12_2022_1.13 [Turn over


6

6 In June 2000 the London Millennium Bridge opened to the public but closed shortly afterwards for
repairs. The bridge was swaying as people walked across it. Before bridges are built, computer
models are produced and the models are tested.

Explain why computer models are used before building a bridge.

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

.................................................................................................................................................. [4]

7 A club has many members. The secretary of the club wants to keep details of the club members
in a database.

(a) Describe the benefits and drawbacks of storing membership details on a computer database.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [6]

© UCLES 2022 11_0417_12_2022_1.13


7

(b) The secretary collects data from the members on paper-based forms.

Describe five features of a well-designed paper-based data capture form.

1 ........................................................................................................................................

...........................................................................................................................................

2 ........................................................................................................................................

...........................................................................................................................................

3 ........................................................................................................................................

...........................................................................................................................................

4 ........................................................................................................................................

...........................................................................................................................................

5 ........................................................................................................................................

...........................................................................................................................................

[5]

© UCLES 2022 11_0417_12_2022_1.13 [Turn over


8

8 In 2019 Cambridge recorded the highest temperature for July in the UK. The data was collected
automatically using sensors by a weather station and sent to a computer.

Discuss the advantages and disadvantages of using sensors to collect data rather than humans
collecting the data.

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

.................................................................................................................................................. [8]

© UCLES 2022 11_0417_12_2022_1.13


9

9 Many organisations store data in the cloud.

(a) Explain what is meant by the ICT term cloud.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [3]

(b) Explain the issues of storing data in the cloud.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [6]

© UCLES 2022 11_0417_12_2022_1.13 [Turn over


10

As our use of the cloud increases, new ways of accessing it safely need to be developed.

(c) The use of typed passwords is being replaced by biometric methods.

Discuss the benefits and drawbacks of using biometric methods.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [8]

© UCLES 2022 11_0417_12_2022_1.13


11

10 High street banks now offer customers access to internet banking when they are in the physical
bank.

Discuss the advantages and disadvantages to the bank of using internet banking in this way.

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

.................................................................................................................................................. [6]

11 A village is built next to a river. During heavy rain the river floods and endangers the people living
in the village. If the river is in danger of flooding, an email is sent to all members of the village.

(a) Explain why an email group is used when contacting the villagers.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [3]

© UCLES 2022 11_0417_12_2022_1.13 [Turn over


12

Sensors are placed in the river to check the water level. If the water level in the river rises more
than 5m above normal river levels, a flood barrier is raised to safeguard the village. The flood barrier
remains raised until the water level drops to normal levels.

(b) Explain why the data from the sensors cannot be read directly by the computer and name the
device that needs to be used so that the computer can read the data.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [3]

(c) Describe how a microprocessor uses the data from the sensors to raise and lower the flood
barrier.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [6]

© UCLES 2022 11_0417_12_2022_1.13


13

12 A computer system uses a Graphical User Interface (GUI).

Write down two features of a GUI and for each give a reason why they are needed.

Feature 1 ..................................................................................................................................

Reason 1 ..................................................................................................................................

..................................................................................................................................................

Feature 2 ..................................................................................................................................

Reason 2 ..................................................................................................................................

..................................................................................................................................................

[4]

13 Computers are being used in offices.

Describe how the use of computers has affected the work of employees and their working patterns.

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

.................................................................................................................................................. [6]

© UCLES 2022 11_0417_12_2022_1.13 [Turn over


14

14 rtf and pdf are file types.

(a) Describe what is meant by an rtf and a pdf file type.

rtf ......................................................................................................................................

...........................................................................................................................................

pdf .....................................................................................................................................

...........................................................................................................................................

[2]

(b) Explain the differences between the two file types.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [3]

15 Proofreading is often confused with visual verification.

Describe the differences between proofreading and visual verification.

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

.................................................................................................................................................. [2]

© UCLES 2022 11_0417_12_2022_1.13


15

BLANK PAGE

© UCLES 2022 11_0417_12_2022_1.13


16

BLANK PAGE

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable
effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will
be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge Assessment
International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at
www.cambridgeinternational.org after the live examination series.

Cambridge Assessment International Education is part of Cambridge Assessment. Cambridge Assessment is the brand name of the University of Cambridge Local
Examinations Syndicate (UCLES), which is a department of the University of Cambridge.

© UCLES 2022 11_0417_12_2022_1.13


Cambridge IGCSE™

INFORMATION & COMMUNICATION TECHNOLOGY 0417/12


Paper 1 Theory October/November 2022
MARK SCHEME
Maximum Mark: 100

Published

This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.

Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.

Cambridge International will not enter into discussions about these mark schemes.

Cambridge International is publishing the mark schemes for the October/November 2022 series for most
Cambridge IGCSE™, Cambridge International A and AS Level components and some Cambridge O Level
components.

This document consists of 9 printed pages.

© UCLES 2022 [Turn over


0417/12 Cambridge IGCSE – Mark Scheme October/November
PUBLISHED 2022

Generic Marking Principles

These general marking principles must be applied by all examiners when marking candidate answers.
They should be applied alongside the specific content of the mark scheme or generic level descriptors
for a question. Each question paper and mark scheme will also comply with these marking principles.

GENERIC MARKING PRINCIPLE 1:

Marks must be awarded in line with:

• the specific content of the mark scheme or the generic level descriptors for the question
• the specific skills defined in the mark scheme or in the generic level descriptors for the question
• the standard of response required by a candidate as exemplified by the standardisation scripts.

GENERIC MARKING PRINCIPLE 2:

Marks awarded are always whole marks (not half marks, or other fractions).

GENERIC MARKING PRINCIPLE 3:

Marks must be awarded positively:

• marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit
is given for valid answers which go beyond the scope of the syllabus and mark scheme,
referring to your Team Leader as appropriate
• marks are awarded when candidates clearly demonstrate what they know and can do
• marks are not deducted for errors
• marks are not deducted for omissions
• answers should only be judged on the quality of spelling, punctuation and grammar when these
features are specifically assessed by the question as indicated by the mark scheme. The
meaning, however, should be unambiguous.

GENERIC MARKING PRINCIPLE 4:

Rules must be applied consistently, e.g. in situations where candidates have not followed
instructions or in the application of generic level descriptors.

GENERIC MARKING PRINCIPLE 5:

Marks should be awarded using the full range of marks defined in the mark scheme for the question
(however; the use of the full mark range may be limited according to the quality of the candidate
responses seen).

GENERIC MARKING PRINCIPLE 6:

Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should
not be awarded with grade thresholds or grade descriptors in mind.

© UCLES 2022 Page 2 of 9


0417/12 Cambridge IGCSE – Mark Scheme October/November
PUBLISHED 2022

Question Answer Marks

1(a) Landscape 1

1(b) Bullet 1

1(c) Hanging 1

1(d) Widow 1

Question Answer Marks

2 4
database presentation spreadsheet word
(✓) (✓) (✓) processing
(✓)

Producing a
letter to send

out to
patients

Creating
graphs to
show
numbers of

people
attending the
medical
centre

Creating
queries from

patient’s
details

Creating an
interactive
display of ✓
services
offered

Question Answer Marks

3(a) Three from: 3


Quick to enter commands
Easy to enter commands
Do not have to learn commands
Less errors as commands not typed
Works with a touch screen
Intuitive
Easy to select options/tasks

© UCLES 2022 Page 3 of 9


0417/12 Cambridge IGCSE – Mark Scheme October/November
PUBLISHED 2022

Question Answer Marks

3(b) Three from: 3


Connectivity – can connect using Wi-Fi/3G/4G/5G/Bluetooth/NFC
Touch screen technology
Camera Technology
Responds to physical world using sensors
GPS/Sat nav
Audio technology
Messaging technology

Question Answer Marks

4(a) Two from: 2


Password is too short
Easy to guess
Contains personal information
Doesn’t contain a mixture of uppercase, lowercase letters, numbers, and
symbols
Contains repeated letters

4(b) Two from: 2


Use drop-down lists
Use biometric passwords
Use one use tokens/OTP
Use a device instead of a password

Question Answer Marks

5(a) Max three from: 4


Load the database software
Set up tables
Set up field names
Set up primary/foreign key fields
Set up relationships
Set up the field types/properties/formatting/data types
Set up the validation routines
Set up input forms
Set up queries/reports
Type in/import records
Create a test strategy/plan

Max three from:


Test using normal, abnormal, and extreme data
If errors are found, make corrections
Re-test the database structure
Test with live data

© UCLES 2022 Page 4 of 9


0417/12 Cambridge IGCSE – Mark Scheme October/November
PUBLISHED 2022

Question Answer Marks

5(b) The old and new systems/both run side by side until the new system takes 3
over

Benefit
One from:
The old system can be used as a back up
Staff can be trained gradually

Drawback
One from:
More time consuming as the data needs to be entered into two systems
More chance of error on data entry as two systems are being used
More costly as there are two sets of staff
Uses more power running two systems

Question Answer Marks

6 Four from: 4
Fewer errors in final version of real item as errors would have been resolved
in model
Saves money as it saves on resources
Safer to run a computer model rather than risking human life
Different scenarios/what ifs can be carried out which may happen in real life/to
experiment
To build the bridge and test it would be impracticable due to cost/time

Question Answer Marks

7(a) Six from: 6


Benefits
Membership details can be searched very quickly as there are many
members
Membership details can be quickly edited/updated
The data in the database can be backed up easily
Easier to create an archive of past members
More secure with a valid reason
Can be used as a source for mail merging
Less errors as data does not have to be re-written
Reduces the time as data does not have to be re-written

Drawbacks
Need IT skills to use the software/computer
Need to have to additional equipment which is expensive
Can take up a lot of storage space/memory in the computer
Expensive to buy software
Expensive to secure the system as it contains personal data
Training staff on how to use the software will be time consuming
Training could be expensive for the club

To gain full marks the description must have correct answers for both
benefits and drawbacks

© UCLES 2022 Page 5 of 9


0417/12 Cambridge IGCSE – Mark Scheme October/November
PUBLISHED 2022

Question Answer Marks

7(b) Five from: 5


Adequate space for response//Individual character boxes
Fonts/font size should be easy to read
Instructions how to complete form
Logical order of questions
Questions spaced out
Appropriate white space
Questions should be clear and understandable

Question Answer Marks

8 Eight from: 8
Advantages
Readings are taken at a more consistent time interval
The sensor reads the data more accurately
Safer as humans do not need to take the measurements
Computers can analyse the data continuously
Readings taken more frequently
Multiple variables can be monitored at the same time

Disadvantages
Sensors can malfunction due to the temperature
If sensors malfunction this could lead to incorrect readings
Sensors could be stolen

To gain full marks the discussion must have correct answers for both
advantages and disadvantages

Question Answer Marks

9(a) Three from: 3


Cloud consists of large groups of remote networked servers
They allow centralised data storage
Offsite data storage/servers owned by a third party
Accessed from any internet compatible device
Access from anywhere with an internet connection

9(b) Six from: 6


Loss of control of the data as the data is controlled by a data storage provider
Data can be affected without the user knowing
The data remains on the server for a long time therefore more chance of it
being hacked
Many copies of the data made therefore easier to compromise
Users must use strong passwords/authentication methods as hackers have
longer time to be able to crack the password
If internet connection is lost, then the cloud cannot be accessed
If internet connection is lost when data is saved, then data could be lost
A subscription needs to be paid whereas an HDD is one fee
Difficult to delete all copies of a file as it is in multiple locations

© UCLES 2022 Page 6 of 9


0417/12 Cambridge IGCSE – Mark Scheme October/November
PUBLISHED 2022

Question Answer Marks

9(c) Eight from: 8


Benefits
Faster way of accessing systems
Cannot forget the biometric data
Must be physically at the device to access it
More secure as it uses unique data
Difficult to copy/forge

Drawbacks
Invasion of privacy
User may not know they have logged off
Biometrics may change therefore data will need to be kept up to date
Expensive method/technology to set up
Environment can affect measurements
Over usage can affect the measurements
Difficult to reset once compromised
Difficult to set up
Time consuming to set up as measurements must be taken
Facial coverings/changes can prevent system from working

To gain full marks the discussion must have correct answers for both
benefits and drawbacks

Question Answer Marks

10 Six from: 6
Advantages
Branches can stay open longer and offer other services
More bank staff are available to help customers
Less chance of hacking/fraud as system used in the banks
Fewer bank tellers so more profitable for the bank
As the service is quicker/more services more likely to remain

Disadvantages
Initial cost of hardware/software is expensive
Need to retrain staff which can be expensive
System maintenance costs will be expensive as more inexperienced people
are using the system
Staff numbers may increase as staff are needed to help internet banking
customers

To gain full marks the discussion must have correct answers for both
advantages and disadvantages

© UCLES 2022 Page 7 of 9


0417/12 Cambridge IGCSE – Mark Scheme October/November
PUBLISHED 2022

Question Answer Marks

11(a) Three from: 3


The sender only needs to type in the name of the group
Saves time rather than typing out all the email addresses
Less likely that an email address is omitted
The sender does not have to remember individual email addresses
Less likely to send the same email twice to one villager
Less likely to send emails to the wrong people

11(b) Data from sensor is in analogue form 3


Computer only reads digital data
Analogue to Digital Convertor

11(c) Six from: 6


Microprocessor reads the data from the ADC
Microprocessor stores pre-set value
Microprocessor compares current water level with preset value
If the current water level is greater than the pre-set value …
… the microprocessor sends a signal ...
… to the DAC to convert data to analogue
… signal sent to an actuator
Actuator raises the flood barrier
Continual process

Question Answer Marks

12 One mark for correct feature and one mark for correct associated reason 4

Feature: Windows
Reasons: See more than one task at a time
Each task can be in a separate window
To display the task

Feature: Icons
Reasons: Tasks can be recognised
Click on an icon and it opens (a task/app)
Easy/faster to open an app by clicking on it

Feature: Menus
Reasons: To choose all the available options

Feature: Pointers
Reasons: To select tasks/icons

© UCLES 2022 Page 8 of 9


0417/12 Cambridge IGCSE – Mark Scheme October/November
PUBLISHED 2022

Question Answer Marks

13 Max five from: 6


The use of computers has reduced the number of office staff
Computers can help office staff to be more productive
More employees are working from home due to the increase in technology
Computers can cause less productivity due to distractions
Workers could be working longer hours
De-skilling of staff
Increase in training for staff as they need to learn new skills
Increase in the number of blue-collar workers/supervisors
Increase in the number of maintenance staff/technicians
Higher security issues due to networking
Less people work in offices

Max two marks:


Increase in part time/job sharing/compressed hours/flexible working/working
from home
Computers have allowed staff to work part-time/compressed hours/job
sharing/flexible working/working from home

Question Answer Marks

14(a) rtf 2
Text file with formatting/generic text files
pdf
Standard/generic image file

14(b) Three from: 3


pdf their layout and formatting stay the same, regardless of which
device/operating system/application being used whereas rtf formatting can
change
pdf take up less memory for the same size of document
pdf files are compressed
pdf the formatting can be more complex whereas rtf has basic formatting
pdf are harder to edit
pdf generic image format

rtf can be read by most word processing editors


rtf is a generic text format

Question Answer Marks

15 Two from: 2
Visual verification refers to the original document whereas proofreading does
not need to refer to the original document
Proofreading is checking spelling and grammar errors whereas visual
verification does not check for errors
Visual verification checks that the data has been copied correctly

© UCLES 2022 Page 9 of 9



Cambridge IGCSE

INFORMATION AND COMMUNICATION TECHNOLOGY 0417/13


*0243543375*

Paper 1 Theory October/November 2022


2 hours

You must answer on the question paper.

No additional materials are needed.

INSTRUCTIONS
• Answer all questions.
• Use a black or dark blue pen.
• Write your name, centre number and candidate number in the boxes at the top of the page.
• Write your answer to each question in the space provided.
• Do not use an erasable pen or correction fluid.
• Do not write on any bar codes.
• You may use an HB pencil for any diagrams, graphs or rough working.

INFORMATION
• The total mark for this paper is 100.
• The number of marks for each question or part question is shown in brackets [ ].
• No marks will be awarded for using brand names of software packages or hardware.

This document has 16 pages. Any blank pages are indicated.

11_0417_13_2022_1.11
© UCLES 2022 [Turn over
2

1 Complete the following sentences using the most appropriate words from the list.

centred a footer a gutter a header indented


justified landscape an orphan portrait a widow

(a) The orientation of a page that is taller than it is wide is called

........................................................................................................................................... [1]

(b) An area at the bottom of a page is called

........................................................................................................................................... [1]

(c) The first line of a paragraph that appears as the last line of the previous page is called

........................................................................................................................................... [1]

(d) Text that is aligned horizontally in the middle of a line is called

........................................................................................................................................... [1]

2 A computer controlled glasshouse is used to grow plants.

State three sensors that could be used in the glasshouse.

1 ...............................................................................................................................................

2 ...............................................................................................................................................

3 ...............................................................................................................................................

[3]

3 Circle two features of multimedia presentations which would not be found in a word processed
document.

bullets images numbers photographs

sound tables text video

[2]

© UCLES 2022 11_0417_13_2022_1.11


3

4 A person contacts an online medical website that uses an expert system to allow users to
self-diagnose illnesses.

(a) Write down the component within the expert system that matches the definition given.

(i) This component contains a database of facts.

................................................................................................................................

................................................................................................................................ [1]

(ii) This component carries out the reasoning of the expert system.

................................................................................................................................

................................................................................................................................ [1]

(iii) This component allows the person to interact with the system.

................................................................................................................................

................................................................................................................................ [1]

(b) Describe how an expert system is used to diagnose an illness.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [6]

© UCLES 2022 11_0417_13_2022_1.11 [Turn over


4

5 A restaurant uses a number of different types of software. These include control, measurement,
spreadsheet and word processing software.

(a) Tick (✓) the most appropriate piece of software to carry out the tasks shown.

Word
Control Measurement Spreadsheet processing
(✓) (✓) (✓) (✓)

Producing menus for the restaurant

Calculating the cost of each of the


meals

Automatically turning on the fans


when the room gets too hot

Monitoring the temperature in the


restaurant

[4]

© UCLES 2022 11_0417_13_2022_1.11


5

The restaurant owner is planning to upgrade the software used to book reservations. He has
employed a systems analyst who is analysing the current system. The systems analyst can either
send out questionnaires for staff to answer or observe staff working with the current system.

(b) Discuss the advantages and disadvantages of using questionnaires that staff answer rather
than observing staff to gather information about the current system.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [6]

© UCLES 2022 11_0417_13_2022_1.11 [Turn over


6

6 A web page can contain images saved as png or gif file types.

(a) State what is meant by png and gif file types.

png ....................................................................................................................................

...........................................................................................................................................

gif ......................................................................................................................................

...........................................................................................................................................

[2]

(b) Explain the differences between the two file types.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [3]

© UCLES 2022 11_0417_13_2022_1.11


7

7 A school librarian is setting up a database of all the revision books he has in stock. The school
library sells revision books to students. The books range in value from $1 to $10 and are available
either in electronic book type (E) or physical book type (P).

(a) The librarian is planning to set up a number of different types of validation rule for the fields
to check data entry. Write down the most appropriate field name from the table that could be
used with each of the validation rules. Your answers must be different in each case.

Name_of_book Department ISBN Book_type Cost

Modern History HIS 0140621393432 P $5.20

GCSE ICT ICT 0006132237 E $1

A Level Calculus MAT 0006153516 E $1

Human Biology SCI 0006511376 E $2.30

Presence ..........................................................................................................................

Lookup ..............................................................................................................................

Range ...............................................................................................................................

Length ...............................................................................................................................

[4]

The librarian needs to set up a primary key field.

(b) Write down the most appropriate field name from the table that could be used as a primary
key field.

........................................................................................................................................... [1]

© UCLES 2022 11_0417_13_2022_1.11 [Turn over


8

Most of the revision books are available in electronic book type as digital versions of the printed
books. These are stored as interactive PDF files.

(c) Describe the benefits and drawbacks of using the digital versions.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [6]

© UCLES 2022 11_0417_13_2022_1.11


9

8 An organisation has changed the way in which members of staff can enter the building. Previously
they typed in a four-digit code on a key pad; now they use a device that reads a handprint.

(a) Discuss the effectiveness of using a handprint to enter the building rather than keying in a
code.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [8]

Handprint scans are an example of a biometric method to enter a building.

(b) Give two other examples of biometric methods that could be used in this scenario.

1 ........................................................................................................................................

2 ........................................................................................................................................

[2]

© UCLES 2022 11_0417_13_2022_1.11 [Turn over


10

9 The use of email has replaced many forms of communication.

Describe the constraints that you need to consider when writing and sending an email.

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

.................................................................................................................................................. [6]

10 (a) For each of the following types of backing storage give one example of its associated media.
Your answers must be different in each case.

Optical ..............................................................................................................................

...........................................................................................................................................

Magnetic ...........................................................................................................................

...........................................................................................................................................

Solid state .........................................................................................................................

...........................................................................................................................................

[3]

© UCLES 2022 11_0417_13_2022_1.11


11

(b) Describe three differences between optical and magnetic backing storage.

1 ........................................................................................................................................

...........................................................................................................................................

2 ........................................................................................................................................

...........................................................................................................................................

3 ........................................................................................................................................

...........................................................................................................................................

[3]

11 A student is carrying out some research for school.

(a) Explain two ways she could search for information on the World Wide Web (WWW).

1 ........................................................................................................................................

...........................................................................................................................................

2 ........................................................................................................................................

...........................................................................................................................................

[2]

(b) Explain the differences between the internet and the World Wide Web (WWW).

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [4]

© UCLES 2022 11_0417_13_2022_1.11 [Turn over


12

12 The internet contains three web development layers. One layer is the content layer. This layer is
used to enter the content of a web page structure.

(a) Name and describe the other two web development layers.

Layer .................................................................................................................................

Description ........................................................................................................................

...........................................................................................................................................

Layer .................................................................................................................................

Description ........................................................................................................................

...........................................................................................................................................

[4]

(b) Explain why tables can be used to structure elements within a web page.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [3]

© UCLES 2022 11_0417_13_2022_1.11


13

13 A teacher is concerned that students are playing online computer games at home without considering
eSafety. The teacher is going to create a set of rules that he feels they should be following.

Write down a list of eSafety rules that he could include.

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

.................................................................................................................................................. [6]

14 Explain why page, section and column breaks are used in documents.

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

.................................................................................................................................................. [3]

© UCLES 2022 11_0417_13_2022_1.11 [Turn over


14

15 An employee is carrying out work for her company at home. The work she is doing is confidential.
She has been advised by her company to use encryption. She wishes to transfer some of this work
to the office.

(a) Discuss two different methods she could use to transfer this work to the office. Include in your
answer the advantages and disadvantages of each method.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [6]

(b) Describe what is meant by the term encryption and why it is used.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [3]

© UCLES 2022 11_0417_13_2022_1.11


15

(c) Tick (✓) the most appropriate working pattern to match the following statements.

Compressed Flexible Job Part-time


hours hours sharing working
(✓) (✓) (✓) (✓)

An employee works a full day but


negotiates with the employer the start
and end times

An employee works the same number


of hours as a full week but in fewer
days

An employee works for fewer hours


than a full-time employee

[3]

© UCLES 2022 11_0417_13_2022_1.11


16

BLANK PAGE

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable
effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will
be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge Assessment
International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at
www.cambridgeinternational.org after the live examination series.

Cambridge Assessment International Education is part of Cambridge Assessment. Cambridge Assessment is the brand name of the University of Cambridge Local
Examinations Syndicate (UCLES), which is a department of the University of Cambridge.

© UCLES 2022 11_0417_13_2022_1.11


Cambridge IGCSE™

INFORMATION & COMMUNICATION TECHNOLOGY 0417/13


Paper 1 Theory October/November 2022
MARK SCHEME
Maximum Mark: 100

Published

This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.

Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.

Cambridge International will not enter into discussions about these mark schemes.

Cambridge International is publishing the mark schemes for the October/November 2022 series for most
Cambridge IGCSE™, Cambridge International A and AS Level components and some Cambridge O Level
components.

This document consists of 9 printed pages.

© UCLES 2022 [Turn over


0417/13 Cambridge IGCSE – Mark Scheme October/November
PUBLISHED 2022

Generic Marking Principles

These general marking principles must be applied by all examiners when marking candidate answers.
They should be applied alongside the specific content of the mark scheme or generic level descriptors
for a question. Each question paper and mark scheme will also comply with these marking principles.

GENERIC MARKING PRINCIPLE 1:

Marks must be awarded in line with:

• the specific content of the mark scheme or the generic level descriptors for the question
• the specific skills defined in the mark scheme or in the generic level descriptors for the question
• the standard of response required by a candidate as exemplified by the standardisation scripts.

GENERIC MARKING PRINCIPLE 2:

Marks awarded are always whole marks (not half marks, or other fractions).

GENERIC MARKING PRINCIPLE 3:

Marks must be awarded positively:

• marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit
is given for valid answers which go beyond the scope of the syllabus and mark scheme,
referring to your Team Leader as appropriate
• marks are awarded when candidates clearly demonstrate what they know and can do
• marks are not deducted for errors
• marks are not deducted for omissions
• answers should only be judged on the quality of spelling, punctuation and grammar when these
features are specifically assessed by the question as indicated by the mark scheme. The
meaning, however, should be unambiguous.

GENERIC MARKING PRINCIPLE 4:

Rules must be applied consistently, e.g. in situations where candidates have not followed
instructions or in the application of generic level descriptors.

GENERIC MARKING PRINCIPLE 5:

Marks should be awarded using the full range of marks defined in the mark scheme for the question
(however; the use of the full mark range may be limited according to the quality of the candidate
responses seen).

GENERIC MARKING PRINCIPLE 6:

Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should
not be awarded with grade thresholds or grade descriptors in mind.

© UCLES 2022 Page 2 of 9


0417/13 Cambridge IGCSE – Mark Scheme October/November
PUBLISHED 2022

Question Answer Marks

1(a) portrait 1

1(b) a footer 1

1(c) an orphan 1

1(d) centred 1

Question Answer Marks

2 Three from: 3
Light
Temperature
Humidity/moisture
pH
CO2

Question Answer Marks

3 Sound 2
Video

Question Answer Marks

4(a)(i) Knowledge base 1

4(a)(ii) Inference engine 1

4(a)(iii) Interactive user interface 1

4(b) Six from: 6


An Interactive user interface appears
The expert system asks questions about the illness
Yes and No type answers to the questions
Answers lead to other questions
The inference engine searches…
…the knowledge base…
…uses the rules base
Probabilities/possibilities of diagnoses and treatments are displayed
Displays the ways it achieved the solutions/conclusions

© UCLES 2022 Page 3 of 9


0417/13 Cambridge IGCSE – Mark Scheme October/November
PUBLISHED 2022

Question Answer Marks

5(a) 4
Control Measure Spread Wordproc
(✓) ment sheet essing
(✓) (✓) (✓)

Producing menus for the



restaurant

Calculating the cost of



each of the meals

Automatically turning on
the fans when the room ✓
gets too hot

Monitoring the
temperature in the ✓
restaurant

5(b) Six from: 6


Advantages
Answers are more honest as they are anonymous
Staff can remain anonymous whereas the observation cannot be
anonymous
Can be sent to all the staff at the same time whereas the observer may only
see one part of the operation
Questionnaires can be filled in at any time whereas observations can only
be carried out when the restaurant is working
Analysis of questionnaire can be carried out automatically whereas
observations the observer must produce notes
Observer may miss elements whereas questionnaires are filled in by the
users

Disadvantages
Users do not always complete the questionnaire and hand it back but
observation watches users working
Work rate can be influenced by being observed but this does not apply to
questionnaires
More chances of incorrect data if question not understood
The observer can see exactly how the system works well and not so well
whereas a questionnaire takes the users viewpoint

To gain full marks the discussion must have correct answers for both
advantages and disadvantages

© UCLES 2022 Page 4 of 9


0417/13 Cambridge IGCSE – Mark Scheme October/November
PUBLISHED 2022

Question Answer Marks

6(a) png 2
One from:
Raster/full colour digital photos
Images with a transparent background

gif
Moving/animated image

6(b) Three from: 3


Same images saved as a GIF loads/reads faster than PNG
GIF uses limited colours (256) whereas PNG uses a bitmap of colours
GIF can have moving and static images whereas PNG only have static
images
PNG can have transparent background
PNG is compressed
PNG is lossless

Question Answer Marks

7(a) Presence ISBN 4


Lookup Book_type
Range Cost
Length Department

7(b) ISBN 1

7(c) Six from: 6


Benefits
Digital therefore can easily be used in other documents/software
Instant access on many devices
More accessible for disabled
Quicker to search digital books

Drawbacks
Health issues with using a computer to read the book
Cannot be written in braille
May require extra software/reader
Never own the book as it is only data
Need to purchase a device to read them
Needs the internet to download the book

To gain full marks the description must have correct answers for both
benefits and drawbacks

© UCLES 2022 Page 5 of 9


0417/13 Cambridge IGCSE – Mark Scheme October/November
PUBLISHED 2022

Question Answer Marks

8(a) Eight from: 8


Positives
Data can be read/identified faster
Data can be read/identified by electronic comparison therefore relative higher
level of accuracy
Increases security as the hand is unique whereas a four-digit code easier to
guess
Can’t forget your handprint, unlike a code
The person must be present to enter the building

Negatives
If the hand is damaged, then may not work
More difficult to change biometric data
Only works with one hand therefore difficult for right-handed people
Recognition could be slower as system is more complex
Harder to set up the biometric system
Takes longer to add new people/change biometric data to the system
Biometrics can use a lot of memory to store the data
Intrusive as personal details must be stored in biometrics
More likely to be affected by the environment

To gain full marks the discussion must have correct answers for both
positives and negatives

8(b) Two from: 2


Fingerprint
Vein geometry
Retina
Iris
Face

Question Answer Marks

9 Six from: 6
Abide by the laws within the country that affect the general use of emails
Use acceptable language
Abide by copyright
Follow local guidelines set by an employer/schools
Use appropriate security
Follow netiquette
Respect other people/s/own privacy
Be aware of the need for password protection
Be aware that email accounts can be Illegally accessed

© UCLES 2022 Page 6 of 9


0417/13 Cambridge IGCSE – Mark Scheme October/November
PUBLISHED 2022

Question Answer Marks

10(a) Optical 3
CD ROM/DVD ROM, CD R/DVD R, CD RW/DVD RW, DVD RAM, Blu-ray
discs/CD/DVD

Magnetic
Fixed/portable/removable hard disks/magnetic tape.

Solid state
Memory stick/flash card

10(b) Three from: 3


Optical data is stored using laser whereas Magnetic data is stored using
magnetic fields
Optical disc storage is serial whereas Magnetic disk storage is direct/sectors
and tracks
Magnetic storage is affected by magnetic fields whereas Optical storage is
not
Magnetic media tends to store more data than optical media
Optical storage is more robust
Optical has a faster data access/transfer speed

Question Answer Marks

11(a) Two from: 2


Type in a web address
Use a search engine
Type what you need on the search bar

11(b) Four from: 4


The internet
Network of Networks//WAN
It is the infrastructure
Contains email, FTP

The World Wide Web


Collection of websites
Accessed from the internet
Service of the internet

To gain full marks the explanation must have correct answers for both
the internet and World Wide Web

© UCLES 2022 Page 7 of 9


0417/13 Cambridge IGCSE – Mark Scheme October/November
PUBLISHED 2022

Question Answer Marks

12(a) Presentation 4
Defines the format of a web page/individual elements through styling

Behaviour
To enter scripting language to a web page/individual element

12(b) Three from: 3


Allows greater control over page layout
Positions elements/data on the page
Conveys relationships between items
Displays data

Question Answer Marks

13 Six from: 6
Examples
Do not give away personal information
Do not use your real name as your username
Do not use your face image as your avatar
If you receive messages from unwanted users block and report them
Do not meet unknown users in real life//use a chaperone
Do not give financial information to other users
If you receive unwanted and abusive messages report the sender of the
messages
When sending messages always us appropriate language
Think before you reply to a message

Question Answer Marks

14 Three from: 3
To adjust pagination
To avoid orphans/widows
To improve layout on the page
To allow for the change of orientation of pages in the document
To enable to start a new chapter on a new page

© UCLES 2022 Page 8 of 9


0417/13 Cambridge IGCSE – Mark Scheme October/November
PUBLISHED 2022

Question Answer Marks

15(a) Use of the Cloud 6


The cloud does not require a physical device
Storage size is not an issue with the cloud

Cloud is operated by a third party therefore security could be an issue


Require a stable internet to access to upload and download the data

Portable device: pen drive/Hard drive


The device uses USB port therefore it is easy to plug in
Does not require access to the internet to access the data

May be lost/damaged in transit


Magnetic drives can be affected by strong magnets/x rays
Limited number of read/writes

Email as an attachment
Do not require physical device

Require access to the email account both at home and in the office
The memory size could be an issue
Requires the use of the internet

15(b) Max two from: 3


Scrambling data
Changing plain text into cipher
Encryption converts text into a meaningless form

Max two from:


To prevent data/information from being understandable to people who
access/intercept the data
Protects data

15(c) 3
Part-
Compressed Flexible Job
time
hours hours sharing
working
(✓) (✓) (✓)
(✓)

An employee works a
full day but negotiates

with the employer the
start and end times

An employee works the


same time as a full ✓
week but in fewer days

An employee works for


fewer hours than a full- ✓
time employee

© UCLES 2022 Page 9 of 9

You might also like