Professional Documents
Culture Documents
Cambridge IGCSE
INSTRUCTIONS
• Answer all questions.
• Use a black or dark blue pen.
• Write your name, centre number and candidate number in the boxes at the top of the page.
• Write your answer to each question in the space provided.
• Do not use an erasable pen or correction fluid.
• Do not write on any bar codes.
• You may use an HB pencil for any diagrams, graphs or rough working.
INFORMATION
• The total mark for this paper is 100.
• The number of marks for each question or part question is shown in brackets [ ].
• No marks will be awarded for using brand names of software packages or hardware.
03_0417_12_2020_1.21
© UCLES 2020 [Turn over
2
1.........................................................................................................................................
2.........................................................................................................................................
[2]
(b) Identify two internal hardware devices from the given list.
1.........................................................................................................................................
2.........................................................................................................................................
[2]
2 Tick (✓) whether the following statements refer to the internet or an intranet.
internet intranet
(✓) (✓)
[2]
3 Chess players can use expert systems to help them practise chess moves.
Name two other applications which involve the use of expert systems.
1 ................................................................................................................................................
..................................................................................................................................................
2 ................................................................................................................................................
..................................................................................................................................................
[2]
4 Smart technology is increasingly being used in everyday life. Many people are now using smart
devices such as smartwatches.
(a) Tick (✓) whether the following statements most appropriately refer to a desktop computer,
a tablet computer or a smartwatch.
desktop tablet
computer computer smartwatch
(✓) (✓) (✓)
[4]
(b) Smartphones are more likely to be used than laptop computers for everyday ICT use.
1.........................................................................................................................................
...........................................................................................................................................
2.........................................................................................................................................
...........................................................................................................................................
3.........................................................................................................................................
...........................................................................................................................................
[3]
5 A school examinations officer has set up a spreadsheet of candidates for the IGCSE examinations.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [5]
(b) The examinations officer is planning to change the range E3 to F6 in the formula to a named
range.
(i) Explain why he should do this rather than using the cell references.
................................................................................................................................
................................................................................................................................
................................................................................................................................
................................................................................................................................
................................................................................................................................
................................................................................................................................ [3]
................................................................................................................................
................................................................................................................................ [1]
(c) A formula has been placed in cell F9. The formula is COUNTIF(A4:A15,''E'')
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [2]
6 A teacher has created a hierarchical file structure to save the registers and marks of each of her
classes on her laptop computer. Part of the structure is shown:
C:
Work
Class_A1
Examination_Marks
Registers
Class_Reports
(a) Write down the file path to locate a document which is stored in the folder Examination_Marks.
C: ......................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [3]
(b) The teacher could have saved the document as a .txt or an .rtf file format.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [2]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [3]
(d) A master document has been created. The teacher will mail merge the personal details of
each student into the document.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [4]
7 A company is considering developing a laptop computer that only uses biometric methods to
authorise user access to this laptop computer. The developers are considering using facial
recognition.
(a) Explain, giving other examples, why biometric methods are considered to be a more secure
way of authorising access to the laptop computer rather than typing in passwords.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [6]
(b) Describe the disadvantages of using facial recognition to authorise access to the laptop
computer.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [4]
8 A headteacher plans to use a computer database to keep records of the members of staff that
teach in her school. She must choose between using a flat file database or a relational database.
(a) Explain the differences between a flat file database and a relational database.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [2]
(b) The school keeps details of the teachers in one file and the subjects they teach in another file.
A teacher teaches more than one subject.
Describe the steps the headteacher would need to take to create a relational database from
this data.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [4]
[4]
10 Arjun is taking a gap year between his studies and will be travelling through Kenya. He needs to
remain in contact with his parents and is considering using either a cell phone or VoIP.
(a) Describe the benefits of using each of these communication methods to stay in contact with
his parents.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
VoIP ..................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[4]
(b) From time to time Arjun’s parents transfer money from their bank account to his bank account
using online banking.
...........................................................................................................................................
........................................................................................................................................... [1]
(c) When Arjun logs onto his online banking he needs to enter his username and password. The
system may also ask him to provide an answer to a security question.
Tick (✓) whether the following are appropriate examples of a security question or not.
[2]
(d) Give three benefits of Arjun using online banking in this scenario.
1.........................................................................................................................................
...........................................................................................................................................
2.........................................................................................................................................
...........................................................................................................................................
3.........................................................................................................................................
...........................................................................................................................................
[3]
(e) Give two drawbacks of Arjun using online banking in this scenario.
1.........................................................................................................................................
...........................................................................................................................................
2.........................................................................................................................................
...........................................................................................................................................
[2]
Discuss how their use has affected the nature of employment in the car production industry.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
.................................................................................................................................................. [6]
12 When people use the internet for shopping and banking it is essential that they use a website that
has a secure server.
(a) Describe the features of a web page that identify it as using a secure server.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [4]
(b) As more and more people use smartphones as computer systems, security can be breached.
Smishing and pharming are ways in which data can be compromised on a smartphone.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [6]
(a) Discuss the advantages and disadvantages of using a multimedia presentation rather than
printed leaflets.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [8]
(b) The sales representative decides to create a multimedia presentation and wishes to place an
image of the new product on one of the slides.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [4]
(c) He searches his company website to find a suitable image for his multimedia presentation.
Part of the markup language from the web page to load the image is shown.
When the markup is run, the words ‘company logo’ are displayed and not the image.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [2]
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable
effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will
be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge Assessment
International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at
www.cambridgeinternational.org after the live examination series.
Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of
Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge.
Published
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.
Cambridge International will not enter into discussions about these mark schemes.
Cambridge International is publishing the mark schemes for the March 2020 series for most Cambridge
IGCSE™, Cambridge International A and AS Level components and some Cambridge O Level components.
These general marking principles must be applied by all examiners when marking candidate answers. They should be applied alongside the
specific content of the mark scheme or generic level descriptors for a question. Each question paper and mark scheme will also comply with these
marking principles.
• the specific content of the mark scheme or the generic level descriptors for the question
• the specific skills defined in the mark scheme or in the generic level descriptors for the question
• the standard of response required by a candidate as exemplified by the standardisation scripts.
Marks awarded are always whole marks (not half marks, or other fractions).
• marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit is given for valid answers which go beyond the
scope of the syllabus and mark scheme, referring to your Team Leader as appropriate
• marks are awarded when candidates clearly demonstrate what they know and can do
• marks are not deducted for errors
• marks are not deducted for omissions
• answers should only be judged on the quality of spelling, punctuation and grammar when these features are specifically assessed by the
question as indicated by the mark scheme. The meaning, however, should be unambiguous.
Rules must be applied consistently e.g. in situations where candidates have not followed instructions or in the application of generic level
descriptors.
Marks should be awarded using the full range of marks defined in the mark scheme for the question (however; the use of the full mark range may
be limited according to the quality of the candidate responses seen).
Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should not be awarded with grade thresholds or
grade descriptors in mind.
1(a) Webcam 2
Mouse
1(b) RAM 2
Video card
2 2
internet intranet
4(a) 4
desktop tablet
smartwatch
computer computer
Three from:
Looks up/searches the value in A2
Looks up in the range E3:F6
Retrieves/displays the corresponding value
From the second column of the range
Displays the value/produces ICT in A3
5(c) Counts the number of candidates/people that are opting for the ICT examination 2
or
6(a) \Work\Class_A1\Examination_Marks\ 3
\Work – 1 mark
\Class_A1 – 1 mark
\Examination_Marks – 1 mark
9 4
header footer margin
Text entered that can appear at the top of each page automatically
An area between the main content of a page and the edge of the page
Text entered that can appear at the bottom of each page automatically
Cell phone
He could use his cell phone to send text messages
Text messages can be sent at any time of the day//Text messages are not affected by time zone differences
He can capture image/audio and send them
VoIP
Used on any computing device that can connect to the internet
Can connect using hot spots
Live videos can be sent
To gain full marks it needs at least one benefit of using a cell phone and at least one benefit of using VoIP
10(c) 2
Appropriate Not Appropriate
13(a) Advantages 8
Max five from:
Allows the use of sound/animation/video/transitions to make the presentation//leaflets cannot use sound/animation/video
Can be more interactive therefore can be used on a company website/interactive whiteboard
Hyperlinks can be used//the users of the leaflet would have to type in the hyperlink
No printing costs
More accessible (speak text, etc.)
People can throw away leaflets without reading them
Easier to update
Disadvantages
Max five from:
Special equipment is needed to view the presentation
Power/equipment failure/corrupted software can be an issue
There could be more focus on the presentation rather than the content
People have to be present in the lecture room
The leaflet can be read at any time
Presentations cannot be written in braille
INSTRUCTIONS
• Answer all questions.
• Use a black or dark blue pen.
• Write your name, centre number and candidate number in the boxes at the top of the page.
• Write your answer to each question in the space provided.
• Do not use an erasable pen or correction fluid.
• Do not write on any bar codes.
• You may use an HB pencil for any diagrams, graphs or rough working.
INFORMATION
• The total mark for this paper is 100.
• The number of marks for each question or part question is shown in brackets [ ].
• No marks will be awarded for using brand names of software packages or hardware.
06_0417_11_2020_1.13
© UCLES 2020 [Turn over
2
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
..................................................................................................................................... [2]
1...................................................................................................................................
.....................................................................................................................................
2...................................................................................................................................
.....................................................................................................................................
[2]
2 Tick (✓) whether the following statements refer to a Command Line Interface (CLI) or a Graphical
User Interface (GUI).
CLI GUI
(✓) (✓)
The user has to type in every
instruction
The user does not need to
learn any of the instructions
Each instruction has to be
typed in correctly
The user is in direct
communication with the
computer
[2]
3 Every computer contains input and output devices and a central processing unit (CPU).
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
..................................................................................................................................... [4]
Name the most appropriate device used to read the following data.
..................................................... .....................................................
0 26815 38221 6
..................................................... .....................................................
[4]
4 A hospital is creating a database to store blood donors’ medical details. The fields in the
database include Health_number, Date_of_birth, Gender and Blood_group.
(a) When a new blood donor wishes to give blood they need to fill in a form.
Each blood donor has a unique health number which uses a 10-digit number, for example
9434765919.
Blood donor
Name a suitable data type for the answers given to each of the questions in the form. For
any numeric field, specify the type of number.
Question 1...................................................................................................................
Question 2...................................................................................................................
Question 3...................................................................................................................
Question 4...................................................................................................................
[4]
(b) In the Blood_group field the only data that can be entered is A, B, AB or O.
Tick (✓) whether each of the following blood groups is an example of abnormal or normal
data.
abnormal normal
Blood group
(✓) (✓)
AB
AO
[2]
(c) The administrator needs a list of all the blood donors in the database with blood group A
as well as in the same list all the blood donors with blood group AB. This list will only
include female blood donors.
To find the blood donor with the health number 9434765919 he will need to type in the
following query.
Health_number = 9434765919
Write a query to find all the female blood group donors with the blood group A as well as
those with AB.
.....................................................................................................................................
..................................................................................................................................... [6]
(d) When the details of a new donor are added to the database the person’s date of birth is
entered.
Explain why the administrator would prefer their date of birth to be stored rather than their
age.
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
..................................................................................................................................... [4]
(e) Name the most appropriate validation check for the Health_number.
.....................................................................................................................................
..................................................................................................................................... [1]
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
..................................................................................................................................... [6]
(b) Smishing is another security issue. Describe the methods which can be used to help
prevent smishing.
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
..................................................................................................................................... [6]
6 Tick (✓) which of the following statements apply to LANs, which apply to WANs and which
apply to WLANs.
[4]
7 The headteacher of a school has decided to replace desktop computers with laptop computers.
Describe the advantages and disadvantages of using a laptop computer rather than a desktop
computer.
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................ [4]
8 Following recent data protection issues the personal data we allow organisations to share about
us may be reduced.
(a) Discuss the benefits and drawbacks of trying to keep personal data confidential and secure.
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
..................................................................................................................................... [6]
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
..................................................................................................................................... [2]
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
..................................................................................................................................... [4]
(a) Tick (✓) which of the following devices used at a POS terminal are only input devices,
which are only output devices and which are both.
Buzzer
Receipt printer
Electronic scales
[6]
(b) A stock file contains data about the goods being sold. Describe the steps needed to update
the stock file when an item is scanned at the point of sale (POS) terminal. Include in your
description how new stock can be ordered automatically.
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
..................................................................................................................................... [6]
10 The network manager at a school has been asked to develop a student registration system to
help staff keep a record of student attendance.
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
..................................................................................................................................... [6]
(b) The school is planning to use fingerprints as a way to record when students arrive in the
class.
Describe the advantages and disadvantages of using fingerprint data entry for student
registration systems rather than magnetic ID cards.
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
..................................................................................................................................... [4]
1...................................................................................................................................
.....................................................................................................................................
2...................................................................................................................................
.....................................................................................................................................
3...................................................................................................................................
.....................................................................................................................................
[3]
11 Most data protection acts include the principle that data should be accurate and, where
necessary, kept up to date.
1..........................................................................................................................................
............................................................................................................................................
2..........................................................................................................................................
............................................................................................................................................
3..........................................................................................................................................
............................................................................................................................................
4..........................................................................................................................................
............................................................................................................................................
[4]
12 The way we buy products using credit cards has changed in recent years. Originally the magnetic
stripe on the back of the card was used with a signature. Then chip and PIN methods were
used, and more recently contactless methods have been introduced.
Discuss the effectiveness of using these different methods to improve security when paying
for goods.
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................ [8]
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable
effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will
be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge Assessment
International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at
www.cambridgeinternational.org after the live examination series.
Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of
Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge.
Published
Students did not sit exam papers in the June 2020 series due to the Covid-19 global pandemic.
This mark scheme is published to support teachers and students and should be read together with the
question paper. It shows the requirements of the exam. The answer column of the mark scheme shows the
proposed basis on which Examiners would award marks for this exam. Where appropriate, this column also
provides the most likely acceptable alternative responses expected from students. Examiners usually review
the mark scheme after they have seen student responses and update the mark scheme if appropriate. In the
June series, Examiners were unable to consider the acceptability of alternative responses, as there were no
student responses to consider.
Mark schemes should usually be read together with the Principal Examiner Report for Teachers. However,
because students did not sit exam papers, there is no Principal Examiner Report for Teachers for the June
2020 series.
Cambridge International will not enter into discussions about these mark schemes.
Cambridge International is publishing the mark schemes for the June 2020 series for most Cambridge
IGCSE™ and Cambridge International A & AS Level components, and some Cambridge O Level
components.
These general marking principles must be applied by all examiners when marking candidate answers.
They should be applied alongside the specific content of the mark scheme or generic level descriptors
for a question. Each question paper and mark scheme will also comply with these marking principles.
• the specific content of the mark scheme or the generic level descriptors for the question
• the specific skills defined in the mark scheme or in the generic level descriptors for the question
• the standard of response required by a candidate as exemplified by the standardisation scripts.
Marks awarded are always whole marks (not half marks, or other fractions).
• marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit
is given for valid answers which go beyond the scope of the syllabus and mark scheme,
referring to your Team Leader as appropriate
• marks are awarded when candidates clearly demonstrate what they know and can do
• marks are not deducted for errors
• marks are not deducted for omissions
• answers should only be judged on the quality of spelling, punctuation and grammar when these
features are specifically assessed by the question as indicated by the mark scheme. The
meaning, however, should be unambiguous.
Rules must be applied consistently e.g. in situations where candidates have not followed
instructions or in the application of generic level descriptors.
Marks should be awarded using the full range of marks defined in the mark scheme for the question
(however; the use of the full mark range may be limited according to the quality of the candidate
responses seen).
Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should
not be awarded with grade thresholds or grade descriptors in mind.
2 2
CLI GUI
4(b) 2
abnormal normal
AB
C
B
AO
Gender – 1 mark
= F – 1 mark
AND –1 mark
= A* – 1 mark
use of wildcard – 1 mark
Blood_group – 1 mark
The age changes every year therefore it will need to be changed regularly ...
... Administration of the database becomes more time consuming.
The age of the donor can be easily and automatically calculated from their
date of birth ...
... improving accuracy.
Comparisons
Both use the internet
Both redirect the user to a fake website
Both can lead to fraud and identity theft
Both use websites that look legitimate
Personal data is compromised
Differences
With phishing emails are sent to the computer
In pharming malicious code is uploaded to the computer
In phishing clicking a link sends user to a fake website
In pharming the code redirects the user to a fake website without their
knowledge
The email in phishing appears to have come from a trusted source
Website in pharming appears to be genuine
In pharming spyware can be used to record key presses
Avoid clicking on any unknown texts with links/Avoid clicking links in texts
from people you do not know.
Do not reply to text messages that have asked you about any of your
personal finances/details.
Be on the lookout for messages that contain the number 5000 or any
number that is not a phone number as this is used by smishers.
If the text messages urge you for a quick reply then that is a clear sign of
smishing.
Never call back a phone number that was associated with the text from an
unknown source.
If the text message was sent at an unusual time, then that is another sign of
smishing.
6 4
LAN WAN WLAN
Advantages
All elements are together in one unit therefore takes up less space
They are portable
Can be used in more places than a desktop
Disadvantages
Easier to steal/lose
Limited battery life so more likely to run out of power
Pointing devices can be more difficult to use
In built webcams can be more difficult to use rather than a desktop
If one piece of hardware breaks it can be more difficult to replace
Desktops have a better heat dispersion rate
More likely to be damaged as they are portable.
Screen size may be smaller
Less powerful
Benefits
If personal data is kept confidential then identity theft is reduced
It helps prevent fraud
Reduces the chance of users suffering harm from criminals, as less data for
criminals to attempt to access
Protects sensitive data
… examples:
racial/ethnic/political/religious/membership of trade unions/health/criminal
activity
Protects the data being used for purposes other than what it was collected
for
Drawbacks
Difficult to enforce as users give information freely
Most users do not read the terms and conditions before agreeing to them,
therefore allowing data to be used
Data protection is local but networks are global so laws are difficult to
enforce
Younger people do not mind that data is passed on therefore the law could
not be enforced for all
9(a) 6
Device Input Output Both
Buzzer
Receipt printer
Electronic scales
If less than the re-order level then the item is automatically re-ordered – 1
mark
Advantages
Fingerprints are unique
More accurate data entry
Improved security
Your fingerprints are with you all the time/cannot be lost/ID cards can be lost
Student needs to be present at the reader
Magnetic cards can be affected by magnetic fields/smart phones
Very difficult to clone unlike cards
Disadvantages
Takes a longer time to collect all the fingerprints and store them rather than
producing ID cards
Equipment would be more expensive
Damage to the finger/reader will give false readings/no reading
Invasion of privacy
11 Four from: 4
Data should be fairly and lawfully processed
Data should only be processed for the stated purpose
Data should be adequate, relevant and not excessive/limited
Data should not be kept longer than necessary
Data should be processed in accordance with the data subject’s rights
Data should be kept secure
Data should not be transferred to another country unless they have
adequate protection.
Data should be processed in a transparent manner
Data should be collected for specified/explicit/legitimate purposes
Data should only be further processed for archive purposes which is
compatible with the initial purposes
Data kept for archiving should safeguard the rights and freedoms of
individuals
Explicit consent required for processing sensitive data
Parental consent required for processing personal data of children including
online services
Data subjects are allowed access to their personal data
12 Magnetic stripe 8
Benefits
The user needs to have the card present to use it
Data more difficult to copy as it uses a stripe
Increased security as signature is also needed
Drawbacks
The card could be stolen and the signature copied
Magnetic stripe can be affected by magnetic fields
Card can be damaged due to overuse
Contactless
Benefits
More secure as encryption is used to read the card
Card details can be stored on a smartphone which might have an extra layer
of security
Stops shoulder surfing
Only allows a small amount to be transacted
Drawbacks
Someone who steals the card can use it without a PIN
Can be cloned using electronic devices
No contact with the device so other devices may ‘read’ the card accidentally
Security risk as the card contains personal information
To achieve full marks all three methods must be discussed, the discussion
must also cover both the benefits and drawbacks.
INSTRUCTIONS
• Answer all questions.
• Use a black or dark blue pen.
• Write your name, centre number and candidate number in the boxes at the top of the page.
• Write your answer to each question in the space provided.
• Do not use an erasable pen or correction fluid.
• Do not write on any bar codes.
• You may use an HB pencil for any diagrams, graphs or rough working.
INFORMATION
• The total mark for this paper is 100.
• The number of marks for each question or part question is shown in brackets [ ].
• No marks will be awarded for using brand names of software packages or hardware.
06_0417_12_2020_1.15
© UCLES 2020 [Turn over
2
1 The 2020 Olympic Games committee is producing a database to show the medal winners in the
cycling events.
It is important that the correct data type is used in each of the fields.
(a) Tick (✓) the most appropriate data type for each of the following fields.
Text
Boolean Numeric
(alphanumeric)
(✓) (✓)
(✓)
Athlete_name
Gold_medal (Y/N)
Age
Name_of_country
[4]
(b) A report has been produced that shows the male gold medal winners from the past three
Olympic Games.
Write down six of the formatting features that have been used in the report.
1.........................................................................................................................................
...........................................................................................................................................
2.........................................................................................................................................
...........................................................................................................................................
3.........................................................................................................................................
...........................................................................................................................................
4.........................................................................................................................................
...........................................................................................................................................
5.........................................................................................................................................
...........................................................................................................................................
6.........................................................................................................................................
...........................................................................................................................................
[6]
........................................................................................................................................... [1]
1.........................................................................................................................................
...........................................................................................................................................
2.........................................................................................................................................
...........................................................................................................................................
[2]
3 Complete the following sentences using the most appropriate network term.
A communication method that wirelessly connects a mobile phone to a car, to allow hands-free
A network device that allows a stand-alone computer, using a dial-up analogue connection, to
[4]
4 A teacher is creating a spreadsheet that will record the grades students achieved in recent tests
and compare the average grades of these tests with the students’ forecast grades. The grading
the teacher is using awards 1 for the highest grade down to 10 for the lowest. The teacher has
created a validation rule on the grade entered.
(a) Give examples of data used to test the validation rule. Your answers for abnormal test data
must be for a different reason in each case.
Normal
Abnormal
Abnormal
Extreme
[4]
(b) Part of the spreadsheet is shown, column G subtracts the Forecast grade from the Average
grade.
(i) Describe the steps the teacher can take to edit the spreadsheet to prevent new data
being typed into the Forecast grade column.
................................................................................................................................
................................................................................................................................
................................................................................................................................
................................................................................................................................
................................................................................................................................
................................................................................................................................
................................................................................................................................
................................................................................................................................
................................................................................................................................
................................................................................................................................ [5]
(ii) The teacher has typed a formula in cell E3. The formula is ROUNDUP(AVERAGE(B3:D3),0)
Explain, in detail, what the formula does.
................................................................................................................................
................................................................................................................................
................................................................................................................................
................................................................................................................................
................................................................................................................................
................................................................................................................................
................................................................................................................................ [4]
(c) The teacher has produced a graph showing the differences between the forecast grade and
the average grade for each student. The graph looks like this.
Describe the steps taken to create the graph. Include in your answer three improvements that
could be made to the graph.
Method...............................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
Improvement 1...................................................................................................................
...........................................................................................................................................
Improvement 2...................................................................................................................
...........................................................................................................................................
Improvement 3...................................................................................................................
...........................................................................................................................................
[6]
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
.................................................................................................................................................. [2]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [6]
(b) Describe the methods which can be used to help prevent phishing.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [6]
7 Complete each sentence using the most appropriate output device from the following list.
........................................................................................................................................... [1]
........................................................................................................................................... [1]
(c) The device that can produce sound as its main output is called a
........................................................................................................................................... [1]
Describe the advantages and disadvantages of using a tablet computer rather than a desktop
computer.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
.................................................................................................................................................. [6]
(a) Describe two drawbacks in terms of lifestyle changes this has produced for the users of such
devices.
1.........................................................................................................................................
...........................................................................................................................................
2.........................................................................................................................................
...........................................................................................................................................
[2]
(b) Many of the microprocessor-controlled devices in our homes use WiFi connections.
Describe the benefits and drawbacks of using WiFi connections in this way.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [6]
10 Music scores can now be produced using computer systems and appropriate software.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
.................................................................................................................................................. [4]
(a) Describe two methods the headteacher could use to gather information about the requirements
of the target audience.
1.........................................................................................................................................
...........................................................................................................................................
2.........................................................................................................................................
...........................................................................................................................................
[2]
(b) The presentation is to be shown on large monitors at the entrance to the school. The school
is planning to embed music into the presentation so that music could be played as the
presentation is shown.
Describe the steps the headteacher would need to take to play music in the background of
the slides.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [4]
(c) After showing the presentation to the parents the headteacher wishes to use the presentation
to show to young children to encourage them to come to the school.
Describe the features that the headteacher must include to make the presentation meet the
needs of an audience of young children.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [4]
12 (a) Describe repetitive strain injury (RSI) and explain what causes it.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [2]
1.........................................................................................................................................
...........................................................................................................................................
2.........................................................................................................................................
...........................................................................................................................................
3.........................................................................................................................................
...........................................................................................................................................
[3]
13 Modern laptop computers tend to use external solid state storage rather than external optical
storage.
Compare and contrast the use of solid state storage with the use of optical storage to store data.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
.................................................................................................................................................. [8]
14 There are two types of storage within a computer, internal memory and backing storage.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
.................................................................................................................................................. [6]
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable
effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will
be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge Assessment
International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at
www.cambridgeinternational.org after the live examination series.
Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of
Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge.
Published
Students did not sit exam papers in the June 2020 series due to the Covid-19 global pandemic.
This mark scheme is published to support teachers and students and should be read together with the
question paper. It shows the requirements of the exam. The answer column of the mark scheme shows the
proposed basis on which Examiners would award marks for this exam. Where appropriate, this column also
provides the most likely acceptable alternative responses expected from students. Examiners usually review
the mark scheme after they have seen student responses and update the mark scheme if appropriate. In the
June series, Examiners were unable to consider the acceptability of alternative responses, as there were no
student responses to consider.
Mark schemes should usually be read together with the Principal Examiner Report for Teachers. However,
because students did not sit exam papers, there is no Principal Examiner Report for Teachers for the June
2020 series.
Cambridge International will not enter into discussions about these mark schemes.
Cambridge International is publishing the mark schemes for the June 2020 series for most Cambridge
IGCSE™ and Cambridge International A & AS Level components, and some Cambridge O Level
components.
These general marking principles must be applied by all examiners when marking candidate answers.
They should be applied alongside the specific content of the mark scheme or generic level descriptors
for a question. Each question paper and mark scheme will also comply with these marking principles.
• the specific content of the mark scheme or the generic level descriptors for the question
• the specific skills defined in the mark scheme or in the generic level descriptors for the question
• the standard of response required by a candidate as exemplified by the standardisation scripts.
Marks awarded are always whole marks (not half marks, or other fractions).
• marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit
is given for valid answers which go beyond the scope of the syllabus and mark scheme,
referring to your Team Leader as appropriate
• marks are awarded when candidates clearly demonstrate what they know and can do
• marks are not deducted for errors
• marks are not deducted for omissions
• answers should only be judged on the quality of spelling, punctuation and grammar when these
features are specifically assessed by the question as indicated by the mark scheme. The
meaning, however, should be unambiguous.
Rules must be applied consistently e.g. in situations where candidates have not followed
instructions or in the application of generic level descriptors.
Marks should be awarded using the full range of marks defined in the mark scheme for the question
(however; the use of the full mark range may be limited according to the quality of the candidate
responses seen).
Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should
not be awarded with grade thresholds or grade descriptors in mind.
1(a) 4
Text
Boolean Numeric
(alphanumeric)
Athlete_name
Gold_medal(Y/N)
Age
Name_of_Country
3 Bluetooth 4
Modem
Router
WiFi
One from:
Extreme: 1 or 10
Three from:
Add legend
Add chart title
Add axes labels
Remove gridlines
Change colour/thickness of the bars
5 Two from: 2
File transfer protocol
Used when transferring files from one computer to another over the internet
Comparisons
Both use communication devices to collect personal data
Both require the user to communicate quickly
Both require the user to enter personal data
Both use the internet
Differences
Smishing: fake text messages/SMS are sent to a phone
Phishing: fake emails are sent to your computer
In smishing the user may be asked to make a phone call
A smishing message is shorter than a phishing email
Easier to spot a smishing message
Smishing messages tend to use 5000 in the message
7(a) 3D printer 1
7(c) Buzzer 1
Advantages
Tablet computers are more portable
Can be used in more places than a desktop computer
Smaller footprint as the units are not separate
Powered by battery so can be used away from a power supply
Internet connection may be better as device is portable
Disadvantages
Tablet computers are easier to steal/lose
As the elements of a desktop computer are separate they are easier to
upgrade/tablet computers are one unit
Batteries can run out/desktop computers have less chance of running out of
power
Screens are smaller
Keyboard tends to be onscreen/touch screen therefore can be harder to use
No mouse therefore pointing devices/touchscreen can be harder to use
Webcams tend to be static therefore harder to use
Less standard ports/sockets
Desktop computers have a better heat dispersion rate
Desktop computers are less likely to be damaged as they are not portable.
Drawbacks
Security issue with the data being sent as passwords can be accessed
Leads to laziness as voice control used
Heavily reliant on power/battery power
Other people can hack devices
Reliant on the WiFi connection
Can be affected by walls/weather
Affected by distance from the WAP
Benefits
Smartphones can connect to the devices and can control them
Wireless so no tripping over wires
Voice control can be used to activate the devices
Home surveillance from afar
TV on demand
Keyless door locks are more secure
10 Four from: 4
The music score can be generated from the music played
The editing/correcting of the music score in a different key is faster
Solo music scores can be easily transformed into music for many parts
Software can automatically correct the music score
Music can be played automatically as it is written
Music notes are automatically printed out in the correct format
Music scores can be saved for future editing
11(a) Interview members of the target audience to see what they want from the 2
presentation
Give out questionnaires to the target audience
One from:
Caused by continuous use of a keyboard
Caused by repetitive clicking of a mouse button
Differences
Optical discs such as CDs, DVDs and Blu-ray discs …
…. are read from and written to using a laser beam
Comparisons
Both store videos, music, files, images, data
Both are portable
Both use direct access
Both can be easily lost/stolen
Both backing storage
14 Six from: 6
Internal storage examples RAM and ROM
Internal storage is chip based
Backing storage can be solid state, optical or magnetic
Backing storage is permanent storage
RAM loses memory when computer is turned off
RAM contains current instruction
ROM contains instructions to boot up the computer
Backing storage has slower access speeds
More storage in backing storage
INSTRUCTIONS
• Answer all questions.
• Use a black or dark blue pen.
• Write your name, centre number and candidate number in the boxes at the top of the page.
• Write your answer to each question in the space provided.
• Do not use an erasable pen or correction fluid.
• Do not write on any bar codes.
• You may use an HB pencil for any diagrams, graphs or rough working.
INFORMATION
• The total mark for this paper is 100.
• The number of marks for each question or part question is shown in brackets [ ].
• No marks will be awarded for using brand names of software packages or hardware.
06_0417_13_2020_1.13
© UCLES 2020 [Turn over
2
Tick (✓) the most appropriate type of software for each of the following.
Applications System
(✓) (✓)
Device driver
Linker
Photo-editing software
Spreadsheet
[2]
m
Files - Message
Working_file memo notes File Edit View Insert Format Tools Actions Help
Miscellaneous
Project1
........................................................................................................................................... [1]
1.........................................................................................................................................
...........................................................................................................................................
2.........................................................................................................................................
...........................................................................................................................................
[2]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [2]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [2]
4 Mason is the head of a year group at a school. Every term he needs to send to parents a report on
their child’s progress. This will include a written report and the percentage attendance over the
term.
Each term he loads the comments from his tutors into the word processing software. He then adds
the attendance data from the database. The report is then printed and sent to parents.
He has decided that in future he will use mail merge to print the reports.
(a) Give four advantages of using mail merge instead of typing the reports.
1.........................................................................................................................................
...........................................................................................................................................
2.........................................................................................................................................
...........................................................................................................................................
3.........................................................................................................................................
...........................................................................................................................................
4.........................................................................................................................................
...........................................................................................................................................
[4]
(b) As it is entered, the data on the database is checked using validation routines. The percentage
attendance field uses a range check.
Describe, using the percentage attendance field, the steps that need to be taken to create this
validation routine.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [4]
(c) Before the database can be implemented the validation routines need to be tested.
Describe, using the percentage attendance field, how the validation routine will be tested by
Mason.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [4]
5 The use of laptop computers and tablet computers by people on the move is becoming very popular.
Describe four advantages of using a tablet computer rather than a laptop computer.
1 ................................................................................................................................................
..................................................................................................................................................
2 ................................................................................................................................................
..................................................................................................................................................
3 ................................................................................................................................................
..................................................................................................................................................
4 ................................................................................................................................................
..................................................................................................................................................
[4]
6 The secretary of the Tawara Rowing Club is organising a presentation evening for its members. A
systems analyst is creating a database for the club to store the details of the members. She is also
creating a spreadsheet to show who is attending the presentation evening.
The systems analyst has set up the following fields for the database.
Membership Year
Name_of_person Date_of_birth Contact_email Contact_phone_no Gender
_type _joined
(a) For the following fields write down the most appropriate data type. Each data type must be
different. For any numeric field, specify the type of number.
Gender...............................................................................................................................
Membership_type..............................................................................................................
Year_joined........................................................................................................................
[3]
(b) Design an online data entry form which could be used to enter the details of one member,
using all the fields shown in the table.
In your design include appropriate spacing for each field and navigational aids. Do not include
data in the form.
[8]
(c) A spreadsheet has been created to show which members are attending the presentation
evening and who has paid.
A B C D E F G H I J K
Ahmed
4 Ahmed Othman Junior Y 3 30 Y Senior 20
Othman
Adam
6 Adam Mazian Social N 0 0 N
Mazian
Write down three of the formatting features that have been used in the part of the spreadsheet
shown.
1.........................................................................................................................................
...........................................................................................................................................
2.........................................................................................................................................
...........................................................................................................................................
3.........................................................................................................................................
...........................................................................................................................................
[3]
(d) A formula has been created and placed in cell G3. The formula is:
IF(E3=''Y'',VLOOKUP(D3,J$3:K$5,2)*F3,0)
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [6]
(e) The secretary needs to identify different types of members in the club.
Describe the steps he would take to sort the data by type of member so that Junior members
are at the top of the list.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [3]
7 A train company is improving security on its journeys. They are planning to introduce a facial
recognition system for passengers using their trains.
(a) Discuss the advantages and disadvantages of using facial recognition systems rather than
manually checking tickets.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [6]
(b) Facial recognition is an example of biometrics. Direct data entry devices can be in three forms.
One is biometrics. The second is contactless where the item being read does not touch the
reader. The third is physical where the item being read does touch the reader.
Tick (✓) whether the following are the most appropriate examples of biometrics or contactless
or physical direct data entry.
RFID
Magnetic stripe
Retina scan
Voice recognition
[4]
8 One implication of using a computer system is that people can break the law by hacking into other
computer systems. Cultural, Ethical and Moral implications can also be issues.
Tick (✓) the most appropriate implication for each of the following statements.
[4]
9 Lanfen has purchased a new computer. The computer has no internal storage. All the data is stored
in the cloud.
Compare and contrast computers that use cloud-based storage and computers that have internal
backing storage.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
.................................................................................................................................................. [6]
10 The modern home relies heavily on microprocessor-controlled devices. One of the benefits is that
a worker is able to return home to a warm house having set the heater control to switch on at a
certain time.
(a) Describe four benefits in terms of lifestyle changes that this has produced for the users of
such devices.
1.........................................................................................................................................
...........................................................................................................................................
2.........................................................................................................................................
...........................................................................................................................................
3.........................................................................................................................................
...........................................................................................................................................
4.........................................................................................................................................
...........................................................................................................................................
[4]
(b) The worker has set the heater control to switch on at 16:00 for two hours.
Explain how the microprocessor can operate the automatic heater to turn on and off at the
correct times.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [6]
Name and describe two other methods of implementing a new computer system. For each one
give an advantage and a disadvantage of this method. Your answers must be different in each
case.
Method 1...................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
Advantage 1..............................................................................................................................
..................................................................................................................................................
Disadvantage 1.........................................................................................................................
..................................................................................................................................................
Method 2...................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
Advantage 2..............................................................................................................................
..................................................................................................................................................
Disadvantage 2.........................................................................................................................
..................................................................................................................................................
[8]
12 A student is undertaking research for his studies. He needs to find up-to-date information and has
decided to look for it using the internet.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
.................................................................................................................................................. [6]
13 A school is planning to set up a student work files area. The school is considering allowing students
to log in to the student work files area either using the school’s intranet or the internet.
Discuss the advantages and disadvantages of using the school’s intranet rather than the internet
to access this student work files area.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
.................................................................................................................................................. [8]
BLANK PAGE
BLANK PAGE
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable
effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will
be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge Assessment
International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at
www.cambridgeinternational.org after the live examination series.
Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of
Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge.
Published
Students did not sit exam papers in the June 2020 series due to the Covid-19 global pandemic.
This mark scheme is published to support teachers and students and should be read together with the
question paper. It shows the requirements of the exam. The answer column of the mark scheme shows the
proposed basis on which Examiners would award marks for this exam. Where appropriate, this column also
provides the most likely acceptable alternative responses expected from students. Examiners usually review
the mark scheme after they have seen student responses and update the mark scheme if appropriate. In the
June series, Examiners were unable to consider the acceptability of alternative responses, as there were no
student responses to consider.
Mark schemes should usually be read together with the Principal Examiner Report for Teachers. However,
because students did not sit exam papers, there is no Principal Examiner Report for Teachers for the June
2020 series.
Cambridge International will not enter into discussions about these mark schemes.
Cambridge International is publishing the mark schemes for the June 2020 series for most Cambridge
IGCSE™ and Cambridge International A & AS Level components, and some Cambridge O Level
components.
These general marking principles must be applied by all examiners when marking candidate answers.
They should be applied alongside the specific content of the mark scheme or generic level descriptors
for a question. Each question paper and mark scheme will also comply with these marking principles.
• the specific content of the mark scheme or the generic level descriptors for the question
• the specific skills defined in the mark scheme or in the generic level descriptors for the question
• the standard of response required by a candidate as exemplified by the standardisation scripts.
Marks awarded are always whole marks (not half marks, or other fractions).
• marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit
is given for valid answers which go beyond the scope of the syllabus and mark scheme,
referring to your Team Leader as appropriate
• marks are awarded when candidates clearly demonstrate what they know and can do
• marks are not deducted for errors
• marks are not deducted for omissions
• answers should only be judged on the quality of spelling, punctuation and grammar when these
features are specifically assessed by the question as indicated by the mark scheme. The
meaning, however, should be unambiguous.
Rules must be applied consistently e.g. in situations where candidates have not followed
instructions or in the application of generic level descriptors.
Marks should be awarded using the full range of marks defined in the mark scheme for the question
(however; the use of the full mark range may be limited according to the quality of the candidate
responses seen).
Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should
not be awarded with grade thresholds or grade descriptors in mind.
1 2
Applications System
Device driver
Linker
Photo-editing software
Spreadsheet
5 Four from: 4
Faster switch on as the operating system does not need to load
Lighter and smaller than a laptop computer therefore more portable
Don’t generate as much heat
Battery life tends to last longer
Smaller footprint
Easier to use the touch screen as the keyboard is not in the way
Less susceptible to viruses
Less parts//no separate peripherals, such as a mouse
Camera is easier to use
6(a) Gender 3
Boolean/text/string/alphanumeric
Membership_type
Text/alphanumeric/string
Year_joined
Numeric/integer/date
6(b) Two marks for all field names given; one mark for five field names 8
6(d) IF(E3=“Y”,VLOOKUP(D3,J$3:K$5,2)*F3,0) 6
Six from:
If the member is attending/if E3 is equal to Y
Then locate the type of member using the value in D3 ...
... in the range J3 to K5
Return the corresponding value from the second column
Multiply the returned value by F3/the number attending
Otherwise display 0 in the cell
Advantages
Facial recognition is unique therefore the correct person is identified
Tickets can be lost/stolen whereas your face is always with you
The commuter is charged for the ticket therefore more secure
Faster throughput/faster to check the commuters
Fear of detection reduces fraud
Disadvantages
Personal liberty infringement as facial data must be stored.
Equipment and setup is more expensive than manual system.
The time taken to set up a store of facial patterns can be more time
consuming
A database is needed as many passengers need to be stored
Passengers will have to have data stored on the system; this could take a
long time to set up
If the face is injured/damaged/covered/beard it could be more difficult to
read the data
7(b) 4
biometrics contactless physical
RFID
Magnetic stripe
Retina scan
Voice recognition
8 4
Cultural Ethical Moral
9 Similarities 6
They are both used to store data
They are both mass storage
Both can be secured by passwords
Differences
Internal backing storage – physical storage in the computer
Internal backing storage – the user has control of the storage
Cloud – automatic backup takes place
Cloud – only pay for what you use
Internal backing storage – only initial cost is required
Internal backing storage – difficult to expand the storage
Cloud – can be used on different devices
Cloud – needs access to the internet to be used
Cloud – due to duplicate copies more chance of the data being hacked
Cloud – more chance of it being hacked as it is on all the time
Max five marks if only differences have been given in the answer
Disadvantage:
The old system no longer exists therefore all data could be lost – 1 mark
Advantage:
One from:
The benefits are immediate
Costs are reduced as only one set of staff are needed
Less change of error as the new system will be fully tested
Advantage:
If the current part fails then not all the system is lost – 1 mark
Disadvantage:
One from:
More expensive as each part needs to be evaluated before moving on
More time consuming as each part needs to be evaluated before moving on
Disadvantage:
More time consuming as the changeover is spread out – 1 mark
Advantage:
One from:
If the system crashes/fails then only branch/office is affected
Cheaper as training is carried branch by branch
Less time consuming as training is carried out branch by branch
12 Six from: 6
Check the credentials of the authors of a website
Cross check the data with other websites
Check if the site has excessive advertising
Check If the advertising is related only to its own products
Check the final part of a URL …
... .ac., .gov, .org government/academic sites are usually fairly reliable
Check if site is endorsed by reliable/reputable people/organisations it can be
accepted as being reliable/If it has links to other reliable sites
Check the site for grammatical/spelling mistakes
Compare information from different text books to see if the results are
similar
Check if it has been recommended by teachers
Advantages
Intranet is policed/controlled by the school
More secure as it needs a password
Intranet private network only contains information that is relevant
Intranet resides behind a firewall therefore data is more secure
Messages can target the correct students
Better bandwidth on the intranet
Access from external people are barred
Disadvantages
More expensive to set up
More time consuming to set up
More time spent on administration i.e. passwords
May only be viewed within the school
More expensive to maintain
More time consuming to maintain
Will not be able to access school files at home for homework
School would need to provide more computers across the school for
students to use to access via the intranet
2 hours
INSTRUCTIONS
● Answer all questions.
● Use a black or dark blue pen.
● Write your name, centre number and candidate number in the boxes at the top of the page.
● Write your answer to each question in the space provided.
● Do not use an erasable pen or correction fluid.
● Do not write on any bar codes.
● You may use an HB pencil for any diagrams, graphs or rough working.
INFORMATION
● The total mark for this paper is 100.
● The number of marks for each question or part question is shown in brackets [ ].
● No marks will be awarded for using brand names of software packages or hardware.
DC (DH/FC) 215559/5
© UCLES 2020 [Turn over
2
1 Complete the question using an appropriate item from the list given.
Blu-ray disc drive DVD RAM drive Hard disk drive Keyboard Laser printer
1 ................................................................................................................................................
2 ................................................................................................................................................
[2]
1 ................................................................................................................................................
2 ................................................................................................................................................
[2]
Tick (3) whether the following statements refer to the ALU, the Control unit or the Main memory.
Control Main
ALU unit memory
(3) (3) (3)
This is the immediate access storage
This carries out the calculations
This carries out logical decisions
This directs the input and output flow in the CPU
[4]
(a) Complete the following sentences using the most appropriate network device from the list.
Your answers must be different in each case.
A device used to connect a Local Area Network (LAN) to another LAN that uses the same
A device used to convert a computer’s digital signal to an analogue signal for communication
is called ................................................................................................................................... .
A device that connects a number of other devices and sends data to one specific device only
is ............................................................................................................................................. .
................................................................................................................................................. .
[4]
A router is used to connect a LAN to the internet. A message is sent from the router to another
router.
(b) Give the name of the part of the router where the IP addresses are stored.
...................................................................................................................................................
............................................................................................................................................. [1]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [5]
© UCLES 2020 0417/11/O/N/20 [Turn over
4
4 The HTML of a web page consists of a head section and a body section.
(a) The head section can contain the link to the stylesheet.
1 ................................................................................................................................................
2 ................................................................................................................................................
[2]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
5 The Fish Bowl is a large outdoor music arena. It uses an online booking system.
A customer has entered her data into the booking system using an online data entry form.
Number of Adults: 2
Number of Children: 0
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [6]
(b) When a person makes a booking, a ticket will be produced for each person. The ticket will be
sent by email and can then be printed out or used on a smartphone to gain entry to the event.
Design a ticket that includes elements for both visual and electronic checking for the
forthcoming music event.
[6]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
Due to an issue with Question 6b, the question has been removed from the question paper.
7 A new database system has been set up for a bookshop. Part of a record from the database
system is shown. Each field has a validation check which needs to be tested.
(a) For each field identify the most appropriate validation check. Each check must be different.
The validation checks for two fields have already been identified; these types of validation
check must not be used for the other fields.
(b) The Purchase_price field uses a range check. The prices of books range from 1 to 100.
Identify three items of test data which could be used with the Purchase_price field, giving
reasons for your choice. The reasons must be different in each case.
Item 1 ........................................................................................................................................
Reason .....................................................................................................................................
...................................................................................................................................................
Item 2 ........................................................................................................................................
Reason .....................................................................................................................................
...................................................................................................................................................
Item 3 ........................................................................................................................................
Reason .....................................................................................................................................
...................................................................................................................................................
[6]
8 Autonomous vehicles are being tested on some of the world’s roads. These vehicles can travel in
convoys with each vehicle following the one in front with a set distance between them. The whole
operation is computer controlled. If the vehicle in front slows down, then the following vehicle also
slows down to maintain the distance between them.
A proximity sensor is used to detect how close the vehicle is to the vehicle in front.
Describe how the microprocessor would maintain the set distance between the vehicles.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
.................................................................................................................................................... [6]
9 There have been a number of incidents where laptop computers containing highly sensitive
data have been left on trains. Manufacturers are now developing new ways of protecting laptop
computers and their data.
Discuss the effectiveness of different methods which could be used to protect the data.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
.................................................................................................................................................... [8]
10 A student is creating a database for her geography project to show all the earthquakes that
occurred in 2019. She has produced part of the database which is shown.
When she has completed her database, she needs to carry out some searches on the data. To
search for all the earthquakes with a depth of more than 20 km she will need to type the following
search criteria.
Depth(km) >20
(a) Write the search criteria to find all the earthquakes of a magnitude greater than or equal to
6.5, with a depth less than 15 km.
...................................................................................................................................................
............................................................................................................................................. [5]
(b) Give the name of the country that satisfies the search criteria in part (a).
............................................................................................................................................. [1]
The student has transferred the data into a spreadsheet in order to create a graph.
A B C D E F G
(c) (i) She has entered a formula in cell G3. The formula is
COUNTIF(A$3:A$19,F3)
Explain in detail what the formula in G3 does. Include in your answer an explanation of
the use of the $ sign.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [4]
(ii) The student is creating an appropriate chart/graph of the data in cells F3 to G10.
Write down the steps she needs to take to produce a chart/graph of the data on the
same sheet. Your answer must include examples of an appropriate title and labels.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [6]
11 Two types of documentation are written when a new computer system is created. Some items only
appear in the technical documentation and other items only in the user documentation whereas
some items appear in both.
Tick (3) whether the following items only appear in Technical documentation, only appear in
User documentation or appear in Both.
12 A teacher is teaching students about history using a virtual reality (VR) system.
1 ................................................................................................................................................
2 ................................................................................................................................................
3 ................................................................................................................................................
[3]
(b) The teacher carefully monitors the students’ use of the VR system. She only allows them 20
minutes on the device before taking a break. This is to ensure that they remain healthy whilst
using it.
Identify three health problems associated with the prolonged use of VR systems.
Problem 1 .................................................................................................................................
...................................................................................................................................................
Problem 2 .................................................................................................................................
...................................................................................................................................................
Problem 3 .................................................................................................................................
...................................................................................................................................................
[3]
(c) The teacher asks the students to create a presentation for their parents to explain to them
about the history of their town.
Describe the features that the students must include to make the presentation appeal to the
adults.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.
Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of
Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge.
Published
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.
Cambridge International will not enter into discussions about these mark schemes.
Cambridge International is publishing the mark schemes for the October/November 2020 series for most
Cambridge IGCSE™, Cambridge International A and AS Level and Cambridge Pre-U components, and some
Cambridge O Level components.
These general marking principles must be applied by all examiners when marking candidate answers.
They should be applied alongside the specific content of the mark scheme or generic level descriptors
for a question. Each question paper and mark scheme will also comply with these marking principles.
• the specific content of the mark scheme or the generic level descriptors for the question
• the specific skills defined in the mark scheme or in the generic level descriptors for the question
• the standard of response required by a candidate as exemplified by the standardisation scripts.
Marks awarded are always whole marks (not half marks, or other fractions).
• marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit
is given for valid answers which go beyond the scope of the syllabus and mark scheme,
referring to your Team Leader as appropriate
• marks are awarded when candidates clearly demonstrate what they know and can do
• marks are not deducted for errors
• marks are not deducted for omissions
• answers should only be judged on the quality of spelling, punctuation and grammar when these
features are specifically assessed by the question as indicated by the mark scheme. The
meaning, however, should be unambiguous.
Rules must be applied consistently, e.g. in situations where candidates have not followed
instructions or in the application of generic level descriptors.
Marks should be awarded using the full range of marks defined in the mark scheme for the question
(however; the use of the full mark range may be limited according to the quality of the candidate
responses seen).
Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should
not be awarded with grade thresholds or grade descriptors in mind.
2 4
Control Main
ALU Unit memory
() () ()
3(a) A bridge 4
A modem
A switch
A network interface card
Negatives
No indication of what to do for the seat position/how to select the correct
option
There is too much space to enter the data
No drop down/combo box lists for number of adults/children
No navigation/submit/help buttons
No radio button for position of seat
No explanation on how to fill in details
The form does not fill the screen
Text is too small
To gain full marks there needs to be at least one positive and at least one
negative
7(a) 3
Field name Data Validation check
1
This would check the lower boundary of the range check/extreme data//on the
edge of acceptable range
100
This would check the upper boundary of the range check/extreme data//on
the edge of acceptable range
8 Six from: 6
Microprocessor reads the data
The data from the proximity sensor is compared to the pre-set value
The pre-set value is set to show the minimum distance from the vehicle in
front
If the values are the same nothing happens
If the values are different …
… the microprocessor sends a signal …
… to the actuator
Actuator speeds up the vehicle/slows down the vehicle/applies the brakes
The process is continuous
Physical security
Use of a dongle to log onto the laptop ensures that only the person with the
device gains access
Devices like pendrives/dongles tend to be small and can easily be lost/stolen
If the dongle is stolen/lost then access to the laptop is difficult
Security software may malfunction rendering the laptop impossible to access
Biometrics
Biometrics can be used to access the laptop/data this means that the user
needs to be present
Difficult to fake/replicate biometrics
Biometric data cannot be reset once compromised
Biometrics are unique therefore it is an added security method
Magnitude – 1 mark
>=6.5 – 1 mark
AND – 1 mark
Depth(km) – 1 mark
<15 – 1 mark
10(b) Japan 1
10(c)(i) COUNTIF(A$3:A$19,F3) 4
Three from:
The formula counts the number of times
Vanuatu/contents/value of F3
Appears in the country list/A3 to A19
The $ allows the range to remain static if replicated/search in the same range
if replicated – 1 mark
11 6
Item Technical User
documentation documentation Both
() () ()
System flowchart
Software requirements
List of variables
Input format
2 hours
INSTRUCTIONS
● Answer all questions.
● Use a black or dark blue pen.
● Write your name, centre number and candidate number in the boxes at the top of the page.
● Write your answer to each question in the space provided.
● Do not use an erasable pen or correction fluid.
● Do not write on any bar codes.
● You may use an HB pencil for any diagrams, graphs or rough working.
INFORMATION
● The total mark for this paper is 100.
● The number of marks for each question or part question is shown in brackets [ ].
● No marks will be awarded for using brand names of software packages or hardware.
DC (DH/SG) 189826/3
© UCLES 2020 [Turn over
2
1 Complete the question using an appropriate item from the list given.
Bar code reader Blu-ray drive DVD drive Hard Disk Drive Keyboard
(a) Identify two solid state storage devices from the list.
1 ................................................................................................................................................
2 ................................................................................................................................................
[2]
(b) Identify two direct data entry devices from the list.
1 ................................................................................................................................................
2 ................................................................................................................................................
[2]
Tick (3) whether the following statements refer to the behaviour layer, content layer or
presentation layer.
Write down the most appropriate item of hardware that fits the following descriptions.
............................................................................................................................................. [1]
............................................................................................................................................. [1]
(c) A hardware device that reads analogue data from the environment.
............................................................................................................................................. [1]
The systems analyst has produced a number of different instructions to show how the system
works. Part of the instructions are shown.
(a) Complete the instructions by writing the most appropriate technical terms to explain how the
windows are operated.
• Data from the sensor is sent to the microprocessor via the ..............................................
...........................................................................................................................................
(b) Circle the two most appropriate input devices associated with the computerised glasshouse.
Discuss the benefits and drawbacks of using computer-controlled systems rather than
humans to build a car.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [6]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [8]
Protocol 1 .................................................................................................................................
Use ...........................................................................................................................................
...................................................................................................................................................
Protocol 2 .................................................................................................................................
Use ...........................................................................................................................................
...................................................................................................................................................
Protocol 3 .................................................................................................................................
Use ...........................................................................................................................................
...................................................................................................................................................
[6]
© UCLES 2020 0417/12/O/N/20 [Turn over
6
6 Khalid keeps a spreadsheet to record his expenses and to plan for future spending. This
spreadsheet is split into two separate sheets, which he has named Plan and Model.
Plan
A B C D
% of % of
1 Income Statement spending income
2 Income 63,784
3
4 Expenditure items
5 Taxes 12,757 22.22% 20%
6 Housing 19,135 33.33% 30%
7 Food 6,378 11.11% 10%
8 Transportation 9,568 16.67% 15%
9 Entertainment / Other 6,378 11.11% 10%
10 Healthcare 3,189 5.56% 5%
11
12 Investment return 4%
13 Income Growth 2.5%
14 Expense Ratio % 90%
15
Model
A B C D E F G
1 Model
2 2020 2021 2022 2023 2024 2025
3
4 Income 63,784 65,379 67,013 68,688 70,406 72,166
5 Investment Income 255 527 816 1,123 1,450
6 Total Income 63,784 65,634 67,540 69,504 71,529 73,616
7
8 Taxes 12,757 13,076 13,403 13,738 14,081 14,433
9 Housing 19,135 19,614 20,104 20,607 21,122 21,650
10 Food 6,378 6,538 6,701 6,869 7,041 7,217
11 Transportation 9,568 9,807 10,052 10,303 10,561 10,825
12 Entertainment / Other 6,378 6,538 6,701 6,869 7,041 7,217
13 Healthcare 3,189 3,269 3,351 3,434 3,520 3,608
14 Total Expenses 57,405 58,842 60,312 61,820 63,366 64,950
15
16 Net Income (Savings) 6,379 6,792 7,228 7,684 8,163 8,666
17
18
19 Balance Sheet
20 Savings 6,379 13,171 20,399 28,083 36,246 44,912
21 Can I afford a car? N N N N Y Y
22
(a) Khalid has entered a formula in cell C4 of the Model sheet. The formula is B4+(B4*Plan!$B13)
Explain, in detail, what the formula does. Include in your answer an explanation of why the $
and the ! are used in the formula.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [5]
(b) He is saving up to buy a new car; this will cost at least $35,000.
Khalid has entered a formula in cell B21 of the Model sheet. The formula is
IF(B20>35000,"Y","N")
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
Plan
A B C D
% of % of
1 Income Statement spending income
2 Income 63,784
3
4 Expenditure items
5 Taxes 12,757 22.22% 20%
6 Housing 19,135 33.33% 30%
7 Food 6,378 11.11% 10%
8 Transportation 9,568 16.67% 15%
9 Entertainment / Other 6,378 11.11% 10%
10 Healthcare 3,189 5.56% 5%
11
12 Investment return 4%
13 Income Growth 2.5%
14 Expense Ratio % 90%
15
(c) Khalid is planning to create an appropriate graph/chart to be placed in a new sheet. The
graph/chart will display the % of income and the names of the expenditure items from the
Plan sheet.
Identify the most appropriate graph/chart he could use and describe the steps he needs to
take to produce this graph/chart in a new sheet.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [7]
7 The owner of a soccer club has employed a systems analyst to create a new computerised system
to store details of club members.
The systems analyst starts by researching the existing system. One way he could do this is to
interview members of the soccer club.
(a) Discuss the benefits and drawbacks of individually interviewing the members.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [6]
(b) When the systems analyst created the new system, he had to choose data types for each
field.
Write down the most appropriate data type for each field. The answers in the table must be
different in each case. The data type for one field has already been identified; this data type
must not be used for the other fields.
Year_joined 2019
Gender F
Date_of_birth 04/11/2000
Cost_of_membership $10.50
[4]
(c) The systems analyst has set the data type for the Membership_number field as text.
Explain why this field has been set for a text data type rather than a numeric data type.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
(d) The owner of the soccer club is planning to create membership cards for all its members
using mail merge. The membership card will include personal data from the new system.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [6]
8 Many supermarkets now use the internet and allow customers to buy their products online.
(a) Explain, in detail, the effects that online shopping has had on supermarkets.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
(b) When customers shop online, they can pay using a debit card.
Describe measures that customers could use to reduce fraud when using a debit card online.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [5]
(c) Smishing, pharming and phishing are three security threats that can occur when using the
internet for shopping.
Tick (3) whether the following statements refer to pharming, phishing or smishing.
1 .......................................................................................................................................................
..........................................................................................................................................................
2 .......................................................................................................................................................
..........................................................................................................................................................
3 .......................................................................................................................................................
..........................................................................................................................................................
4 .......................................................................................................................................................
..........................................................................................................................................................
[4]
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
© UCLES 2020 0417/12/O/N/20 [Turn over
14
11 For each of the following pieces of hardware, explain the strategies you would use to help minimise
health problems.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
12 Describe the differences between using a Graphical User Interface (GUI) and a Command Line
Interface (CLI).
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
.................................................................................................................................................... [4]
BLANK PAGE
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.
Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of
Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge.
Published
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.
Cambridge International will not enter into discussions about these mark schemes.
Cambridge International is publishing the mark schemes for the October/November 2020 series for most
Cambridge IGCSE™, Cambridge International A and AS Level and Cambridge Pre-U components, and some
Cambridge O Level components.
These general marking principles must be applied by all examiners when marking candidate answers.
They should be applied alongside the specific content of the mark scheme or generic level descriptors
for a question. Each question paper and mark scheme will also comply with these marking principles.
• the specific content of the mark scheme or the generic level descriptors for the question
• the specific skills defined in the mark scheme or in the generic level descriptors for the question
• the standard of response required by a candidate as exemplified by the standardisation scripts.
Marks awarded are always whole marks (not half marks, or other fractions).
• marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit
is given for valid answers which go beyond the scope of the syllabus and mark scheme,
referring to your Team Leader as appropriate
• marks are awarded when candidates clearly demonstrate what they know and can do
• marks are not deducted for errors
• marks are not deducted for omissions
• answers should only be judged on the quality of spelling, punctuation and grammar when these
features are specifically assessed by the question as indicated by the mark scheme. The
meaning, however, should be unambiguous.
Rules must be applied consistently, e.g. in situations where candidates have not followed
instructions or in the application of generic level descriptors.
Marks should be awarded using the full range of marks defined in the mark scheme for the question
(however; the use of the full mark range may be limited according to the quality of the candidate
responses seen).
Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should
not be awarded with grade thresholds or grade descriptors in mind.
1(a) SSD 2
Memory stick
2 4
behaviour content presentation
() () ()
3(b) 3D printer 1
3(c) Sensor 1
Benefits
Robots can work in sterile/hazardous areas where humans would need
protective clothing
Robots can work 24/7
Cheaper in the long run
More accurate
Cars will be more consistent
Robots do the boring/laborious work
Issues can be found quicker
Higher productivity
Drawbacks
More expensive to buy//more expensive in the short term
Maintenance is more expensive as maintenance staff needed
Requires backup systems, which are expensive
They replace skilled workers, leading to de-skilling
They need constant observation which increases the cost of maintenance
crews
If something goes wrong, it may be difficult to find the error
Workers need to be re-trained which is expensive
To gain full marks there must be at least one benefit and drawback
Similarities
Both are communication systems
Both use internet technologies
Both use HTML to write the web pages
Both are information systems
Both are networks
Differences
An intranet has private access whereas the internet has public access
An intranet is policed whereas the internet anyone can post material
The data on an intranet is moderate whereas /the internet is not moderated
The data access on an intranet is more secure than the internet
Internet has greater amount of information than intranet
Intranet is within an organisation whereas the internet is world-wide
Data in the intranet is more relevant/reliable than information found on the
internet
To gain full marks there must be at least one from each section
SSL/TLS
determines variables of the encryption for both the link and the data being
transmitted
SMTP
Communication protocol for email
SLS
Protocol used on the internet
6(a) B4+(B4*Plan!$B13) 5
Three from:
Calculates the 2021 income in the Model sheet
By increasing the 2020 income by 2.5%
The 2.5% is taken from the Income Growth cell in the Plan sheet
The ! is needed to show that the data is being taken from a different
worksheet – 1 mark
6(b) IF(B20>35000,“Y”,“N”) 3
Five from:
Select Plan sheet
Highlight A5:A10
Press CTRL and highlight D5:D10
Click on insert chart
Select pie chart
Choose style of chart
Add a title
Add data/axes labels
Add legend
Add a name for the new sheet
Right click on the chart and move to a new sheet//copy and paste in the new
sheet – 1 mark
Benefits
Gives the opportunity for the member to give more honest answers
The questions can be expanded/modified//added to following previous
questions/answers
Allows more detailed answers to be given rather than questionnaires
Questions can be explained
Can see the body language
Drawbacks
Takes a long time to interview all the members using this method
Both the members and the interviewer have to be free at the same time
This method is expensive as the system’s analysts time is expensive
The member cannot remain anonymous, so they cannot express
themselves properly
The member feels that they give comments that the interviewer wants to
hear
To gain full marks at least one benefit and drawback must be given
8(c) 4
pharming phishing smishing
() () ()
9 Four from: 4
Making a copy and giving it away to a friend or colleague/streaming without
permission
Making a copy and lending it without permission
Making a copy and selling it without permission
Using a single copy with multiple simultaneous use on a network
Using coding from the original copy in your own programs/modifying the
original code
Renting out the original copy without permission
12 Four from: 4
With a CLI Instructions must be typed to get a computer to carry out an
action
The user needs to remember/learn/understand the commands in a CLI
The instructions need to be entered correctly in CLI
With a CLI you have to remember the exact path and name of application
With a CLI it is more important that users understand how a computer works
With a GUI you just click on an icon
In the GUI the instructions are pre-determined
GUI is more user-friendly
GUI uses more processing power
GUI uses more memory
2 hours
INSTRUCTIONS
● Answer all questions.
● Use a black or dark blue pen.
● Write your name, centre number and candidate number in the boxes at the top of the page.
● Write your answer to each question in the space provided.
● Do not use an erasable pen or correction fluid.
● Do not write on any bar codes.
● You may use an HB pencil for any diagrams, graphs or rough working.
INFORMATION
● The total mark for this paper is 100.
● The number of marks for each question or part question is shown in brackets [ ].
● No marks will be awarded for using brand names of software packages or hardware.
DC (DH/FC) 189827/3
© UCLES 2020 [Turn over
2
1 A desktop computer consists of both hardware and software. The software is either applications
software or system software.
(a) Tick (3) whether the following are examples of applications software or system software.
applications system
(3) (3)
Measurement software
Linker
Database
Utility software
[2]
(b) Identify two internal items of hardware that could be found in a desktop computer.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
[2]
2 A computer system uses two types of documentation: technical and user. Some items only appear
in the technical documentation and other items only in the user documentation, whereas some
items appear in both.
Tick (3) whether the following items appear only in Technical documentation, only in User
documentation or in Both.
3 A student has produced a document for her biology project. Part of the project is shown. Answer
the questions relating to the document.
Apteryx is the
scientific name for
the Kiwi. The Kiwi is
a burrowing bird and
is the oldest of New
Zealand’s birds,
having evolved 70
million years ago from a flightless ancestor
from the great southern continent of
Gondwana. It is related to the Ostrich, Emu
and Rhea as well as the now extinct New
Zealand Moa, all of which are much taller
than the Kiwi. The Kiwi is a very secretive,
nocturnal bird which is seldom seen in the
wild.
2 3
(a) Give the name of the extra margin between the two pages of the document.
............................................................................................................................................. [1]
(b) Give the name of the space above the document, containing ‘Biology Project’ and the date.
............................................................................................................................................. [1]
(c) Name the term given to the single line of text that has overflowed on to the next page.
............................................................................................................................................. [1]
(d) Name the type of alignment used for the body text.
............................................................................................................................................. [1]
Name the type of formatting used to allow the text to flow around the image.
............................................................................................................................................. [1]
1 .......................................................................................................................................................
2 .......................................................................................................................................................
[2]
5 When a website is created, three web development layers are used: the content layer, the
presentation layer and the behaviour layer.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
6 The manager of a company is planning to create a computerised system and has asked a systems
analyst to research the current system. The systems analyst could do this by using a number of
different methods, but has chosen to create and send out a questionnaire to members of the
company.
(a) Discuss the benefits and drawbacks of sending out questionnaires to members of the
company.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [6]
(b) The system has been created. As the data is entered into the system it is verified.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
[2]
(c) Explain why data still needs to be validated even though it has been verified.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
(a) Identify two input devices that would be used in this system.
1 ................................................................................................................................................
2 ................................................................................................................................................
[2]
(b) Describe how a microprocessor would use the data from these devices to control the central
heating system.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [6]
8 A spreadsheet has been produced showing the final places in one of the events in the 2018 Winter
Olympic Games.
A B C D E F G H I J
1
Total
2 Country Name Heat1 Heat2 Heat3 Heat4 Time Min Seconds
3 KOR Yun Sungbin 50.28 50.07 50.18 50.02 200.6 3 20.55 20.6
4 LAT Martins Dukurs 50.85 50.38 50.32 50.76 202.3 3 22.31 22.3
5 GBR Dom Parsons 50.85 51.41 49.33 50.62 202.2 3 22.21 22.2
6 OAR Nikita Tregubov 50.59 50.50 50.50 50.59 202.2 3 22.18 22.2
7 LAT Tomass Dukurs 50.88 50.58 50.65 50.63 202.7 3 22.74 22.7
8 KOR Kim Jisoo 50.80 50.86 50.51 50.81 203.0 3 22.98 23.0
9 GER Axel Jungk 50.77 51.01 50.83 50.99 203.6 3 23.60 23.6
10
The event consists of four heats. The times taken to complete each heat are added together to
give the Total Time, in seconds. This is then displayed as minutes and seconds.
Two formulae form this calculation; they are stored in column H and column J.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
At the end of the competition, the table must be sorted into ascending order of Total Time. The top
athlete would be in the gold medal position, the second in silver medal position and the third in
bronze medal position. The Medal and Rank columns must be added.
A B C D E F G H I
1
Total
2 Medal Rank Country Name Heat1 Heat2 Heat3 Heat4 Time
3 Gold 1 KOR Yun Sungbin 50.28 50.07 50.18 50.02 200.55
4 Silver 2 OAR Nikita Tregubov 50.59 50.50 50.50 50.59 202.18
5 Bronze 3 GBR Dom Parsons 50.85 51.41 49.33 50.62 202.21
6 4 LAT Martins Dukurs 50.85 50.38 50.32 50.76 202.31
7 5 LAT Tomass Dukurs 50.88 50.58 50.65 50.63 202.74
8 6 KOR Kim Jisoo 50.80 50.86 50.51 50.81 202.98
9 7 GER Axel Jungk 50.77 51.01 50.83 50.99 203.60
10
(c) Explain the steps that must be taken to amend the spreadsheet and to display the data in this
way.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [6]
The heat times are measured by a computer system, but could be measured by officials with
stopwatches.
(d) Discuss the advantages and disadvantages of using computers in measurement rather than
humans.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [6]
(a) Describe the advantages of using emails compared with physical faxing.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [5]
(b) Explain the steps that need to be taken to ensure that if a virus is attached to the file, it cannot
infect the computer.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
3 ................................................................................................................................................
...................................................................................................................................................
[3]
10 The use of ICT in organisations has changed the way in which employees work.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
11 The director of a museum in China is planning an exhibition on ancient civilisations. One of the
exhibits is a full representation of a 10 000-year-old human. The Natural History Museum in
London is planning to send a complete skeleton, but it is too fragile.
(a) Describe how a computer could be used to create a 3D copy of the skeleton which will then
be printed in China.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [5]
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
3 ................................................................................................................................................
...................................................................................................................................................
4 ................................................................................................................................................
...................................................................................................................................................
[4]
12 Autonomous vehicles such as taxis are being tested on the world’s roads. This type of taxi is
able to drive between two points without the driver having control of the vehicle. The vehicles use
satellite navigation and wireless technology with sensors to navigate and control the vehicle.
Evaluate the use of these technologies when navigating and controlling vehicles in this way.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
.................................................................................................................................................... [8]
13 Email is a common way of communicating with other people. Netiquette is associated with
emailing.
A headmistress of a school has asked the network manager to produce a document listing
netiquette rules the staff and students should follow when sending emails from the school.
1 .......................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
2 .......................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
3 .......................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
[6]
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.
Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of
Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge.
Published
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.
Cambridge International will not enter into discussions about these mark schemes.
Cambridge International is publishing the mark schemes for the October/November 2020 series for most
Cambridge IGCSE™, Cambridge International A and AS Level and Cambridge Pre-U components, and some
Cambridge O Level components.
These general marking principles must be applied by all examiners when marking candidate answers.
They should be applied alongside the specific content of the mark scheme or generic level descriptors
for a question. Each question paper and mark scheme will also comply with these marking principles.
• the specific content of the mark scheme or the generic level descriptors for the question
• the specific skills defined in the mark scheme or in the generic level descriptors for the question
• the standard of response required by a candidate as exemplified by the standardisation scripts.
Marks awarded are always whole marks (not half marks, or other fractions).
• marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit
is given for valid answers which go beyond the scope of the syllabus and mark scheme,
referring to your Team Leader as appropriate
• marks are awarded when candidates clearly demonstrate what they know and can do
• marks are not deducted for errors
• marks are not deducted for omissions
• answers should only be judged on the quality of spelling, punctuation and grammar when these
features are specifically assessed by the question as indicated by the mark scheme. The
meaning, however, should be unambiguous.
Rules must be applied consistently, e.g. in situations where candidates have not followed
instructions or in the application of generic level descriptors.
Marks should be awarded using the full range of marks defined in the mark scheme for the question
(however; the use of the full mark range may be limited according to the quality of the candidate
responses seen).
Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should
not be awarded with grade thresholds or grade descriptors in mind.
1(a) 2
applications system
() ()
Measurement software
Linker
Database
Utility software
2 6
Item Technical User Both
documentation documentation ()
() ()
Algorithms
File structures
Error messages
Hardware requirements
Glossary of terms
3(b) Header 1
3(c) Widow 1
4 Two from: 2
csv – comma-separated values
txt – text
rtf – rich text format
Drawbacks
Tend not to be popular with users
Too inflexible cannot ask follow up questions
Users tend to exaggerate their responses as they are anonymous
As it’s anonymous people may not take it seriously
Cannot expand on their answers/limited in their responses
8(a) =INT(G3/60) 2
Two from:
Gives the integer part of the calculation
Works out the minutes
The calculation is G3 divided by 60//Total time divided by 60
8(b) =ROUND(I3,1) 2
Two from:
Rounds the value of I3//total time to 1 decimal place
If the 2nd decimal place figure is 5 or more it rounds up
If the 2nd decimal place figure is below 5 it rounds down//stays the same
Disadvantages
More expensive to purchase equipment/software
Maintenance can be more expensive
If the system fails/power outages could cause the computer to lose
data/sensor fails
10(a) The worker completes the normal working hours per week 3
But works fewer days
10(b) Workers complete the same amount of hours over a working week 3
Workers can choose when to start and end in agreement with the manager
For example: Workers start at 9:30 rather than 9am to miss school run/miss
rush hour
Explanation of flexible schedule
Three from:
Data is loaded into the software to prepare it for printing
Software slices the model into hundreds of layers
3D printer creates the model layer by layer
Binds them together
12 Eight from: 8
Examples for advantages
The taxi can be controlled safely by the computer
Navigation systems find the quickest/safest route
Data is constantly being updated in the vehicle therefore reacts quicker to
changes
Traffic efficiency improved
Fuel efficiency is improved as the vehicle finds the best way of getting from
A to B
Roads will be safer as the vehicle can react faster to situations
Decreases the amount of accidents on the road
13 Matched pairs 6
Do not be abusive//be polite
Do not threaten people with violence/Do not use abusive words/Do not
cyber bully other students or incite bullying
As this will be upsetting for others
Check the email address carefully/check the names on the send list
So that emails are not sent to strangers
INSTRUCTIONS
• Answer all questions.
• Use a black or dark blue pen.
• Write your name, centre number and candidate number in the boxes at the top of the page.
• Write your answer to each question in the space provided.
• Do not use an erasable pen or correction fluid.
• Do not write on any bar codes.
• You may use an HB pencil for any diagrams, graphs or rough working.
INFORMATION
• The total mark for this paper is 100.
• The number of marks for each question or part question is shown in brackets [ ].
• No marks will be awarded for using brand names of software packages or hardware.
03_0417_12_2021_1.10
© UCLES 2021 [Turn over
2
1 Tick (✓) whether the following are examples of internal or external hardware devices.
internal external
(✓) (✓)
Mouse
Video card
Printer
Actuator
[2]
2 Geeta spends a great deal of time at work entering data into her computer.
State three items of hardware that Geeta should be provided with to help avoid RSI when she
enters data into the computer.
1 ................................................................................................................................................
..................................................................................................................................................
2 ................................................................................................................................................
..................................................................................................................................................
3 ................................................................................................................................................
..................................................................................................................................................
[3]
th
3 Falyaz has created a diary using word processing software. The diary entry for 17 May 2020 is
shown.
(a) Write down four formatting features of the word processing software used to make this diary
entry.
Feature 1...........................................................................................................................
...........................................................................................................................................
Feature 2...........................................................................................................................
...........................................................................................................................................
Feature 3...........................................................................................................................
...........................................................................................................................................
Feature 4...........................................................................................................................
...........................................................................................................................................
[4]
(b) The original diary entry typed into the word processing software did not include an image.
Describe the steps that would be carried out by Falyaz to include in his diary entry an image
taken from his digital camera.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [6]
(c) Name two other sources of digital images apart from using a digital camera.
Source 1............................................................................................................................
...........................................................................................................................................
Source 2............................................................................................................................
...........................................................................................................................................
[2]
(d) Tick (✓) whether the following statements about generic image files refer to jpg, png or gif
file types.
[4]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [4]
4 The table shows a comparison of two different types of fitness tracker. A fitness tracker contains
a microprocessor, is worn around the wrist and monitors physical readings of the wearer.
GPS Y N
(a) You have been asked to design a poster to show this data for the two fitness trackers.
Describe how you would use six different design features to enhance the data in this poster.
The poster must be suitable for an audience of adult customers.
1.........................................................................................................................................
...........................................................................................................................................
2.........................................................................................................................................
...........................................................................................................................................
3.........................................................................................................................................
...........................................................................................................................................
4.........................................................................................................................................
...........................................................................................................................................
5.........................................................................................................................................
...........................................................................................................................................
6.........................................................................................................................................
...........................................................................................................................................
[6]
(b) Describe the computer processing involved in the use of a microprocessor-controlled fitness
tracker when displaying and monitoring the blood pressure of the user.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [4]
5 A parent is concerned about his children sending texts. When sending a text, it is important to follow
netiquette.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [2]
(b) The parent is planning to produce a number of rules to ensure that his children follow netiquette
when texting other people.
1.........................................................................................................................................
...........................................................................................................................................
2.........................................................................................................................................
...........................................................................................................................................
3.........................................................................................................................................
...........................................................................................................................................
4.........................................................................................................................................
...........................................................................................................................................
[4]
6 Complete the following sentences, using the most appropriate direct data entry device.
(a) The device that reads data from a card in a contactless card system is called
........................................................................................................................................... [1]
(b) The device that reads scanned text and converts it into a readable form is called
........................................................................................................................................... [1]
(c) The device that reads the data made up of black lines and spaces on household goods is
called
........................................................................................................................................... [1]
7 A school is planning to introduce a contactless card system for pupils to pay for school meals. Each
card contains an amount of money which is topped up by parents. Parents transfer amounts of
money into the school system and pupils place the card close to a reader to upload the money onto
the card.
(a) Discuss the benefits and drawbacks, to the pupils, of using a contactless card system rather
than paying by cash.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [6]
(b) The terminals in the school use electronic funds transfer at point of sale (EFTPOS).
Describe the computer processing that takes place to pay for a meal at the EFTPOS terminal
using the card.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [6]
8 A computer system is being created to calculate the scores in a diving competition. Every dive by
an athlete is awarded a score out of 10 by each judge.
The system is being tested using live data. An athlete completes his dive with a difficulty of 3.4 and
achieves the following scores, which are displayed in a spreadsheet.
(a) Before the overall score is calculated the judges’ scores need to be sorted into ascending
order.
Describe the steps that would be carried out to sort the data into ascending order.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [3]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [3]
(c) The judges’ score column will be tested using normal, abnormal and extreme data.
Explain, giving examples of test data which would be used, what is meant by:
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[4]
9 Tawara school uses an optical mark recognition (OMR) system for its school register. An example
of the register is shown. For each session of the school there are two lozenges to be shaded in.
At the start of the registration period the teacher shades in a lozenge [P] on the register to show
that a pupil is present and shades in a lozenge [A] for each pupil who is absent. If a pupil is late
then the teacher shades in both the [P] and the [A] lozenges. The register sheets are sent to the
school office to be processed and the data from them is stored in the computer’s database.
(a) Describe the inputs and computer processing of the registers when they are sent to the school
office, prior to them being stored on the computer’s database.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [6]
(b) The headteacher of the school is considering modernising the registration system so that pupils
can register using a facial recognition system.
Discuss the advantages and disadvantages of using a facial recognition registration system
rather than the OMR system they currently use.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [8]
Give two other examples of personal data that could be stored on the school registration
database.
1.........................................................................................................................................
...........................................................................................................................................
2.........................................................................................................................................
...........................................................................................................................................
[2]
10 Computer data can be stored on physical storage devices. Data can also be stored in the ‘cloud’.
(a) Explain what is meant by the cloud, giving two advantages of storing data in the cloud compared
with physical storage devices.
Explanation........................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
Advantage 1......................................................................................................................
...........................................................................................................................................
Advantage 2......................................................................................................................
...........................................................................................................................................
[4]
(b) Tick (✓) whether the following storage devices are examples of optical, magnetic or solid
state storage.
optical magnetic solid state
(✓) (✓) (✓)
Flash drive
SSD
[4]
11 The owner of a bookshop has a database of all the books she has in stock. As some of the data
is being entered into the database it is checked using validation checks.
ISBN 471837951
Number of copies 10
Type of book E
ISBN 0718121753
Number of copies 53
Type of book H
ISBN 978147183215
Number of copies 30
Type of book H
Explain, using a field name and examples of the data stored in that field in the database, why
validation checks must be appropriate to the data that is being checked.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
.................................................................................................................................................. [4]
12 A company has placed a firewall between their Local Area Network (LAN) and their internet
connection. This is used to increase security in their computer systems.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
.................................................................................................................................................. [6]
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable
effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will
be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge Assessment
International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at
www.cambridgeinternational.org after the live examination series.
Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of
Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge.
Published
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.
Cambridge International will not enter into discussions about these mark schemes.
Cambridge International is publishing the mark schemes for the March 2021 series for most Cambridge
IGCSE™, Cambridge International A and AS Level components and some Cambridge O Level components.
These general marking principles must be applied by all examiners when marking candidate answers.
They should be applied alongside the specific content of the mark scheme or generic level descriptors
for a question. Each question paper and mark scheme will also comply with these marking principles.
• the specific content of the mark scheme or the generic level descriptors for the question
• the specific skills defined in the mark scheme or in the generic level descriptors for the question
• the standard of response required by a candidate as exemplified by the standardisation scripts.
Marks awarded are always whole marks (not half marks, or other fractions).
• marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit
is given for valid answers which go beyond the scope of the syllabus and mark scheme,
referring to your Team Leader as appropriate
• marks are awarded when candidates clearly demonstrate what they know and can do
• marks are not deducted for errors
• marks are not deducted for omissions
• answers should only be judged on the quality of spelling, punctuation and grammar when these
features are specifically assessed by the question as indicated by the mark scheme. The
meaning, however, should be unambiguous.
Rules must be applied consistently, e.g. in situations where candidates have not followed
instructions or in the application of generic level descriptors.
Marks should be awarded using the full range of marks defined in the mark scheme for the question
(however; the use of the full mark range may be limited according to the quality of the candidate
responses seen).
Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should
not be awarded with grade thresholds or grade descriptors in mind.
1 2
internal external
Mouse ✓
Video card ✓
Printer ✓
Actuator ✓
2 Three from: 3
Ergonomic keyboard
Ergonomic mouse
Microphone
Wrist rest
3(d) 4
jpg png gif
6(b) OCR 1
Drawbacks
Tendency to spend more as it is a card
Difficult to keep track of your spending as no physical money
If the card is damaged/lost the pupil cannot buy food/lose all their money
Card needs topping up regularly
Cards will need to be purchased by the pupils and can be expensive
Parents can see what the pupils buy
If there is an issue with the machine not easy to see mistakes
Easier to misplace than cash/coins
Parents can limit how much is spent on food
Pupils can only spend the money in the canteen and on food
To gain full marks there must be at least one benefit and at least one
drawback
Two from:
Click on the down arrow//Click on Custom Sort
Select column B
Select smallest to largest/A Z
Disadvantages
Facial injuries/facial hair/glasses/masks can affect the data entry
The cost of setting up a new system is higher as extra hardware and
software needs to be purchased//Setting up the system is more expensive
Time consuming to set up all the pupils
The data will need to be updated regularly due to facial changes as pupils
get older
Higher error rate
System is more complex therefore may cost more to maintain//Maintaining
the system is more expensive
The environment and usage may affect the reader
Biometric systems are not 100% accurate
Less flexibility as the OMR sheets can be used anywhere in the school
Biometric data harder be reset if incorrect/if change needed
Greater invasion of privacy as biometric data has to be stored on the
computer
To gain full marks there must be at least one advantage and one
disadvantage
Two from:
The cloud has greater storage capacity than other methods
The data could be sent directly to the cloud from any device
Access the data from any device/anywhere
Easier to add storage capacity
Lower capital outlay
The owner would only pay for the storage they used
Backup up tends to be automatic
Cloud is more robust
Cloud is more secure as it is password protected
10(b) 4
optical magnetic solid state
Flash drive ✓
SSD ✓
Matched pairs
Type of book
Can use length/lookup check as only one letter is input for example E or H
Cannot use a type check as only one letter used
ISBN
Can use check digit as a way of checking that digits are not transposed
Cannot use a length check as they are different lengths
Date of purchase
Can use a format check as all dates are the same format.
Number of copies
Can use a range/limit check as the lowest number is 1
Can use a type check as only numbers are accepted
Name of author
Cannot use a length check as names can be any length
12 Six from: 6
Benefits
Monitors traffic into and out of the network to make sure that all data
passing is safe.
Checks whether the data passing through it meets a given set of rules…
…if they do not then the data is blocked
Can block the unwanted traffic in and out of the network
It can log all incoming and outgoing traffic to check later
Can block certain undesirable websites/IP addresses
Keeps a list of desirable IP addresses/websites
It can block IP addresses to stop hackers
Drawbacks
It cannot stop individuals on internal networks by-passing the firewall
It cannot stop employees hacking the computer from within the system
Users own devices can by-pass the firewall therefore meaning the
computer/network is in danger
It cannot stop hackers only devices that hackers are using
To gain full marks on the question at least one benefit and drawback
are needed
INSTRUCTIONS
• Answer all questions.
• Use a black or dark blue pen.
• Write your name, centre number and candidate number in the boxes at the top of the page.
• Write your answer to each question in the space provided.
• Do not use an erasable pen or correction fluid.
• Do not write on any bar codes.
• You may use an HB pencil for any diagrams, graphs or rough working.
INFORMATION
• The total mark for this paper is 100.
• The number of marks for each question or part question is shown in brackets [ ].
• No marks will be awarded for using brand names of software packages or hardware.
06_0417_11_2021_1.8
© UCLES 2021 [Turn over
2
Yes No
(✓) (✓)
Full name
Capital of England
Gender
[2]
[2]
1 ................................................................................................................................................
..................................................................................................................................................
2 ................................................................................................................................................
..................................................................................................................................................
3 ................................................................................................................................................
..................................................................................................................................................
4 ................................................................................................................................................
..................................................................................................................................................
[4]
4 Many banks have reduced the number of staff in their branches and replaced them with automatic
teller machines (ATMs). These ATMs, which can be located within the bank, can be used by
customers to deposit and withdraw money from their bank accounts.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [6]
Discuss the advantages and disadvantages to a customer of visiting the bank rather than using
internet banking.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [6]
5 Tawara school has a shop that sells items needed by pupils in school. Part of a spreadsheet with
details of the items is shown.
(a) Write down the number of rows that are shown in the spreadsheet that contain text.
........................................................................................................................................... [1]
(b) Write down the number of columns that are shown in the spreadsheet that contain text.
........................................................................................................................................... [1]
(c) Tax is paid on certain items sold in the shop. The tax rate that has to be paid is 20% of the
selling price. If tax is to be paid on an item, then ‘Y’ is placed underneath the Tax heading.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [5]
(d) Explain the steps that need to be taken to display cell H4 as US dollars.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [2]
6 You have been asked by the secretary of a soccer club to create a website to publicise its results,
fixtures and other events.
When the website has been created it has to be published on the internet. You plan to upload it
onto the internet using FTP.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [2]
(b) Explain how to upload and publish the content of a website using FTP.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [4]
Write down three different features of the web pages that could be tested. For each feature,
describe the method you would use to carry out the test.
Feature 1...........................................................................................................................
Method...............................................................................................................................
...........................................................................................................................................
Feature 2...........................................................................................................................
Method...............................................................................................................................
...........................................................................................................................................
Feature 3...........................................................................................................................
Method...............................................................................................................................
...........................................................................................................................................
[6]
7 A systems analyst has created a new computer system to keep records in a medical centre. She
has created a relational database to store the medical records of patients.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [3]
(b) Explain the difference between a primary key and a foreign key.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [4]
(c) A dentist works at the medical centre. The dentist stores the medical records of his patients.
Describe four other uses of the database software that the dentist can use to help him in his
work.
1.........................................................................................................................................
...........................................................................................................................................
2.........................................................................................................................................
...........................................................................................................................................
3.........................................................................................................................................
...........................................................................................................................................
4.........................................................................................................................................
...........................................................................................................................................
[4]
(d) The data stored on the computer system needs to be protected from unauthorised access.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [8]
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
.................................................................................................................................................. [6]
9 A company operates from 08:00 to 19:00, Monday to Friday. Full-time employees work a 40-hour
week, starting at 09:00 and finishing work at 17:00.
For each of the times worked by an employee, write down the most appropriate working pattern.
........................................................................................................................................... [1]
........................................................................................................................................... [1]
(c) The work of two employees combined is a 40-hour week; each work for two full days and a
half day.
........................................................................................................................................... [1]
(d) An employee works a full 8-hour day but has negotiated with his employer to complete this at
some point between 08:00 and 19:00, each day.
........................................................................................................................................... [1]
10 Tick (✓) the most appropriate method of implementation to match the statements below.
If the new system fails the whole of the old system is still
operational.
[4]
(a) Explain what is meant by the term hacking. Include in your answer two examples of the effects
this can have on the computer system.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [3]
(b) Describe three measures that could be taken to protect the data from being hacked.
1.........................................................................................................................................
...........................................................................................................................................
2.........................................................................................................................................
...........................................................................................................................................
3.........................................................................................................................................
...........................................................................................................................................
[3]
Original image
For each of the following images describe the software editing technique used in order to produce
the edited images shown from the original image.
Edited images
A B C D
A ...............................................................................................................................................
..................................................................................................................................................
B ...............................................................................................................................................
..................................................................................................................................................
C ...............................................................................................................................................
..................................................................................................................................................
D ...............................................................................................................................................
..................................................................................................................................................
[4]
13 RockIT Airlines representatives use a computer booking system to book flights for customers.
A representative from the airline types in the customer reference number, the number of passengers,
departure time, departure date, departure airport and the destination airport.
A customer is planning to take a flight from London Heathrow Airport. The representative types in
a code LHR for London Heathrow Airport. One of the reasons for using a code for the airport is to
improve data accuracy.
(a) Describe two other advantages of using a code rather than typing out the full name.
1.........................................................................................................................................
...........................................................................................................................................
2.........................................................................................................................................
...........................................................................................................................................
[2]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [2]
(c) Describe the processing and outputs involved in making the booking.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [6]
14 A road through a village has a speed limit of 45 kilometres per hour. The police are checking and
recording the speed of vehicles passing through the village using measuring hardware and software,
so they can produce a report of their findings.
(a) Explain the difference between measurement and control when using microprocessors.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [2]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [4]
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable
effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will
be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge Assessment
International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at
www.cambridgeinternational.org after the live examination series.
Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of
Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge.
Published
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.
Cambridge International will not enter into discussions about these mark schemes.
Cambridge International is publishing the mark schemes for the May/June 2021 series for most Cambridge
IGCSE™, Cambridge International A and AS Level components and some Cambridge O Level components.
These general marking principles must be applied by all examiners when marking candidate answers.
They should be applied alongside the specific content of the mark scheme or generic level descriptors
for a question. Each question paper and mark scheme will also comply with these marking principles.
• the specific content of the mark scheme or the generic level descriptors for the question
• the specific skills defined in the mark scheme or in the generic level descriptors for the question
• the standard of response required by a candidate as exemplified by the standardisation scripts.
Marks awarded are always whole marks (not half marks, or other fractions).
• marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit
is given for valid answers which go beyond the scope of the syllabus and mark scheme,
referring to your Team Leader as appropriate
• marks are awarded when candidates clearly demonstrate what they know and can do
• marks are not deducted for errors
• marks are not deducted for omissions
• answers should only be judged on the quality of spelling, punctuation and grammar when these
features are specifically assessed by the question as indicated by the mark scheme. The
meaning, however, should be unambiguous.
Rules must be applied consistently, e.g. in situations where candidates have not followed
instructions or in the application of generic level descriptors.
Marks should be awarded using the full range of marks defined in the mark scheme for the question
(however; the use of the full mark range may be limited according to the quality of the candidate
responses seen).
Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should
not be awarded with grade thresholds or grade descriptors in mind.
1 2
yes no
Full name
Capital of England
Gender
2 Microphone 2
Touch screen
3 Four from: 4
Screens tend to be anti-glare
Uses touch screen
Front and back facing cameras are included
Has a built in battery
Lightweight
Uses Bluetooth/WiFi/3G/4G/5G
Uses solid state memory
Uses an onscreen keyboard
Portable
Small footprint
Disadvantages
Have to pay to travel to the bank to use the service
Customers could waste time standing in queues/travelling to the bank
More difficult for people who have a condition which affects their mobility
Smaller customer base as it is local
Potential for physical robberies
Cannot keep track of the accounts as easily
Not 24/7
5(a) 6 rows 1
5(b) 8 columns 1
6(c) Matched pairs – 1 mark for the feature and 1 mark for the method 6
Hyperlinks
Click each hyperlink to see that it takes the user to the correct web page/part
of the web page/website
Form buttons/icons
Click to see that they carry out the correct task
Text
Use spellchecker/grammar checker/proofread text to check it makes sense
Images
Check the images are not pixelated/correct size/correct image
Videos
Check the videos run correctly/correct video
Sound
Check the sound file runs correctly/correct sound file linked
8 Six from: 6
Comparison
Both are network devices
Both are hardware devices
Both have computers and devices connected to them
Both send data to devices//Both are communication devices
Contrast
In a hub data packets/data are broadcast to every device connected to it
A hub is less secure than a switch in distributing data
Switch checks the data packet
Switch sends to an appropriate device
10 4
Direct Parallel Pilot
Two from:
Examples
Can lead to the identity theft of data
Can lead to the misuse of/access to personal data
Data can be deleted
Data can be changed
Data can be corrupted
Place malicious files/software
INSTRUCTIONS
• Answer all questions.
• Use a black or dark blue pen.
• Write your name, centre number and candidate number in the boxes at the top of the page.
• Write your answer to each question in the space provided.
• Do not use an erasable pen or correction fluid.
• Do not write on any bar codes.
• You may use an HB pencil for any diagrams, graphs or rough working.
INFORMATION
• The total mark for this paper is 100.
• The number of marks for each question or part question is shown in brackets [ ].
• No marks will be awarded for using brand names of software packages or hardware.
06_0417_12_2021_1.2
© UCLES 2021 [Turn over
2
1 Tick (✓) whether the following are examples of control, measurement or modelling applications.
Personal finance
Weather forecasting
Burglar alarms
Weather stations
[4]
2 (a) Circle two items that could be used to output data directly from a smartphone.
[2]
(b) One of the uses of a smartphone is the sending and receiving of emails.
1.........................................................................................................................................
...........................................................................................................................................
2.........................................................................................................................................
...........................................................................................................................................
3.........................................................................................................................................
...........................................................................................................................................
4.........................................................................................................................................
...........................................................................................................................................
[4]
3 Tick (✓) the most appropriate storage medium that should be used in each scenario.
[4]
4 Complete the sentences below using the most appropriate word from the list.
........................................................................................................................................... [1]
(b) The software that gathers data by monitoring key presses on a user’s keyboard is called
........................................................................................................................................... [1]
(c) A fake text message, that could contain a link, sent to a mobile phone is called
........................................................................................................................................... [1]
5 Petr has set up a database for a science project on planets in the solar system. Part of the database
is shown.
(a) When Petr was designing his database, he had to set the data types for each field.
Complete the design table below by filling in the data types for each named field. Use the most
appropriate data type. Each data type must be different. For any numeric field, specify the type
of number.
Number_of_moons
Orbital_period
Rings
Name_of_planet
[4]
(b) Operators such as AND, OR, NOT, LIKE, >, >=, <, <=, =, <> can be used to search Petr’s
planet database. The search criteria for all the gas giant planets with more than 20 moons
would look like this:
Write down the search criteria that will produce a list of planets that are not gas giants but
have at least one moon and were first observed after 1800.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [7]
(c) Write down the names of the planets that are not gas giants but have at least one moon and
were first observed after 1800.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [2]
(d) Petr has copied the data from the Orbital_period field into a spreadsheet. The data for the
orbital period for Mars, 1.88, is stored in cell A2. In cell B2 he has entered a function of:
ROUND(A2,0)
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [2]
6 Humans can send unmanned aircraft into storms to collect wind speeds and temperature data. The
unmanned aircraft have sensors attached to them which send the data back to computers at the
weather station. The computers analyse the data.
Previously the aircraft was manned and all the data was collected and flown back to the weather
station.
Discuss the advantages and disadvantages of using the unmanned aircraft rather than using the
manned aircraft.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
.................................................................................................................................................. [8]
7 The owner of Tawara Hotels is planning a new computerised booking system. There are ten Tawara
Hotels throughout the world. The current booking system allows people to book rooms in any of
the Tawara Hotels. He has employed a systems analyst to research the current system and then
install the new system.
(a) When analysing the current booking system, the systems analyst must identify the user
requirements.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [3]
(b) Tick (✓) the relevant stage of the systems life cycle for each of the following activities.
Development
Activity Analysis and testing Evaluation
(✓) (✓) (✓)
[4]
(c) Before the new booking system is installed, the systems analyst has to decide on a method
of implementation. One method of implementation is pilot running.
Name two other methods of implementation and describe two benefits of each.
Name.................................................................................................................................
Benefit 1............................................................................................................................
...........................................................................................................................................
Benefit 2............................................................................................................................
...........................................................................................................................................
Name.................................................................................................................................
Benefit 1............................................................................................................................
...........................................................................................................................................
Benefit 2............................................................................................................................
...........................................................................................................................................
[6]
8 Students often use IT equipment; therefore it is important to have a good physical safety strategy.
Evaluate your own use of IT equipment, in terms of physical safety, and describe the strategies
you will need to minimise the potential physical safety risks.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
.................................................................................................................................................. [6]
1.........................................................................................................................................
...........................................................................................................................................
2.........................................................................................................................................
...........................................................................................................................................
[2]
(b) Social networking is used to communicate with friends; this is one use of the internet.
1.........................................................................................................................................
...........................................................................................................................................
2.........................................................................................................................................
...........................................................................................................................................
3.........................................................................................................................................
...........................................................................................................................................
4.........................................................................................................................................
...........................................................................................................................................
[4]
(c) A major part of the everyday use of the internet is social networking. Currently some social
networks are not policed. The owners of a website have full discretion on what material is
removed and what is allowed to be kept.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [8]
10 Describe the advantages, to both the company and employees, of changing work patterns due to
the introduction of computers.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
.................................................................................................................................................. [6]
Explain why a digital certificate is required. Include in your answer items that could be found in a
digital certificate.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
.................................................................................................................................................. [5]
(a) Describe the disadvantages of using a search engine to find information rather than typing in
a web address.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [4]
(b) A student is writing a project on rare animals. He uses a search engine to find information
about the animals from the internet. He is concerned about the reliability of some of the
information he has found.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [6]
The student plans to create a table, using word processing software, to display the information he
has found out about the animal.
Pouched No
Habitat Australia
(c) Explain how the student can create a table to enter this data.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [2]
(d) The student has saved a picture from the internet of a tiger quoll.
Explain how he could create a new row above the Pouched row and place the picture into the
right-hand cell of this new row.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [4]
BLANK PAGE
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable
effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will
be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge Assessment
International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at
www.cambridgeinternational.org after the live examination series.
Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of
Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge.
Published
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.
Cambridge International will not enter into discussions about these mark schemes.
Cambridge International is publishing the mark schemes for the May/June 2021 series for most Cambridge
IGCSE™, Cambridge International A and AS Level components and some Cambridge O Level components.
These general marking principles must be applied by all examiners when marking candidate answers.
They should be applied alongside the specific content of the mark scheme or generic level descriptors
for a question. Each question paper and mark scheme will also comply with these marking principles.
• the specific content of the mark scheme or the generic level descriptors for the question
• the specific skills defined in the mark scheme or in the generic level descriptors for the question
• the standard of response required by a candidate as exemplified by the standardisation scripts.
Marks awarded are always whole marks (not half marks, or other fractions).
• marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit
is given for valid answers which go beyond the scope of the syllabus and mark scheme,
referring to your Team Leader as appropriate
• marks are awarded when candidates clearly demonstrate what they know and can do
• marks are not deducted for errors
• marks are not deducted for omissions
• answers should only be judged on the quality of spelling, punctuation and grammar when these
features are specifically assessed by the question as indicated by the mark scheme. The
meaning, however, should be unambiguous.
Rules must be applied consistently, e.g. in situations where candidates have not followed
instructions or in the application of generic level descriptors.
Marks should be awarded using the full range of marks defined in the mark scheme for the question
(however; the use of the full mark range may be limited according to the quality of the candidate
responses seen).
Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should
not be awarded with grade thresholds or grade descriptors in mind.
1 4
control measurement modelling
Personal
finance
Weather
forecasting
Burglar alarms
Weather
stations
2(a) Speaker 2
Screen
3 4
Scenario Magnetic RAM ROM
tape
4(a) Hacking 1
4(b) Spyware 1
4(c) Smishing 1
5(a) 4
Field name Data type
Rings Boolean
Name_of_planet Text
Type_of_planet – 1 mark
<> "Gas Giant" – 1 mark
First_observed – 1 mark
>1800 – 1 mark
5(c) Pluto 2
Haumea
6 Eight from: 8
Advantages
Less expensive to fly the aircraft into the storm
Less risk to life as there is no flight crew
It can be flown closer to the storm
Time taken to receive the data is shorter as don’t have to land the aircraft
before sending data
Results are processed immediately
On board computers can analyse the data continuously
Readings can be taken more frequently
Disadvantages
The sensors could malfunction and there is no way of repairing them easily
You can lose the signal due to the electrical charges in the storm
Less responsive
Slower to react
May go out of range
7(b) 4
Activity Analysis Development Evaluation
and testing
I make sure all wires are fastened to the wall/placed under carpets/in
ducts//Use wireless...
...This reduces tripping hazards
I make sure all IT equipment is safely in the middle of desks//I make sure
strong tables are used to store IT equipment/I don’t store IT equipment on
high shelves...
...To stop them falling on me and causing an injury
9(c) Benefits 8
Max four:
Can reduce cyber bullying/hate speech/sexual harassment
Can reduce social media from being used for illegal activities
Can reduce the ability to incite violence/trolling
Could prevent people from being subjected to inappropriate messages
Can reduce illegal/inappropriate images
Drawbacks
Freedom of speech is reduced
Would be very difficult to police as there is a massive amount of information
Different rules in different countries and social media crosses borders
Very costly to create an effective deterrent
Could force individuals to use other un-policed methods of communication
Who decides what is acceptable and what is not acceptable
Privacy issues as people checking could read messages
Difficult to police as users can be anonymous
10 Six from: 6
Advantages to employees
Staff are more flexible when they work so they can carry out other activities
Staff are more contented as they can work hours which suit their home life
They can start later/earlier so they avoid rush hour in the morning, so they do
not arrive stressed
They can start earlier/work later to avoid rush hour in evening so cuts travel
time
Compressed hours can lead to longer holidays/weekends therefore staff
more refreshed
Part time working allows people with other commitments to work
Job sharing allows a piece of work to be completed using the skills set of
more than one worker therefore cutting stress
Working from home allows employees to balance their home life
Or
INSTRUCTIONS
• Answer all questions.
• Use a black or dark blue pen.
• Write your name, centre number and candidate number in the boxes at the top of the page.
• Write your answer to each question in the space provided.
• Do not use an erasable pen or correction fluid.
• Do not write on any bar codes.
• You may use an HB pencil for any diagrams, graphs or rough working.
INFORMATION
• The total mark for this paper is 100.
• The number of marks for each question or part question is shown in brackets [ ].
• No marks will be awarded for using brand names of software packages or hardware.
06_0417_13_2021_1.7
© UCLES 2021 [Turn over
2
1 Tick (✓) whether the following statements refer to Backing storage, RAM or ROM.
Backing
storage RAM ROM
(✓) (✓) (✓)
[4]
2 Circle two jobs where there has been an increase in employment as a direct result of the introduction
of computers.
Delivery drivers for
Car production workers Cleaning staff Medical staff
retail stores
Payroll workers Secretaries Teachers Website designers
[2]
3 A mobile phone is used for communications, either for making phone calls or text messaging.
Chang is planning an expedition to the Southern Alps in New Zealand. There is often a limited
mobile phone signal in these areas. He has set his phone up so that if there is an emergency he
can communicate with the rescue teams using text messaging rather than making a phone call.
1 ................................................................................................................................................
..................................................................................................................................................
2 ................................................................................................................................................
..................................................................................................................................................
[2]
4 Tick (✓) whether the following descriptions of analysing a system refer to Interviews, Observation
or Questionnaires.
[4]
5 Complete the sentences using the most appropriate item from the list.
(a) A piece of software that allows a user to display a web page is called a
........................................................................................................................................... [1]
........................................................................................................................................... [1]
(c) A web application that allows a group of people to edit the content is called a
........................................................................................................................................... [1]
6 Susan is creating a database about cars and needs to save it in the shared area (S:) on the school
network. It will be stored in the folder ICT which is contained in the IGCSE folder. She needs to
save the file with a file name that is different from file names used by other students in the group.
(a) Write down a suitable file name for the file so that the teacher can easily find Susan’s work
and identify its contents. The file name should not contain spaces.
...........................................................................................................................................
........................................................................................................................................... [1]
(b) Write down the file path which Susan would use to store the file in the correct folder.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [2]
(c) Susan plans to work on her database at home. However, the database is very large so her
teacher has told her that it needs to be reduced in size. She will then be able to attach it to an
email so she can send it home.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [2]
7 A family has purchased a wireless router for use in their home to allow their devices to be connected
via WiFi to form a wireless local area network (WLAN).
(a) When the family purchased the wireless router they were advised to change the default
password.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [2]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [4]
(c) Their son produces large complex diagrams on his desktop computer at home. He needs to
be able to access the diagrams when he is at university. Even if reduced in file size, the
diagrams would be too large to send using email.
Describe in detail how he could transfer the diagrams from his home desktop computer to be
able to access them at university, without using additional hardware.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [4]
(d) One of the parents in the family works for a government department and sends sensitive data
from their home computer to the office.The data is encrypted before being sent to ensure it is
harder to understand if it is intercepted.
Describe four other preventative measures that could be taken to avoid network security
issues.
1.........................................................................................................................................
...........................................................................................................................................
2.........................................................................................................................................
...........................................................................................................................................
3.........................................................................................................................................
...........................................................................................................................................
4.........................................................................................................................................
...........................................................................................................................................
[4]
8 Many teachers feel that monitoring student progress is an important part of the teaching and learning
process.
Describe how the features of a spreadsheet can be used by a teacher to help monitor student
progress.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
.................................................................................................................................................. [6]
9 One way of communicating with other people is to use emails. It is very important that when you
send and receive emails you are aware of esafety.
Evaluate your own use of email in terms of esafety and describe the strategies you will need to
minimise the potential esafety risks.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
.................................................................................................................................................. [8]
10 Aimi works for a shop that sells toys. She is setting up a relational database of the stock in the
shop. She has started designing the database. Aimi has written down the questions that are asked
about each toy and needs to produce appropriate field names from them. An example of the type
of data that is to be stored is shown.
(a) Complete the design table below by filling in an appropriate field name for each question. Each
field name must be different. Field names must not include spaces.
[4]
(b) When Aimi created the whole database one of the fields was set as integer. However, as data
is entered Aimi realises that the field should have been set to two decimal places.
Describe the steps that need to be taken, by Aimi, to change the field from an integer to a
decimal. This field will be set to two decimal places.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [4]
(c) Aimi created a relational database but could have created a flat file database.
Discuss the advantages and disadvantages of using a relational database rather than a flat
file database.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [6]
11 Tawara College is setting up a new website for its older students. The website will publicise the
events in the college, as well as revision and sporting activities. The headteacher wants the website
to be attractive to the older students and it must meet their needs.
Before the website can be produced the needs of the audience have to be taken into account.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
.................................................................................................................................................. [8]
12 The director of a zoo is writing a document about wallabies. He has taken an image of some
wallabies (Fig. 12.1) and is planning the layout of the pages which will include part of the image.
The image he plans to use is shown in Fig. 12.2.
Fig. 12.1
Fig. 12.2
(a) Name the editing technique that was used to change Fig. 12.1 to Fig. 12.2.
........................................................................................................................................... [1]
(b) The director will include images and information about the wallabies in the document. Each
page will be set out in 2 columns with a line between them.
(i) Describe the steps taken to create the columns. Assume the software has been loaded
and the text has been entered.
................................................................................................................................
................................................................................................................................
................................................................................................................................
................................................................................................................................
................................................................................................................................
................................................................................................................................ [3]
................................................................................................................................
................................................................................................................................
................................................................................................................................
................................................................................................................................
................................................................................................................................
................................................................................................................................
................................................................................................................................
................................................................................................................................ [4]
(c) As the document is being written for the zoo it needs to conform to the corporate house style.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [4]
13 A student is looking for information on the internet for his school project. He has found a number
of web pages that are useful.
(i) Bookmark
................................................................................................................................
................................................................................................................................
................................................................................................................................
................................................................................................................................ [2]
(ii) Anchor
................................................................................................................................
................................................................................................................................
................................................................................................................................
................................................................................................................................ [2]
(iii) Hyperlink
................................................................................................................................
................................................................................................................................
................................................................................................................................
................................................................................................................................ [2]
(b) The student has found a website that is very useful and is planning to bookmark it.
Describe the steps he will need to take to set up a bookmark for the website.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [2]
Describe the advantages and disadvantages of using magnetic tapes rather than flash memory for
backing up data.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
.................................................................................................................................................. [6]
15 Streaming movies and music is replacing downloading or purchasing a physical copy of the files.
Describe the advantages and disadvantages of streaming files rather than using other methods.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
.................................................................................................................................................. [4]
BLANK PAGE
BLANK PAGE
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable
effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will
be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge Assessment
International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at
www.cambridgeinternational.org after the live examination series.
Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of
Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge.
Published
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.
Cambridge International will not enter into discussions about these mark schemes.
Cambridge International is publishing the mark schemes for the May/June 2021 series for most Cambridge
IGCSE™, Cambridge International A and AS Level components and some Cambridge O Level components.
These general marking principles must be applied by all examiners when marking candidate answers.
They should be applied alongside the specific content of the mark scheme or generic level descriptors
for a question. Each question paper and mark scheme will also comply with these marking principles.
• the specific content of the mark scheme or the generic level descriptors for the question
• the specific skills defined in the mark scheme or in the generic level descriptors for the question
• the standard of response required by a candidate as exemplified by the standardisation scripts.
Marks awarded are always whole marks (not half marks, or other fractions).
• marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit
is given for valid answers which go beyond the scope of the syllabus and mark scheme,
referring to your Team Leader as appropriate
• marks are awarded when candidates clearly demonstrate what they know and can do
• marks are not deducted for errors
• marks are not deducted for omissions
• answers should only be judged on the quality of spelling, punctuation and grammar when these
features are specifically assessed by the question as indicated by the mark scheme. The
meaning, however, should be unambiguous.
Rules must be applied consistently, e.g. in situations where candidates have not followed
instructions or in the application of generic level descriptors.
Marks should be awarded using the full range of marks defined in the mark scheme for the question
(however; the use of the full mark range may be limited according to the quality of the candidate
responses seen).
Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should
not be awarded with grade thresholds or grade descriptors in mind.
1 4
Backing RAM ROM
storage
3 Two from: 2
He may be tired/injured therefore text messaging is easier than trying to talk
The text message is sent even though the sender’s phone is in limited signal
strength
Limited signal strength can result in a break of voice
A text message is quicker to send
4 4
Interviews Observation Questionnaires
5(b) Blog 1
5(c) Wiki 1
6(b) S:\IGCSE\ICT\ 2
\IGCSE – 1 mark
\ICT\ – 1 mark
8 Six from: 6
Student progress can be shown over time using graphs
Comparisons between students can be shown using graphs
Comparisons with archive data can be shown using graphs
Conditional formatting can be used to show how a student is performing
compare to other students or past performance
Data can be sorted to show the best performers in the class
Calculate average marks to enable comparisons
Automatic reporting results to parents
Filtering students to show those above/below a threshold
I do not reply by using reply button unless I know the person ...
... because it may be a scam
10(a) 4
Question Field name (Examples)
Disadvantages
More complex than a flat file database as more tables are required
Takes more time to set up
More of a reduction in performance if many tables are needed
Slower extraction of data
Less robust due to broken keys and records//Each table requires a key field
and relationships to other tables
Needs specialist personnel to setup the database
More processing power needed for complex queries
A relational database is more complex to understand that a flat file database
11 Eight from: 8
There needs to be emoticons/clipart to grab the attention
The content needs to be relevant to improve their knowledge
There must be a balance of information and pictures with more information
than pictures
The use of white space is less important
More hyperlinks to related web pages
Fonts must be clear and readable
The interface must be simple, clear and intuitive
Slideshows, videos and images providing more information
High contrast background
The students need to be constantly engaged
Needs to be interactive
The tone of the website needs to be casual
The website needs to be able to work on all platforms especially mobile ones
The content needs to be kept fresh and updated
12(a) Cropping/crop/cut 1
Three from:
Use of corporate/same colours
Same font
Same style of font
Margins and white space look similar
Graphics are similar
Logos are the same
Language used is the same on all documents within the organisation
Position of the images are the same
14 Six from: 6
Advantages
Less expensive per GB/gigabyte of memory
Not as easily lost, as larger in size
Disadvantages
Data access time is slower
Data transfer rate is slower
Affected by magnetic fields
They have moving parts therefore less robust
Read and write is more noisy
Less compact that flash memory
Harder to transfer to other devices
Requires a special reader
15 Four from: 4
Advantages
Files can be larger therefore it can save physical storage space
More likely to get the music you need
More likely to get more up to date music
Can be accessed in more places as only need the internet
Don’t need physical storage space
Don’t need optical drives to view/listen to movie/audio
Can be viewed on mobile devices with internet connection
Copyright owners have more control over who can watch the movie/listen to
the audio as no physical copy exists to be copied/pirated
Don’t have to wait for the whole/large file to be downloaded before viewing
Physical copies can be lost/stolen/damaged rendering them useless/have to
buy again but steamed movies are always available
Disadvantages
Needs a connection to the internet
Never own a physical copy of the file
The playback is dependent on the internet connection therefore may not be as
good a quality
A subscription may be needed to be paid therefore may be more expensive
2 hours
INSTRUCTIONS
● Answer all questions.
● Use a black or dark blue pen.
● Write your name, centre number and candidate number in the boxes at the top of the page.
● Write your answer to each question in the space provided.
● Do not use an erasable pen or correction fluid.
● Do not write on any bar codes.
● You may use an HB pencil for any diagrams, graphs or rough working.
INFORMATION
● The total mark for this paper is 100.
● The number of marks for each question or part question is shown in brackets [ ].
● No marks will be awarded for using brand names of software packages or hardware.
DC (CE/FC) 203093/2
© UCLES 2021 [Turn over
2
...................................................................................................................................................
............................................................................................................................................. [1]
1 ................................................................................................................................................
2 ................................................................................................................................................
[2]
...................................................................................................................................................
............................................................................................................................................. [1]
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
[2]
2 Circle two jobs where there has been a decrease in employment as a direct result of the
introduction of computers.
3 Describe two advantages of using a tablet computer rather than a laptop computer.
1 .......................................................................................................................................................
..........................................................................................................................................................
2 .......................................................................................................................................................
..........................................................................................................................................................
[2]
4 Tick (3) whether the following advantages of analysing a system refer to looking at existing
paperwork, observation or questionnaires.
Looking
at existing
paperwork Observation Questionnaire
(3) (3) (3)
[4]
5 Tawara Tours has created a new online booking system to allow customers to book holidays. The
system was written using modules.
(a) Describe how the new system could be tested prior to it becoming operational.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [6]
(b) Tawara Tours used to book holidays using a manual booking system. This used a pen and
paper to make the bookings.
Discuss the advantages and disadvantages of using online booking systems rather than a
manual booking system.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [8]
6 As a student you often use a computer screen. This could be a screen on a desktop computer, a
laptop computer or even a smartphone.
Evaluate your use of computer screens, in terms of health risks, and explain any strategies you
use to minimise these health risks.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
.................................................................................................................................................... [6]
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
.................................................................................................................................................... [4]
(a) Explain how the purpose of the internet differs from the purpose of an intranet.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
Employees in the organisation are allowed to access the intranet using their smartphones.
The employees are required to secure their smartphones using either facial recognition, passwords
or voice recognition.
(b) Tick (3) whether the following statements refer to facial recognition, password or
voice recognition.
Facial Voice
recognition Password recognition
(3) (3) (3)
This method cannot access the
smartphone unintentionally
The accuracy of this method can be
affected by noise
This method requires the use of the
smartphone’s camera
This method could be compromised by
shoulder surfing
[4]
(a) Describe two other jobs that robots can perform in car production.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
(b) When the spray paint can is empty it needs to be refilled. There is a sensor in the can which
measures the amount of paint.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [6]
(c) Discuss the advantages and disadvantages of the introduction of robots rather than employing
humans to spray paint the cars.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [6]
10 (a) Explain the differences between a VLOOKUP function and a LOOKUP function.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
(b) A spreadsheet contains a list of staff and the rooms they work in at a school.
A B C D E
1 Room Department Name
2 29 Languages Aaron Garcia 31 =VLOOKUP(D2,A2:C7,3)
3 30 History Julieta Diaz
4 28 Chemistry Ernesto Fernandez
5 26 Biology Salvador Calbo
6 31 ICT David James
7 49 Mathematics Adriene Martinez
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [3]
(ii) When certain room numbers are typed into cell D2 unexpected results appear in cell E2.
Suggest improvements that could be made to ensure the correct result is displayed.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [2]
A teacher in the school has created a spreadsheet to display whether a student has good
timekeeping when arriving at lessons. He has produced a formula but thinks it could be improved.
The formula is:
=IF(B4>=A$18,B$18,IF(B4>=A$17,B$17,IF(B4>=A$16,B$16,IF(B4>=A$15,B$15,IF(B4>=A$14,B$14,"")))))
A B C
1
2 Name of Student
3 Half term Lates
4 1 17 =IF(B4>=A$18,B$18,IF(B4>=A$17,B$17,IF(B4>=A$16,B$16,IF(B4>=A$15,B$15,IF(B4>=A$14,B$14,"")))))
5 2 20
6 3 1
7 4 12
8 5 18
9 6 0
10
11
12
13
14 0 Excellent
15 1 Very Good
16 5 Good
17 15 Poor
18 25 Very Poor
19
(c) Write down the value that should appear in cell C4.
............................................................................................................................................. [1]
(d) The teacher has improved the formula and has typed in =VLOOKUP(B4,A$14:B$18,2)
Explain the advantages of using this formula compared to the original one.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
11 Many young people play online games. One problem with online gaming is that it is easy to give
out personal details accidentally. Some users create weak passwords which could lead to their
personal details being accessed.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
[2]
(b) Write down three rules that should be applied when setting a strong password.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[3]
(c) Describe safety measures that should be taken by gamers to ensure their data is safe other
than using strong passwords.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [6]
© UCLES 2021 0417/11/O/N/21
13
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [6]
13 A student is working on a project on the World Games. He has produced some information but has
decided to produce a second layout including a table. The original layout and the new layout are
shown.
(a) Explain, step by step, how the table was created, without the text being entered by hand.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
(b) The student checks the text he has written using a spell checker.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
(c) Explain why the suggestions made by the spell checker do not always give the correct
response.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.
Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of
Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge.
Published
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.
Cambridge International will not enter into discussions about these mark schemes.
Cambridge International is publishing the mark schemes for the October/November 2021 series for most
Cambridge IGCSE™, Cambridge International A and AS Level components and some Cambridge O Level
components.
These general marking principles must be applied by all examiners when marking candidate answers.
They should be applied alongside the specific content of the mark scheme or generic level descriptors
for a question. Each question paper and mark scheme will also comply with these marking principles.
• the specific content of the mark scheme or the generic level descriptors for the question
• the specific skills defined in the mark scheme or in the generic level descriptors for the question
• the standard of response required by a candidate as exemplified by the standardisation scripts.
Marks awarded are always whole marks (not half marks, or other fractions).
• marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit
is given for valid answers which go beyond the scope of the syllabus and mark scheme,
referring to your Team Leader as appropriate
• marks are awarded when candidates clearly demonstrate what they know and can do
• marks are not deducted for errors
• marks are not deducted for omissions
• answers should only be judged on the quality of spelling, punctuation and grammar when these
features are specifically assessed by the question as indicated by the mark scheme. The
meaning, however, should be unambiguous.
Rules must be applied consistently, e.g. in situations where candidates have not followed
instructions or in the application of generic level descriptors.
Marks should be awarded using the full range of marks defined in the mark scheme for the question
(however; the use of the full mark range may be limited according to the quality of the candidate
responses seen).
Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should
not be awarded with grade thresholds or grade descriptors in mind.
Processor
Motherboard
Video/graphic card
Sound card
Word processing
Spreadsheet
Database
Presentation
3 Two from: 2
4 4
Looking at Observation Questionnaire
existing
paperwork
Advantages
Prevents double booking
The customer can see immediately when the holiday has been booked
Bookings can be made 24/7
No need to travel to the booking office/queue up so saves time
Can be booked from any location
Saves cost of travelling to the booking office
Tickets are usually sent online and therefore paperless//Saves printing and
postal costs
Usually cheaper as lower/fewer overheads
Customers can more easily see the tours that are available
Disadvantages
Setting up is expensive//maintenance is expensive
Internet access is needed to run the booking system therefore the cost may
be increased
More reliant on server/network
Booking mistakes can be more easily made
Mistakes are more difficult to rectify due to the speed of booking
If the system crashes during the booking the booking may not be made
To gain full marks there must be at least one advantage and one
disadvantage
6 Problem: 6
Award a mark for each problem identified
I avoid back and neck problems
I avoid eye strain
I avoid getting headaches
I avoid epilepsy
Strategies:
Max four from:
Make sure the top of the screen is at eye level
Make sure that I adjust the tilting screen correctly
Take regular breaks
Do neck/back exercises
Make sure I use blue lens spectacles
Use a screen filter
Use a matt/anti-glare screen
Turn the screen away from the window
Use a computer screen for a short time/take regular breaks
Have my eyes tested regularly
Improve the lighting in the room
Sitting further away from the screen
Keeping the screen clean
Position the screen to reduce glare
Use a non-flickering screen/LED/LCD
Turn the brightness down on the screen
7 Four from: 4
8(b) 4
Facial Voice
recognition Password Recognition
Fit windscreens
Fit the wheels
Welding body panels
Move cars from one place to another
Fit engines
Advantages
They can work in areas where it would be harmful for humans
They can work 24/7
Cheaper in the long run
Higher productivity
The finish is more consistent
Disadvantages
Expensive to purchase
Skills can be lost
Expensive to maintain/reprogram
Expensive to start up//train staff to operate the robots
To gain full marks there must be at least one advantage and one
disadvantage
10(c) Poor 1
Email address
Real names
DOB
Home address
Contact phone number
Membership card number
Location data
Internet Protocol (IP) address
Picture of yourself
Gender
Dedicated website/app/platforms
It interacts with other users
Can be used to find people with similar interests
2 hours
INSTRUCTIONS
● Answer all questions.
● Use a black or dark blue pen.
● Write your name, centre number and candidate number in the boxes at the top of the page.
● Write your answer to each question in the space provided.
● Do not use an erasable pen or correction fluid.
● Do not write on any bar codes.
● You may use an HB pencil for any diagrams, graphs or rough working.
INFORMATION
● The total mark for this paper is 100.
● The number of marks for each question or part question is shown in brackets [ ].
● No marks will be awarded for using brand names of software packages or hardware.
DC (CE/FC) 203094/2
© UCLES 2021 [Turn over
2
(a) Give two examples of input devices which are part of a laptop computer.
1 ................................................................................................................................................
2 ................................................................................................................................................
[2]
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
[2]
2 Tick (3) the most appropriate printer which relates to the following statements.
[4]
3 (a) Describe two disadvantages of using a tablet computer rather than a laptop computer.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
[2]
State two ways music can be transferred onto a computer that does not contain an optical
drive.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
[2]
4 Write down the most appropriate network device to match the following statements. Your answers
should be different in each part.
(a) This network device checks the data packet arriving from one computer and sends the data
to a specific computer.
............................................................................................................................................. [1]
(b) This network device sends the data packet from a computer to all devices connected to it.
............................................................................................................................................. [1]
............................................................................................................................................. [1]
(d) This network device connects one LAN to another with the same protocol.
............................................................................................................................................. [1]
5 The Internet of Things (IoT) is a computer network which allows users to control household
devices remotely. It has many benefits, for example a user can turn on the house central heating
via a smartphone. The IoT can use WiFi and Bluetooth which can cause problems regarding data
security.
Describe the methods that could be taken to protect the user’s data.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
.................................................................................................................................................... [6]
6 As a student you often use a computer keyboard. This could be a virtual keyboard or a physical
keyboard on a desktop computer, a laptop computer or even a smartphone.
Evaluate your use of computer keyboards in terms of health risks, and explain any strategies you
use to minimise these health risks.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
.................................................................................................................................................... [8]
7 Rockit Motors recently created a new car sales website. The website uses internet shopping
features. Customers can ask questions of the virtual salespeople on the website, and then
purchase the car on the website.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
(b) Discuss the benefits and drawbacks of using internet shopping for Rockit Motors.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [6]
(c) Before the website became operational it needed to be tested. The web designer created a
test plan including module and whole system testing.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
8 You are creating a presentation on the World Games. You have created a spreadsheet showing
the number of gold, silver and bronze medals awarded to different countries.
You are planning to create a graph in the presentation showing the country, the number of gold
medals and the total number of medals.
A B C D E F
1 World Games Medals
2
3 Country Gold Silver Bronze Total
4 1 Italy 153 145 142 440
5 2 United States 142 131 109 382
6 3 Germany 137 111 138 386
7 4 Russia 137 110 72 319
8 5 France 101 102 105 308
9 6 China 68 55 27 150
10 7 Great Britain 61 89 210 360
11 8 Japan 55 38 53 146
12 9 Ukraine 47 36 125 208
13 10 Spain 42 42 42 126
Original data
(a) Explain how you would create a vertical bar chart, showing the name of the country, the
number of gold medals and the total number of medals awarded to each country, on a new
slide in the presentation.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [6]
(b) The total number of medals has been calculated manually and entered as a value. This could
lead to errors.
Explain how you could create a formula to calculate the total number of medals awarded for
Italy, using only the mouse.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
(c) Explain how the data could be sorted by the total number of medals won by each country.
The country with the largest number of medals should be at the top of the list.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
1 .......................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
2 .......................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
3 .......................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
[6]
10 A school is planning to change the way it reports back to parents about their child’s academic
progress. They plan to produce a mail merged document and then email this to parents.
They have created a spreadsheet which shows the pupil’s name, target, attainment and effort
levels for Maths and the Science subjects.
A B C D E F G H I J K
1 Name Target level Maths Biology Chemistry Physics
2 Attainment Effort Attainment Effort Attainment Effort Attainment Effort
3 Ahmal Wulandan 6 7 2 6 2 8 1 7 2
4 Nurul Prakoso 8 7 3 7 3 9 1 7 2
5
(a) Design a suitable document layout to display the information of one pupil. The name of the
pupil must be clearly shown separated from the rest of the data. It must have appropriate
spacing. Do not include the pupil’s data.
[6]
(b) The attainment levels range from 1 to 9 and the effort levels range from 1 to 3. Before teachers
are allowed to enter data, the spreadsheet needs to be tested.
Write down one example of extreme data to test the attainment field and one example of
abnormal data to test the effort field.
(c) Describe four advantages of using a mail merge for this document.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
3 ................................................................................................................................................
...................................................................................................................................................
4 ................................................................................................................................................
...................................................................................................................................................
[4]
(d) When the mail merge is created, a special field containing the date needs to be added. This
date will change automatically each time the merged document is sent or printed.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
11 An air-conditioning system has been fitted in a hotel bedroom. The air-conditioning system will
contain fans which operate at varying speeds.
Identify the devices used in the system from the descriptions given.
............................................................................................................................................. [1]
(b) This device changes the data from the microprocessor into a form that can change the speed
of the fan.
............................................................................................................................................. [1]
............................................................................................................................................. [1]
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
.................................................................................................................................................... [6]
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
.................................................................................................................................................... [4]
14 Students in Tawara College are using the internet to find information for a project. They have been
told that the college has a firewall.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [6]
The students visit different websites to get information for their project.
(b) Explain why it is not always easy for the students to find reliable information on the internet.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.
Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of
Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge.
Published
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.
Cambridge International will not enter into discussions about these mark schemes.
Cambridge International is publishing the mark schemes for the October/November 2021 series for most
Cambridge IGCSE™, Cambridge International A and AS Level components and some Cambridge O Level
components.
These general marking principles must be applied by all examiners when marking candidate answers.
They should be applied alongside the specific content of the mark scheme or generic level descriptors
for a question. Each question paper and mark scheme will also comply with these marking principles.
• the specific content of the mark scheme or the generic level descriptors for the question
• the specific skills defined in the mark scheme or in the generic level descriptors for the question
• the standard of response required by a candidate as exemplified by the standardisation scripts.
Marks awarded are always whole marks (not half marks, or other fractions).
• marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit
is given for valid answers which go beyond the scope of the syllabus and mark scheme,
referring to your Team Leader as appropriate
• marks are awarded when candidates clearly demonstrate what they know and can do
• marks are not deducted for errors
• marks are not deducted for omissions
• answers should only be judged on the quality of spelling, punctuation and grammar when these
features are specifically assessed by the question as indicated by the mark scheme. The
meaning, however, should be unambiguous.
Rules must be applied consistently, e.g. in situations where candidates have not followed
instructions or in the application of generic level descriptors.
Marks should be awarded using the full range of marks defined in the mark scheme for the question
(however; the use of the full mark range may be limited according to the quality of the candidate
responses seen).
Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should
not be awarded with grade thresholds or grade descriptors in mind.
Touchscreen
Touchpad
Webcam
Microphone
Keyboard
Compilers
Linkers
Device drivers
Operating systems
Utilities
2 4
3D Dot Laser
matrix
4(a) Switch 1
4(b) Hub 1
4(c) Router 1
4(d) Bridge 1
5 Six from: 6
6 Health problem: 8
Award one mark for each problem identified
I can reduce Carpel Tunnel Syndrome
I can reduce Cubital Tunnel Syndrome
I can reduce neck/back pain
Strategies:
Max six strategies
Take frequent breaks
Use hand exercises
Not pressing the keyboard too hard
Use software to reduce the pressure on the keys
Use voice recognition/microphone
Use predictive text//shortcuts
Use ergonomic keyboards
Use a wrist rest
Lift the wrists up when typing
Maintain a correct posture
Benefits:
Fewer staff/fewer shops therefore reduced overheads/lower costs
The company can better target customers
Updated more often
Cheaper to publicise special offers rather than mail shots
More special offers can be offered as lower overheads
Broader customer base
Operates 24/7
The customer can see immediately if the car is available
Can be used from any location
Saves cost/time of travelling to the showroom
Drawbacks:
Expensive due to the cost of setting up the website
Expensive due to the cost of maintaining the website
Expensive due to the need to re-train staff
Internet access is needed by the customer
Purchasing mistakes can be more easily made
Mistakes are more difficult to rectify due to the speed of operation
May be difficult to use as help is not as convenient
If the system crashes during the purchase the car may not be bought
The customer may experience internet/network problems
Cannot test drive the car
The pictures of the car may not be the same as the actual car
To gain full marks there must be at least one benefit and one drawback
Open spreadsheet
Load the file
Select B3 to C13
Then hold CTRL and select F3 to F13
Click insert then click bar chart/graph
Select the format/type of chart/graph
Highlight the chart/graph
Copy the bar chart/graph
Highlight B3 to F13
Click Data then Sort
Select data has headers
Sort by Total/Column F
Select Largest to smallest/Descending/Z to A
Click OK/enter
Content layer
Content can consist of text or images
Presentation layer
This layer is defined by the CSS or styles to indicate how elements are
displayed
Behaviour layer
This layer of a web page allows interaction
10(b) Attainment: 1 or 9 2
Effort: less than 1/greater than 3/decimal number/symbol/text
11(a) Sensor 1
11(c) Actuator/motor 1
12 These are points they will need to be expanded upon to gain the mark 6
Six from:
13 Four from: 4
Four from:
Checks whether the data passing through it meets a given set of rules
Blocks data that does not satisfy the rules
Alerts user about unwanted data
Can log all incoming and outgoing data/traffic to check later
Can prevent/block access to undesirable/inappropriate websites/IP addresses
Keeps a list of undesirable IP addresses
Can prevent hackers gaining access to the system
Can send out warnings
Can block the unwanted traffic in and out of the network
Keeps a list of desirable IP addresses/websites
It can block IP addresses
2 hours
INSTRUCTIONS
● Answer all questions.
● Use a black or dark blue pen.
● Write your name, centre number and candidate number in the boxes at the top of the page.
● Write your answer to each question in the space provided.
● Do not use an erasable pen or correction fluid.
● Do not write on any bar codes.
● You may use an HB pencil for any diagrams, graphs or rough working.
INFORMATION
● The total mark for this paper is 100.
● The number of marks for each question or part question is shown in brackets [ ].
● No marks will be awarded for using brand names of software packages or hardware.
DC (CE/FC) 203095/3
© UCLES 2021 [Turn over
2
(a) Give two examples of input devices which are part of a tablet computer.
1 ................................................................................................................................................
2 ................................................................................................................................................
[2]
(b) Give two examples of output devices which are part of a tablet computer.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
[2]
Tick (3) the most appropriate recognition system which relates to the following statements.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
[2]
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
3 ................................................................................................................................................
...................................................................................................................................................
[3]
4 A library system has two tables; one for borrowers and one for books. Extracts from these tables
are shown.
Borrowers table
Books table
(a) Name the most appropriate validation check for each of these fields. Your answer must be
different for each field.
ISBN .........................................................................................................................................
Date_due_back ........................................................................................................................
[2]
(b) (i) For the books table, name the most appropriate field that could be used as a primary
key.
..................................................................................................................................... [1]
(ii) The librarian has created a relationship between the books table and the borrowers
table.
For the books table, name the most appropriate foreign key field that would be used to
create the relationship.
..................................................................................................................................... [1]
(c) The data type for Contact_telephone has been set as text.
Explain why this field has been set to text rather than integer.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
(d) At the end of each day the tables are searched to issue reminders to borrowers about books
that are overdue.
Describe the automatic processing involved in searching and issuing of reminders for overdue
books.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [6]
5 Keeping data secure is very important in any computer system. Many organisations use encryption
when sending data.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
.................................................................................................................................................... [4]
(a) Describe the computer processing involved in using contactless bank cards to pay for
purchases.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
Fewer and fewer customers now use high street banks, preferring to bank online using the internet.
(b) Discuss the advantages and disadvantages of internet banking for the customer.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [6]
Transactions with the bank’s website use a variety of technologies including SSL.
(c) Explain what is meant by SSL. Include in your answer why SSL is used.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
https://www.tawarabank.com
https:// .......................................................................................................................................
...................................................................................................................................................
tawarabank ...............................................................................................................................
...................................................................................................................................................
.com ..........................................................................................................................................
...................................................................................................................................................
[3]
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
.................................................................................................................................................... [6]
Customers can test drive the cars they are planning to purchase using virtual reality systems
within the store.
(a) Name two devices which would be used in this virtual reality system.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
[2]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
The manager of Rockit Motors has created many different types of documents including letters
and memos for the company. Each of them is produced using its corporate house style.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
10 Many young people now use social media rather than other forms of communication.
Evaluate your own use of social media and explain any eSafety strategies you could use to help
minimise the potential dangers.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
.................................................................................................................................................... [6]
11 A student has taken a photograph of him and his friend, using a digital camera. He needs to
increase the size of the image to include it on a poster.
...................................................................................................................................................
............................................................................................................................................. [1]
(b) He now wishes to edit the image to remove his friend. He edits the image by cropping it and
removing part of the image.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [5]
12 A doctor measures the blood pressure of some of his patients regularly. The patients take home a
blood pressure machine and record their results on a spreadsheet which the doctor has created.
Part of the spreadsheet is shown.
A B C D E F G H I
1 Blood pressure readings Blood pressure warnings
2 Date Sys Dia Warning Sys Dia Warning
3 10-Feb 134 74 Normal 60 40 Low
4 11-Feb 137 67 Normal 120 80 Normal
5 12-Feb 145 81 Mild 140 90 Mild
6 13-Feb 150 86 Mild 160 100 Moderate
7 14-Feb 180 74 Severe 180 110 Severe
8 15-Feb 134 75 Normal
9 16-Feb 130 57 Normal
(a) When a reading produces a Severe or Low warning then the text automatically changes to a
red font on a light red background.
Explain how the doctor could set up automatic colour change for these warnings on the
spreadsheet.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [5]
The doctor has set up a named range called Bloodpressure for the cells F3 to H7.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
The doctor has created a graph of the readings for one patient and has displayed it on the
spreadsheet. However, there are elements missing.
A B C D E F G H I J K L M
1 Blood pressure readings Blood pressure warnings
2 Date Sys Dia Warning
Chart Title
3 10-Feb 134 74 Normal
4 11-Feb 137 67 Normal 200
180
5 12-Feb 145 81 Mild
160
6 13-Feb 150 86 Mild
140
7 14-Feb 180 74 Severe 120
8 15-Feb 134 75 Normal 100
9 16-Feb 130 67 Normal 80
10 60
11 40
20
12
0
13
09-Feb 10-Feb 11-Feb 12-Feb 13-Feb 14-Feb 15-Feb 16-Feb 17-Feb
14
Sys Dia
15
16
(d) Explain how the doctor created the graph. Write in your answer one improvement that could
be made to the graph.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
(e) At the end of the month the doctor needs to produce a hard copy document showing
information about a patient: their name, date of birth and patient number, as well as data and
the graph from the spreadsheet.
Design a suitable document layout. The document must have appropriate spacing.
[5]
BLANK PAGE
BLANK PAGE
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.
Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of
Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge.
Published
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.
Cambridge International will not enter into discussions about these mark schemes.
Cambridge International is publishing the mark schemes for the October/November 2021 series for most
Cambridge IGCSE™, Cambridge International A and AS Level components and some Cambridge O Level
components.
These general marking principles must be applied by all examiners when marking candidate answers.
They should be applied alongside the specific content of the mark scheme or generic level descriptors
for a question. Each question paper and mark scheme will also comply with these marking principles.
• the specific content of the mark scheme or the generic level descriptors for the question
• the specific skills defined in the mark scheme or in the generic level descriptors for the question
• the standard of response required by a candidate as exemplified by the standardisation scripts.
Marks awarded are always whole marks (not half marks, or other fractions).
• marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit
is given for valid answers which go beyond the scope of the syllabus and mark scheme,
referring to your Team Leader as appropriate
• marks are awarded when candidates clearly demonstrate what they know and can do
• marks are not deducted for errors
• marks are not deducted for omissions
• answers should only be judged on the quality of spelling, punctuation and grammar when these
features are specifically assessed by the question as indicated by the mark scheme. The
meaning, however, should be unambiguous.
Rules must be applied consistently, e.g. in situations where candidates have not followed
instructions or in the application of generic level descriptors.
Marks should be awarded using the full range of marks defined in the mark scheme for the question
(however; the use of the full mark range may be limited according to the quality of the candidate
responses seen).
Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should
not be awarded with grade thresholds or grade descriptors in mind.
Touchscreen
Camera
Microphone
Speakers
Screen
2 4
MICR OCR OMR
Mineral prospecting
Car engine fault diagnosis
Medical diagnosis
Chess games
Knowledge base
Rules base
Inference engine
Interactive user interface
Explanation system
4(b)(i) Book_ID 1
4(b)(ii) Borrower_ID 1
Scrambling of data
Changes the data into a form that is not understandable
Requires a decryption key/encryption key to decode
Encrypted using a encryption key/code
Changes plain text into cypher text
6 Four from: 4
The reader checks the amount to pay is less than the contactless limit
The seller’s bank's computer contacts the customer’s bank's computer
The card is checked if it is valid
An authorisation code is sent to the seller
The price of the purchase is deducted from the customer’s account
Transferred to the seller’s account
Message sent asking ‘do you require a receipt’
Receipt is sent to the printer
If valid/enough money the transaction continues
If not valid/enough money the transaction is terminated
Advantages
Saves time rather than travelling to the bank/waiting in queues
Saves cost of travelling to the bank
Customers can use international banks which could have better interest rates
Better interest rates than physical banks
Safer less likely to get mugged/robbed
Operates 24/7
Can be used from any location
Disadvantages
Easier to press the wrong button and lose money
Online security issues more of a concern
Cannot deposit/withdraw cash
Internet connection is required
Mistakes are more difficult to rectify due to the speed of operation
The customer may experience internet/network problems
To gain full marks there must be at least one advantage and one
disadvantage
7(d) https:// 3
One from:
tawarabank
This shows the domain name/company name that the company have
purchased
.com
The company/domain is registered in multiple countries/USA
8 Six from: 6
A computer-generated simulation
Uses a three-dimensional environment
Can be interacted within a real or physical way
The equipment is fitted with sensors
10 Problem: 6
Strategies
Max five from:
I never arrange to meet them alone/take a chaperone
I always tell a responsible adult if I plan to meet someone
I always meet in a public place
I always chat to them in the main room
I avoid giving away personal information
I block them and report them
I report the sender of the messages
I avoid publishing inappropriate images/videos
I avoid showing images of myself in school uniform
I always use appropriate language/content
I respect other people’s confidentiality
Make your account private
I only follow friends
I do not post my location until I have left it
Highlight Column D
Select Conditional Formatting
Select Highlight Cell Rules
Select Equal to
Type in the Equal to box…Severe/Low
Click on Format
Select/Set the red font on light red background
Repeat the process for Low/Severe
Highlight A2 to C9
Click Insert
Select table…Click Chart
Select 2D line chart/select type of graph
One from:
INSTRUCTIONS
• Answer all questions.
• Use a black or dark blue pen.
• Write your name, centre number and candidate number in the boxes at the top of the page.
• Write your answer to each question in the space provided.
• Do not use an erasable pen or correction fluid.
• Do not write on any bar codes.
• You may use an HB pencil for any diagrams, graphs or rough working.
INFORMATION
• The total mark for this paper is 100.
• The number of marks for each question or part question is shown in brackets [ ].
• No marks will be awarded for using brand names of software packages or hardware.
03_0417_12_2022_1.13
© UCLES 2022 [Turn over
2
...........................................................................................................................................
........................................................................................................................................... [1]
1 ........................................................................................................................................
2 ........................................................................................................................................
[2]
1 ........................................................................................................................................
2 ........................................................................................................................................
[2]
[2]
ROM .................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
RAM ..................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[4]
(b) Modern laptop computers use Solid State Drives (SSD) rather than Hard Disk Drives (HDD).
State three advantages of using SSDs rather than HDDs in a laptop computer.
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
3 ........................................................................................................................................
...........................................................................................................................................
[3]
4 Tick (✓) whether the following statements refer to control, measurement or modelling systems.
Using what-ifs
[4]
5 The World Wide Web (WWW) is often mistaken for the internet.
(a) Explain the differences between the WWW and the internet.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [4]
https://www.cambridgeinternational.org/IGCSE
https:// ...............................................................................................................................
...........................................................................................................................................
cambridgeinternational .....................................................................................................
...........................................................................................................................................
.org ...................................................................................................................................
...........................................................................................................................................
/IGCSE .............................................................................................................................
...........................................................................................................................................
[4]
6 Global Positioning Systems (GPS) are used for many different applications.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [4]
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
3 ........................................................................................................................................
...........................................................................................................................................
[3]
7 Tawara School is presenting a concert. For previous concerts the booking of tickets was carried
out manually using pen and paper.
For this concert they are going to use an online booking system.
(a) Discuss the advantages and disadvantages of Tawara School using an online booking system
rather than the manual system.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [8]
(b) Identify the most appropriate method of implementation of the new online booking system in
this scenario.
........................................................................................................................................... [1]
(c) Explain, giving reasons, why your answer to part (b) is the most appropriate method of
implementation for this scenario.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [3]
8 Describe the advantages and disadvantages of using a smartphone rather than a laptop computer
to access the internet.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
.................................................................................................................................................. [6]
9 The introduction of computers into the work place has affected job patterns.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [2]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [2]
(c) Employees working in an office use computers for prolonged periods of time.
Describe three items that an employee should be provided with to help reduce the health
problems related to prolonged use of computers.
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
3 ........................................................................................................................................
...........................................................................................................................................
[3]
State two physical safety issues that might exist from the introduction of computers.
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
[2]
10 A touch screen is both an input device and an output device. Touch screens are used on many
devices. A tablet computer uses a touch screen.
Describe the advantages and disadvantages of using a touch screen rather than a monitor and
keyboard for the tablet computer.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
.................................................................................................................................................. [6]
11 When creating an ICT solution, the legal, moral, ethical and cultural implications have to be
considered.
Choose the most appropriate implication that matches the descriptions given below.
........................................................................................................................................... [1]
(b) Not giving information about the ICT solution to another company.
........................................................................................................................................... [1]
12 The manager of a car garage has asked a systems analyst to create a new database system for
the checking of cars making sure they are safe to drive. The checking of cars is known as a service.
Cars are serviced every 10000 km, for example 10000 km, 20000 km.
The minimum cost of the service is 1500 rupees and the maximum is 5000 rupees depending on
the model of car.
(a) Complete this table, filling in the field names and the most appropriate data types to create
the database using the information given above. For any numeric field, specify the type of
number.
Vehicle_licence_plate
Powered_by
Numeric:integer
Cost_of_service
Text
Date_of_service
[6]
Discuss the advantages and disadvantages of creating a relational database rather than a flat
file database.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [6]
(c) For each of the fields shown, name and describe one validation check that could be used on
the data. Your answers must be different in each case.
(i) Vehicle_licence_plate
Description ............................................................................................................
................................................................................................................................
[2]
(ii) Cost_of_service
Description ............................................................................................................
................................................................................................................................
[2]
(iii) Date_of_service
Description ............................................................................................................
................................................................................................................................
[2]
(a) Identify three items of computer hardware that may need to be purchased in order to set up
a computer network so the devices can use the internet.
1 ........................................................................................................................................
2 ........................................................................................................................................
3 ........................................................................................................................................
[3]
(b) Arjun is a member of the family. He uses the internet to carry out research and send work to
his office.
Describe three other ways he could make appropriate use of the internet.
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
3 ........................................................................................................................................
...........................................................................................................................................
[3]
(c) Arjun uses the internet to carry out research for his work.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [2]
(d) Arjun can log directly into his office system from his home computer. The office system only
requires users to enter their user id and a password.
................................................................................................................................
................................................................................................................................
................................................................................................................................
................................................................................................................................ [2]
(ii) Describe two other ways the office system could identify the user securely.
1 ............................................................................................................................
................................................................................................................................
................................................................................................................................
................................................................................................................................
2 ............................................................................................................................
................................................................................................................................
................................................................................................................................
................................................................................................................................
[4]
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable
effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will
be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge Assessment
International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at
www.cambridgeinternational.org after the live examination series.
Cambridge Assessment International Education is part of Cambridge Assessment. Cambridge Assessment is the brand name of the University of Cambridge Local
Examinations Syndicate (UCLES), which is a department of the University of Cambridge.
Published
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.
Cambridge International will not enter into discussions about these mark schemes.
Cambridge International is publishing the mark schemes for the February/March 2022 series for most
Cambridge IGCSE™, Cambridge International A and AS Level components and some Cambridge O Level
components.
These general marking principles must be applied by all examiners when marking candidate answers.
They should be applied alongside the specific content of the mark scheme or generic level descriptors
for a question. Each question paper and mark scheme will also comply with these marking principles.
• the specific content of the mark scheme or the generic level descriptors for the question
• the specific skills defined in the mark scheme or in the generic level descriptors for the question
• the standard of response required by a candidate as exemplified by the standardisation scripts.
Marks awarded are always whole marks (not half marks, or other fractions).
• marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit
is given for valid answers which go beyond the scope of the syllabus and mark scheme,
referring to your Team Leader as appropriate
• marks are awarded when candidates clearly demonstrate what they know and can do
• marks are not deducted for errors
• marks are not deducted for omissions
• answers should only be judged on the quality of spelling, punctuation and grammar when these
features are specifically assessed by the question as indicated by the mark scheme. The
meaning, however, should be unambiguous.
Rules must be applied consistently, e.g. in situations where candidates have not followed
instructions or in the application of generic level descriptors.
Marks should be awarded using the full range of marks defined in the mark scheme for the question
(however; the use of the full mark range may be limited according to the quality of the candidate
responses seen).
Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should
not be awarded with grade thresholds or grade descriptors in mind.
2 Bank card 2
Medical record
RAM
Random Access Memory
Volatile//Data is lost when the computer is turned off
Stores the current running program/instruction
RAM can be written to and read from
To gain full marks the description must have correct answers for both
ROM and RAM
4 4
Control Measurement Modelling
Maintaining the
growing conditions
in a glasshouse
Monitoring the
pollution in a river
Using What-ifs
To gain full marks the description must have correct answers for both
WWW and the internet
5(b) https:// 4
One from:
This is the hypertext transfer protocol secure
Set of rules/protocol to transfer web pages securely
cambridgeinternational
The domain name
.org
One from:
The top-level domain name
Registered as an organisation
/IGCSE
The folder/sub-directory in which the work is stored on Cambridge
International’s server
Disadvantages
Requires the school to purchase expensive hardware
Setting up is more expensive
Maintenance is more expensive
Internet access is needed to run the booking system therefore the cost may
be increased
More reliant on hardware
To gain full marks the discussion must have correct answers for both
advantages and disadvantages
8 Six from: 6
Advantages
Smartphone can access the internet in more places
Smartphone is more likely to retain the connection whilst on the move
They can access the internet quickly as they are more likely to have the
smartphone with them
Disadvantages
Websites displayed on the smartphone are not full versions of the website
Browsing/reading the website is more difficult due to smaller screen size
More difficult to type in/navigate the websites/emails due to smaller onscreen
keyboard
As children can access the internet from anywhere it leaves them more
vulnerable to exploitation
To gain full marks the description must have correct answers for both
advantages and disadvantages
9(a) Part-time 2
Working fewer hours a week…
…than full time staff
9(b) Compressed 2
Works the required hours in a week…
…in a fewer number of days
10 Six from: 6
Advantages
The footprint of the computer will be smaller
Fewer peripherals needed therefore saves money
Makes the computer lighter
Easier to select icons
Disadvantages
If the screen is damaged, then the device cannot be used to input data
Keyboards and monitors can be replaced more easily
Large fingers could mis-key data therefore more errors on data entry
Screens can become dirty more easily therefore affects reading of data
To gain full marks the description must have correct answers for both
advantages and disadvantages
11(a) Legal 1
11(b) Ethical 1
12(a) 6
Field name Data type
Vehicle_licence_plate Text/alphanumeric
Powered_by Boolean
Service_interval Numeric:Integer
Model Text
Date_of_service Date
Disadvantages
Relational databases can be more complex
Requires training to set up
Harder to set up
Requires a data administrator therefore increasing the costs
To gain full marks the discussion must have correct answers for both
advantages and disadvantages
Format check
To fit in with the layout
Range check
Between 1500 and 5000
Range check
To ensure it is between certain dates
Length check
Maximum of for example 11 characters (could be 8 or 6)
13(d)(ii) Way 1: 4
One-use code/token
Arjun logs in then software generates a one-use code/token
Arjun enters the code/token into the system
Way 2:
Card/dongle
The user has a dongle/card which is inserted into the computer
The dongle/card is read by the computer
Way 3:
Biometrics
Using biometric scanner to capture digital image of fingerprint/retina/iris/face
To gain full marks the answers must correctly describe two ways
INSTRUCTIONS
• Answer all questions.
• Use a black or dark blue pen.
• Write your name, centre number and candidate number in the boxes at the top of the page.
• Write your answer to each question in the space provided.
• Do not use an erasable pen or correction fluid.
• Do not write on any bar codes.
• You may use an HB pencil for any diagrams, graphs or rough working.
INFORMATION
• The total mark for this paper is 100.
• The number of marks for each question or part question is shown in brackets [ ].
• No marks will be awarded for using brand names of software packages or hardware.
06_0417_11_2022_1.16
© UCLES 2022 [Turn over
2
[2]
2 Complete each sentence using the most appropriate item from the list. Your answers must be
different in each case.
........................................................................................................................................... [1]
........................................................................................................................................... [1]
........................................................................................................................................... [1]
........................................................................................................................................... [1]
1 ...............................................................................................................................................
2 ...............................................................................................................................................
[2]
4 Many laptop computers use the cloud to store data. A technician has produced a report on his
laptop computer but has stored the report on a memory stick rather than storing it on the cloud.
Describe two advantages of using a memory stick rather than the cloud to store data.
1 ...............................................................................................................................................
..................................................................................................................................................
2 ...............................................................................................................................................
..................................................................................................................................................
[2]
Describe the advantages and disadvantages of using these cards rather than cards that use chip
and PIN.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
.................................................................................................................................................. [4]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [2]
(b) Explain the differences between attached stylesheets and inline style attributes.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [4]
(a) Compare and contrast relational databases and flat file databases. Your answer must include
similarities and differences.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [8]
(b) Give, using an example, one reason why flat file databases are used in certain applications
rather than relational databases.
Reason .............................................................................................................................
...........................................................................................................................................
Example ............................................................................................................................
...........................................................................................................................................
[2]
8 When using computers people can suffer from Repetitive Strain Injury (RSI).
(a) Describe the term RSI. Include in your answer the causes of RSI.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [3]
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
3 ........................................................................................................................................
...........................................................................................................................................
[3]
9 Martin, who is a teacher, is creating a multimedia presentation to explain a topic to his students.
1 ........................................................................................................................................
2 ........................................................................................................................................
3 ........................................................................................................................................
4 ........................................................................................................................................
[4]
(b) Martin wants to record a message for his students. His voice will be added to the presentation.
He will also need to listen to his voice to make sure the sound is of good quality.
1 ........................................................................................................................................
2 ........................................................................................................................................
[2]
(c) Martin will need to use software to create different types of content before including them in
the presentation.
Name two types of software that he might use and for each one, write down what he would
use it for.
Software 1 ........................................................................................................................
...........................................................................................................................................
Use ...................................................................................................................................
...........................................................................................................................................
Software 2 ........................................................................................................................
...........................................................................................................................................
Use ...................................................................................................................................
...........................................................................................................................................
[4]
10 A river authority is concerned about levels of pollution in a major river. The quality of the water in
the river needs to be monitored using sensors.
(a) Name three sensors that could be used to measure the pollution in the river.
1 ........................................................................................................................................
2 ........................................................................................................................................
3 ........................................................................................................................................
[3]
(b) Discuss the advantages and disadvantages of using computers to measure the pollution in
the river rather than humans measuring the pollution.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [6]
Discuss the advantages and disadvantages of analysing a system by interviewing staff rather than
using questionnaires.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
.................................................................................................................................................. [6]
12 Many company computer network systems use WiFi as a communication system to help prevent
the issue of tripping over trailing cables.
(a) For each of the following physical safety issues describe two ways of helping to prevent them.
(i) Fire
Prevention 1 ..........................................................................................................
................................................................................................................................
Prevention 2 ..........................................................................................................
................................................................................................................................
[2]
(ii) Electrocution
Prevention 1 ..........................................................................................................
................................................................................................................................
Prevention 2 ..........................................................................................................
................................................................................................................................
[2]
(b) Describe three eSafety measures which should be taken when playing games on the internet.
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
3 ........................................................................................................................................
...........................................................................................................................................
[3]
(c) In order to log onto online gaming a user ID and password is needed.
Explain what is meant by a user ID and password and why they are needed.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [4]
13 (a) Explain the need for copyright legislation when data is published on the internet.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [4]
(b) Describe methods that software producers use to prevent software copyright being broken.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [4]
(c) Emails are used by people to communicate with each other. Copyright and using acceptable
language in the email are two of the constraints that affect the use of email.
(i) Describe four other constraints that may affect the use of email.
1 ............................................................................................................................
................................................................................................................................
2 ............................................................................................................................
................................................................................................................................
3 ............................................................................................................................
................................................................................................................................
4 ............................................................................................................................
................................................................................................................................
[4]
1 ............................................................................................................................
................................................................................................................................
2 ............................................................................................................................
................................................................................................................................
[2]
14 The manager of a medical centre keeps the doctor’s stock records in a database. The stock for
any item is not allowed to fall below 15 items and the manager keeps a maximum of 100 items in
stock.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [2]
(b) Write down the field name from the table that would be the most appropriate for each of these
validation checks. Each answer must be different.
Length ...............................................................................................................................
Type ..................................................................................................................................
[3]
(c) Name the most appropriate field from the table that could be used as a primary key in the
database.
........................................................................................................................................... [1]
15 A customer is booking a seat on a theatre’s online booking system. The customer reserves seats
using the theatre’s website and a debit card. The website displays the seats that are available and
a database stores the customer details, the payment details and the seat details.
When the customer enters their debit card details for a seat, the theatre’s computer communicates
with the bank’s computer.
(a) Describe four checks that the bank’s computer will make on the customer’s bank account.
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
3 ........................................................................................................................................
...........................................................................................................................................
4 ........................................................................................................................................
...........................................................................................................................................
[4]
(b) Describe the processing carried out by the theatre’s computer when making a booking.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [4]
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable
effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will
be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge Assessment
International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at
www.cambridgeinternational.org after the live examination series.
Cambridge Assessment International Education is part of Cambridge Assessment. Cambridge Assessment is the brand name of the University of Cambridge Local
Examinations Syndicate (UCLES), which is a department of the University of Cambridge.
Published
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.
Cambridge International will not enter into discussions about these mark schemes.
Cambridge International is publishing the mark schemes for the May/June 2022 series for most
Cambridge IGCSE, Cambridge International A and AS Level and Cambridge Pre-U components, and some
Cambridge O Level components.
These general marking principles must be applied by all examiners when marking candidate answers. They should be applied alongside the
specific content of the mark scheme or generic level descriptors for a question. Each question paper and mark scheme will also comply with these
marking principles.
the specific content of the mark scheme or the generic level descriptors for the question
the specific skills defined in the mark scheme or in the generic level descriptors for the question
the standard of response required by a candidate as exemplified by the standardisation scripts.
Marks awarded are always whole marks (not half marks, or other fractions).
marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit is given for valid answers which go beyond the
scope of the syllabus and mark scheme, referring to your Team Leader as appropriate
marks are awarded when candidates clearly demonstrate what they know and can do
marks are not deducted for errors
marks are not deducted for omissions
answers should only be judged on the quality of spelling, punctuation and grammar when these features are specifically assessed by the
question as indicated by the mark scheme. The meaning, however, should be unambiguous.
Rules must be applied consistently, e.g. in situations where candidates have not followed instructions or in the application of generic level
descriptors.
Marks should be awarded using the full range of marks defined in the mark scheme for the question (however; the use of the full mark range may
be limited according to the quality of the candidate responses seen).
Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should not be awarded with grade thresholds or
grade descriptors in mind.
1 Hub 2
Bridge
2(a) hardware 1
2(b) software 1
2(c) an applet 1
2(d) a sensor 1
3 Two from: 2
Computer
Analogue to digital convertor/ADC
Digital to Analogue convertor/DAC
Actuator
4 Two from: 2
Does not need access to the internet
Fewer issues storing the data as the connection could drop during storage if the cloud is used
More control over the stored data
5 Four from: 4
Advantages
Less wear on the card as it is not used in a device
Transaction is quicker
Can be read from a pocket
No shoulder surfing
Disadvantages
Transaction can be read by hacker’s device
Does not use a PIN therefore money can be taken if lost
Limit on spending on the card
If lost the card could be used by anyone so is less secure
To gain full marks the description must have correct answers for both advantages and disadvantages
Differences
Flat file database is a plain text file
Flat file is a simple structure
Flat file uses one table
Relational database has linked tables/relationships
Relational database allows searches/reports to be created over multiple tables
Relational database allows cross referencing between tables
Relational database records are easier to add
Relational databases are more powerful
Relational database reduces duplicate data
Relational database uses foreign keys
To gain full marks there must be correct answers for both similarities and differences
One mark:
Example of a list such as name, address/CSV files
Two from:
Caused by repetitive movements
Caused by holding a mouse and clicking the buttons repetitively
Caused by constant typing on a keyboard
Caused by sitting in a poor posture for a long period of time
Disadvantages
Computer responds less to unusual circumstances
Computer equipment can be more susceptible to atmospheric conditions
Computer equipment is more likely to be damaged or stolen by vandals
To gain full marks the discussion must have correct answers for both advantages and disadvantages
11 Interviews 6
Advantages
Questions can be explained if they are misunderstood this cannot happen withquestionnaires
Questions can be asked relating to the answers given previously
More detailed answers can be given
More complex questions can be asked
Questions can be changed to suit the person being interviewed
The person being interviewed tends to answer all the questions
Can see body language
Disadvantages
They are not anonymous whereas questionnaires are
Takes far longer to complete than a questionnaire
The interviewer and interviewee must be available at the same time
More expensive as the interviewer has to be hired and interviewee needs time off
Answers may not be honest//more honest with a questionnaire as the person isanonymous
Answers may be skewed by the interviewer
Answers in a questionnaire can be analysed quicker through OMR
Questionnaires tend to be sent to more people
To gain full marks the discussion must have correct answers for both interviews and questionnaires
12(a)(i) Fire 2
Two from:
CO2 fire extinguisher
Don’t overload sockets
Have fans/cooling system
Use Residual Circuit Breaker/RCB
12(a)(ii) Electrocution 2
Don’t bring drinks close to computers
Cover/insulate live/bare wires
Holograms
Holograms are often used on the packaging of software and they indicate that the copy is genuine
Software without a hologram on the packaging is usually an illegal copy as they are too difficult and costly for pirates to
implement
Licence agreements
Licence agreements are part of the software installation process and they inform the user exactly how they are legally
allowed to use the product
Users are required to 'agree to terms of use' before they can complete the installation Any breach of this can mean
prosecution and fines
One mark for naming the method then one mark for each reason
To gain full marks candidates must have at least one description in addition to naming the methods
14(c) Serial_number 1
INSTRUCTIONS
• Answer all questions.
• Use a black or dark blue pen.
• Write your name, centre number and candidate number in the boxes at the top of the page.
• Write your answer to each question in the space provided.
• Do not use an erasable pen or correction fluid.
• Do not write on any bar codes.
• You may use an HB pencil for any diagrams, graphs or rough working.
INFORMATION
• The total mark for this paper is 100.
• The number of marks for each question or part question is shown in brackets [ ].
• No marks will be awarded for using brand names of software packages or hardware.
06_0417_12_2022_1.15
© UCLES 2022 [Turn over
2
[2]
1 ...............................................................................................................................................
2 ...............................................................................................................................................
[2]
(a) The network device that is used to transmit the data along an analogue telephone line is a
........................................................................................................................................... [1]
........................................................................................................................................... [1]
(c) The network device that allows data to be directed to a specific computer on a LAN is a
........................................................................................................................................... [1]
(d) The internal network device that allows a computer to connect to a LAN is a
........................................................................................................................................... [1]
The paragraph below shows some of the formatting features that can be used.
(a) Write down four of the formatting features that have been used in the paragraph shown.
1 ........................................................................................................................................
2 ........................................................................................................................................
3 ........................................................................................................................................
4 ........................................................................................................................................
[4]
(b) The logo for the Summer Steam Festival is shown and labelled A. The organisers of the event
are planning to create a second logo for all their correspondence. This is shown and labelled B.
Summer
Steam Festival Summer
2022 Steam Festival
2022
A B
Describe the steps that have been used to transform logo A into logo B.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [4]
5 A library is considering the way it issues books. The librarians are planning to use RFID rather than
bar codes.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
.................................................................................................................................................. [4]
6 Laptop computers use Solid State Drives (SSD) rather than Hard Disc Drives (HDD).
Describe two disadvantages of using an SSD rather than an HDD in a laptop computer.
1 ...............................................................................................................................................
..................................................................................................................................................
2 ...............................................................................................................................................
..................................................................................................................................................
[2]
7 A patient has an injury and the doctor treating him needs to find out information about the patient.
Most of the data he needs to collect is personal data.
The data collected is protected by data protection legislation. Most data protection acts include the
principle that data should be kept confidential and secure.
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
3 ........................................................................................................................................
...........................................................................................................................................
4 ........................................................................................................................................
...........................................................................................................................................
[4]
(b) Explain what is meant by personal data. Include two examples of personal data in your answer.
Explanation .......................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
Example 1 .........................................................................................................................
...........................................................................................................................................
Example 2 .........................................................................................................................
...........................................................................................................................................
[3]
(c) Explain why personal data should be kept confidential and secure.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [4]
8 Uniform Resource Locators (URL) are used to locate websites and resources. A teacher needs to
find a teaching guide from Cambridge Assessment International Education. To download the
teaching guide she types in:
(a) Write down only the part of the URL which shows the file name of the teaching guide.
........................................................................................................................................... [1]
(b) Write down only the part of the URL which is the folder where the teaching guide is stored.
........................................................................................................................................... [1]
(c) Write down only the part of the URL which is the domain name.
........................................................................................................................................... [1]
...........................................................................................................................................
........................................................................................................................................... [1]
=VLOOKUP(F2,A2:B9,2,0)
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [4]
(b) Before the spreadsheet can be used, data needs to be entered to test the spreadsheet.
There are three types of test data: normal, abnormal and extreme.
Normal ..............................................................................................................................
...........................................................................................................................................
Abnormal ..........................................................................................................................
...........................................................................................................................................
Extreme ............................................................................................................................
...........................................................................................................................................
[3]
(c) Explain, using examples, the differences between a function and a formula.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [6]
(d) The completed file could have been created using a database.
Describe two reasons why databases are used in certain applications rather than spreadsheets.
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
[2]
10 The prolonged use of computers can cause several health problems particularly when sitting down
and using monitors.
Discuss the strategies that you have developed to minimise health risks which only relate to sitting
down and using a monitor.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
.................................................................................................................................................. [8]
Discuss the advantages and disadvantages to the company of using computer-controlled robots
rather than using humans to manufacture the cars.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
.................................................................................................................................................. [6]
Discuss the benefits and drawbacks of analysing a system by observing staff rather than looking
at the current systems documentation.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
.................................................................................................................................................. [6]
13 A librarian in a college department library is entering data into a student borrowers’ file. As the data
is entered it needs to be verified.
1 ........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[4]
(b) Explain, using examples, why it is necessary to carry out validation as well as verification for
this system.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [4]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [2]
(b) Describe the ways that a user can recognise spam and methods to help prevent it.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [6]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [6]
(b) Describe two issues related to the security of data in the cloud.
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
[2]
16 A company uses corporate house style within the headers and footers in its documents.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [2]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [2]
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable
effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will
be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge Assessment
International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at
www.cambridgeinternational.org after the live examination series.
Cambridge Assessment International Education is part of Cambridge Assessment. Cambridge Assessment is the brand name of the University of Cambridge Local
Examinations Syndicate (UCLES), which is a department of the University of Cambridge.
Published
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.
Cambridge International will not enter into discussions about these mark schemes.
Cambridge International is publishing the mark schemes for the May/June 2022 series for most
Cambridge IGCSE, Cambridge International A and AS Level and Cambridge Pre-U components, and some
Cambridge O Level components.
These general marking principles must be applied by all examiners when marking candidate answers. They should be applied alongside the
specific content of the mark scheme or generic level descriptors for a question. Each question paper and mark scheme will also comply with these
marking principles.
the specific content of the mark scheme or the generic level descriptors for the question
the specific skills defined in the mark scheme or in the generic level descriptors for the question
the standard of response required by a candidate as exemplified by the standardisation scripts.
Marks awarded are always whole marks (not half marks, or other fractions).
marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit is given for valid answers which go beyond the
scope of the syllabus and mark scheme, referring to your Team Leader as appropriate
marks are awarded when candidates clearly demonstrate what they know and can do
marks are not deducted for errors
marks are not deducted for omissions
answers should only be judged on the quality of spelling, punctuation and grammar when these features are specifically assessed by the
question as indicated by the mark scheme. The meaning, however, should be unambiguous.
Rules must be applied consistently, e.g. in situations where candidates have not followed instructions or in the application of generic level
descriptors.
Marks should be awarded using the full range of marks defined in the mark scheme for the question (however; the use of the full mark range may
be limited according to the quality of the candidate responses seen).
Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should not be awarded with grade thresholds or
grade descriptors in mind.
1 Keyboard 2
Digital camera
3(a) Modem 1
3(b) Router 1
3(c) Switch 1
5 Four from: 4
RFID are faster to read than bar codes
RFID scanning is more accurate than bar codes
RFID does not need line of sight to read but bar code does
RFID will read the data if the reader is further away
RFID can scan multiple items at the same time
RFID allows greater security
RFID can store more data than a bar code
RFID tags can be rewritten, so can be reused
RFID tags are more robust as bar codes will not scan if damaged
8(a) 2193733.pdf 1
8(b) igcse-ICT-0417 1
8(c) www.cambridgeinternational.org 1
9(a) =VLOOKUP(F2,A2:B9,2,0) 4
Four from:
Looks up F2/Airport name
Looks up in the range A2:B9/Code and Name
Finds the corresponding value from the 2nd column
Displays the value in G2
Finds exact match
9(b) Normal 3
Data that is within the boundary of acceptability
Abnormal
Data that is outside the boundary/limit of acceptability/incorrect data
Extreme
Data on the edge of acceptability
One mark
Examples =A1+B1, =SUM(A2:B2)
One mark
Examples SUM/AVERAGE etc
10 Eight from: 8
Use of the monitor
Using a flat screen monitor can reduce eye strain and headaches
I turn the monitor 90 deg to the window to reduce the glare on the screen
If I turn the monitor this can cause problems with the layout of the room
I need to buy a monitor that could tilt to reduce neck ache
I close the window blinds to avoid glare on monitor/headaches
I should not use rooms with more than one window but this could be difficult
I could use a matt screen to prevent glare/headaches
I use a flat screen monitor as there is less flicker therefore reduces the chance of an epileptic seizure/eye strain/headaches
I keep the screen clear of dust to reduce static and eye strain
I could have my eyesight tested regularly
Brightness of the room should equal the brightness of the screen to prevent eye strain
Enable blue light filter/blue light glasses to prevent eye strain
I could set night light on the computer to prevent eye strain
I sit at arms length from the screen to prevent eye strain
Sitting down
I use an ergonomic chair/standing desk to reduce back and neck pains
I sit with correct posture to help reduce back and neck pain
I use a footrest to reduce DVT/improve posture
If there are wheels on the chair for easy movement I should be careful to avoid injury problems with the chair moving
backwards
Maximum of six marks if candidate only mention strategies for either sitting down or using a monitor
11 Six from: 6
Advantages
Robots can work in sterile/harmful areas which are dangerous for humans
Humans would need protective clothing which would cost the company more money
Robots can more easily be used for transferring large delicate items
Robots can work 24/7
Cheaper in the long run
Higher productivity
More accurate/precise engineering
More frequent checking of the equipment
Fewer workers are needed therefore lowering costs
Production of the cars is more consistent
Disadvantages
Expensive to buy robots
Maintenance is expensive
Requires backup systems, which are expensive
They replace skilled workers, leading to de-skilling
They need constant observation which increases the cost of maintenance crews
To gain full marks the discussion must have correct answers for both advantages and disadvantages
12 Observation 6
The analyst sees it with their own eyes
Get a complete picture of the whole system
Cheaper as it does not take the worker away from work
Description of the Hawthorne effect
The quality and accuracy of information is highly dependent on the skill of the observer
Examining documents
Can see exact details of inputs, processing and outputs
Saves time as there could be copies of previous analysis
Allows the analyst to predict the size of the new system by analysing the amount of data
Very time consuming to look through all the documents
Very expensive to pay for an analyst to look through all the documents
To gain full marks the discussion must have correct answers for both observation and examining documents
13(a) One mark for naming the verification and one mark for explanation 4
Visual verification
Person enters the data it is read through and corrected as needed using the original copy
How is it used:
User accesses the cloud storage using the internet
Cloud data can be accessed from any device
Clients send files to a data server
The server is maintained by a cloud provider
Data can be shared with other users
Cloud storage automatically backs up data
If one server fails there are others used as backup
Users pay a monthly/annual fee for storage used
To gain full marks the explanation must have correct answers for both what it is and how it is used
INSTRUCTIONS
• Answer all questions.
• Use a black or dark blue pen.
• Write your name, centre number and candidate number in the boxes at the top of the page.
• Write your answer to each question in the space provided.
• Do not use an erasable pen or correction fluid.
• Do not write on any bar codes.
• You may use an HB pencil for any diagrams, graphs or rough working.
INFORMATION
• The total mark for this paper is 100.
• The number of marks for each question or part question is shown in brackets [ ].
• No marks will be awarded for using brand names of software packages or hardware.
06_0417_13_2022_1.12
© UCLES 2022 [Turn over
2
Memory
Mouse Printer Spreadsheet
stick
[2]
2 Name an appropriate validation routine for each statement. Each answer must be different.
(a) The last digit in a code used to ensure the other digits have been entered correctly.
........................................................................................................................................... [1]
........................................................................................................................................... [1]
(c) This validation routine ensures data has been entered into a field.
........................................................................................................................................... [1]
........................................................................................................................................... [1]
3 Identify two input devices which are used in computer control systems.
1 ...............................................................................................................................................
2 ...............................................................................................................................................
[2]
4 Computers can store data in the cloud rather than using storage devices in the computer.
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
3 ........................................................................................................................................
...........................................................................................................................................
[3]
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
3 ........................................................................................................................................
...........................................................................................................................................
[3]
5 The manager of a cinema has purchased a new booking system. There are 26 rows in the cinema
with 20 seats on a row. Each seat is identified by a unique ID. The seat ID consists of the row letter
followed by the position of the seat on the row. An example of the seat on row F position 12 would
be F12.
(a) Write down one example of each of the following types of test data. The answers must be
different in each case.
Normal ..............................................................................................................................
Abnormal ..........................................................................................................................
[2]
(b) When a ticket is produced for the new system it contains a QR code.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [5]
(c) Discuss the advantages and disadvantages of using manual booking systems rather than
online booking systems.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [8]
6 Eye strain is one of the health issues associated with using computers.
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
3 ........................................................................................................................................
...........................................................................................................................................
[3]
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
3 ........................................................................................................................................
...........................................................................................................................................
4 ........................................................................................................................................
...........................................................................................................................................
[4]
7 Tawara Stores has realised that the number of people shopping for food online has increased over
the past few years.
(a) Discuss the advantages and disadvantages to the customer of shopping for food online.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [8]
(b) Tawara Stores are also aware that many current websites do not cater for older people. They
intend to create a version of their website for this audience.
Describe the features of this website to meet the needs of an older audience, giving reasons
for your choice of features.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [4]
8 Tawara Hotel uses magnetic stripe cards to allow guests access to their bedrooms. The hotel is
changing the electronic lock it uses on its bedroom doors so the lock can work with RFID cards.
Compare the use of magnetic stripe cards and RFID cards for key entry. Your answer must include
similarities and differences.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
.................................................................................................................................................. [6]
9 The Internet of Things (IoT) allows devices as well as computers to connect to the internet using
a router. Each device uses an IP address.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [3]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [3]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [4]
10 Both the internet and the intranet are used for communication.
(i) Internet
................................................................................................................................
................................................................................................................................
................................................................................................................................
................................................................................................................................ [2]
(ii) Intranet
................................................................................................................................
................................................................................................................................
................................................................................................................................
................................................................................................................................ [2]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [6]
11 An image has been taken of a bird watcher and a bird. The original image has been saved as a
jpg file type. You have been asked to remove parts of the image to just show the bird and to save
it as a png file type to become the new image.
Original image
New image
(a) Explain the steps needed to change the original image to the new image.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [4]
(b) Explain the differences between a jpg and a png file type.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [4]
12 The protection of personal data is important as many transactions are carried out online.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [4]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [4]
13 In a college library if a book is not available students can reserve the book. When the book becomes
available the librarian needs to inform the student. He does this by typing a letter and printing it.
He has a database of students and has decided that in future he will use mail merge to produce
the letters.
Give four advantages of using mail merge instead of typing out the letter each time.
1 ...............................................................................................................................................
..................................................................................................................................................
2 ...............................................................................................................................................
..................................................................................................................................................
3 ...............................................................................................................................................
..................................................................................................................................................
4 ...............................................................................................................................................
..................................................................................................................................................
[4]
14 People can manage their banking transactions using the internet. However, if the internet signal is
poor telephone banking can be used.
A person wishes to use telephone banking without speaking to an operator to transfer money from
one bank account to another.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
.................................................................................................................................................. [6]
BLANK PAGE
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable
effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will
be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge Assessment
International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at
www.cambridgeinternational.org after the live examination series.
Cambridge Assessment International Education is part of Cambridge Assessment. Cambridge Assessment is the brand name of the University of Cambridge Local
Examinations Syndicate (UCLES), which is a department of the University of Cambridge.
Published
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.
Cambridge International will not enter into discussions about these mark schemes.
Cambridge International is publishing the mark schemes for the May/June 2022 series for most
Cambridge IGCSE, Cambridge International A and AS Level and Cambridge Pre-U components, and some
Cambridge O Level components.
These general marking principles must be applied by all examiners when marking candidate answers. They should be applied alongside the
specific content of the mark scheme or generic level descriptors for a question. Each question paper and mark scheme will also comply with these
marking principles.
the specific content of the mark scheme or the generic level descriptors for the question
the specific skills defined in the mark scheme or in the generic level descriptors for the question
the standard of response required by a candidate as exemplified by the standardisation scripts.
Marks awarded are always whole marks (not half marks, or other fractions).
marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit is given for valid answers which go beyond the
scope of the syllabus and mark scheme, referring to your Team Leader as appropriate
marks are awarded when candidates clearly demonstrate what they know and can do
marks are not deducted for errors
marks are not deducted for omissions
answers should only be judged on the quality of spelling, punctuation and grammar when these features are specifically assessed by the
question as indicated by the mark scheme. The meaning, however, should be unambiguous.
Rules must be applied consistently, e.g. in situations where candidates have not followed instructions or in the application of generic level
descriptors.
Marks should be awarded using the full range of marks defined in the mark scheme for the question (however; the use of the full mark range may
be limited according to the quality of the candidate responses seen).
Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should not be awarded with grade thresholds or
grade descriptors in mind.
3 Two from: 2
Sensors
Keypad/Number pad
Touch screen
Microphone
Camera
5(a) Normal 2
Any seat from A1 to Z20//Any letter from A to Z inclusive followed by any number 1 to 20 inclusive
Abnormal
Any incorrect seat row or number/Any character other than A to Z and/or any number outside range 120 or anything that’s
incorrect
Disadvantages
Manual systems can result in double booking
Manual booking systems update the data less often than online systems
Difficult to see if a seat is taken as the seats are not updated when booked
Bookings can only be made when the booking office is open
Can only book at a booking office
People have to travel to the booking office to book, therefore wastes time
People have to travel to the booking office to book wastes cost
More difficult to change bookings
Physical tickets are issued which can be lost more easily
To gain full marks the discussion must have correct answers for both advantages and disadvantages
Disadvantages
Makes people lazy/lack of exercise
Over-reliance on computers
More security issues
Needs a reliable internet connection
Goods can take time to arrive
Goods could be damaged in transit
More chance of errors in the ordering
More difficult to amend an order after purchase
No way of checking the goods before buying
There may be delivery/packaging costs
To gain full marks the discussion must have correct answers for both advantages and disadvantages
8 Six from: 6
Similarities
Both have improved security by using encryption
Data cannot be read by eye so more secure
Data can be re-written
Direct data entry
Both allow fast access to the room
Both are read by a reader/scanner
Both can be easily damaged
Differences
RFID is contactless therefore has less wear and tear whereas magnetic is placed in reader
RFID reads the data faster
More data on RFID card
RFID cannot be left in the lock accidentally
RFID cards can be read by others from a distance using a device
Easier to clone a magnetic stripe card
Magnetic cards can only be read in one direction whereas RFID are only tapped
Magnetic stripe can be affected by magnets/mobile phones
RFID cards are more robust
To gain full marks the comparison must have correct answers for both similarities and differences
Against policed
Governments block text/viewpoints/their own bias viewpoint
Unsuitable material is easily available in other ways
Control would cost money and users would have to pay
Control would be very difficult to enforce
Could cause less people to use it
Laws are different in each country but the internet is world wide
Creates a feeling of big brother/always being watched
To gain full marks the discussion must have correct answers for both for and against policed
13 Four from: 4
Letters can be personalised for each student
The data is from the file therefore fewer errors
Saves time than typing in all the details each time
Letter can be saved and used again
Standard letter can be used each time/More consistency
Data in the database need only be checked
Easier to make changes to the letters
14 Six from: 6
User telephones the bank telephone centre
System asks for the long number on the credit/debit card/sort code and account number/customer Access/ID number
The user taps out the number on the phone keypad and presses #/speaks the number
System asks for certain characters in a password/phone banking security number
The user taps out the characters asked for/security number and presses #
System checks the number is correct
System rejects the password/security number
The user re-enters the characters/security number
After three attempts the telephone connection drops
System asks other security answers
The user taps it in/speaks the answer
System asks which service you require/options given
Users tap in the number to select transfer from one account to another
System asks number of account transfer from
User taps in account number
System connects with the bank account
System asks for number of account transfer money to
User taps in account number
System asks amount to transfer
User taps in the amount
Checks the amount in the account/maximum not exceeded
Approves request
If amount exceeded the call is terminated/transaction declined/insufficient funds
System asks when the transfer should happen
The user taps in the date
System asks you to confirm it/sends a text message/send email
Customer hangs up to end the transaction
INSTRUCTIONS
• Answer all questions.
• Use a black or dark blue pen.
• Write your name, centre number and candidate number in the boxes at the top of the page.
• Write your answer to each question in the space provided.
• Do not use an erasable pen or correction fluid.
• Do not write on any bar codes.
• You may use an HB pencil for any diagrams, graphs or rough working.
INFORMATION
• The total mark for this paper is 100.
• The number of marks for each question or part question is shown in brackets [ ].
• No marks will be awarded for using brand names of software packages or hardware.
11_0417_11_2022_1.16
© UCLES 2022 [Turn over
2
1 Complete the following sentences using the most appropriate words from the list.
(a) A margin between the main content of the page and the fold of a book is called a
........................................................................................................................................... [1]
........................................................................................................................................... [1]
(c) Feature of word processing that causes text to flow around an image is called
........................................................................................................................................... [1]
(d) When text is aligned along both the left and right margins this is called
........................................................................................................................................... [1]
2 Smartphones and smartwatches can be used in everyday life. A smartwatch is a wearable computer
in the form of a wrist-watch.
(a) Apart from accessing the internet, give three other uses of a smartphone.
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
3 ........................................................................................................................................
...........................................................................................................................................
[3]
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
[2]
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
[2]
3 According to research carried out on passwords the top three most used passwords are 12345,
qwerty and sunshine.
Describe, using other examples, the difference between a weak password and a strong password.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
.................................................................................................................................................. [4]
4 A teacher is setting up a database which she will use to record her student’s exam marks.
(a) The teacher is planning to test the mark range using different types of test data. The range of
marks that the teacher can award is 0 to 100.
(i) Write down one example of extreme test data that the teacher can use to check the
range.
................................................................................................................................ [1]
(ii) Extreme test data is one type of test data. The teacher uses two other pieces of test
data.
Write down the type of test data for each of the examples.
TEN .......................................................................................................................
55 ..........................................................................................................................
[2]
Write down the field name which is the most appropriate for the data type, based on the data
shown in the table. Your answers must be different in each case.
Boolean ............................................................................................................................
Alphanumeric ....................................................................................................................
[4]
5 A student is carrying out a scientific experiment to measure the temperature of a liquid as it cools
down. The student uses a sensor connected to a computer to read the temperature.
(a) Give three advantages of using computers and sensors rather than the student taking the
temperature readings herself.
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
3 ........................................................................................................................................
...........................................................................................................................................
[3]
(b) Describe how the readings taken by the sensor are displayed on a graph using the computer.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [6]
(c) Explain the differences between measurement systems and control systems.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [4]
6 There have been major issues regarding the accuracy of facial recognition systems for identifying
suspects by the police.
Tawara Airport has installed biometric security including facial recognition systems to help the
police recognise known criminals entering and leaving the country. Previously video was taken of
all passengers and then checked manually.
(a) Discuss the effectiveness of using facial recognition systems rather than the manual video
system to increase security in this way.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [8]
1 ........................................................................................................................................
2 ........................................................................................................................................
3 ........................................................................................................................................
[3]
Evaluate how you would use eSafety strategies in your own use of instant messaging.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
.................................................................................................................................................. [6]
8 Discuss the moral implications which need to be considered when creating an ICT solution.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
.................................................................................................................................................. [4]
9 Use of smartphones to access the internet has increased by over 200% in the past five years.
Compare the use of smartphones to access the internet with the use of desktop computers to
access the internet. Your answer must include similarities and differences.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
.................................................................................................................................................. [6]
10 A group of students in a school are planning to publicise a school concert. They can either produce
a web page which will be sent to the company that runs the school website or create a multimedia
presentation and show this to students and visitors.
(a) Give two types of content which could be used in a multimedia presentation that cannot be
used in a printed leaflet.
1 ........................................................................................................................................
2 ........................................................................................................................................
[2]
(b) Describe the advantages and disadvantages of using a multimedia presentation rather than
a web page on the school website.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [6]
The students need to test their multimedia presentation before it can be used.
(c) Name two output devices they can use and for each one, write down a reason for its use.
Reason .............................................................................................................................
...........................................................................................................................................
Reason .............................................................................................................................
...........................................................................................................................................
[4]
11 A receptionist in a medical centre is going to send out emails to patients about medical results. The
receptionist will use the data from patients’ medical and personal records and mail merge these.
One of the disadvantages of this system is that the receptionist will have access to personal data.
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
3 ........................................................................................................................................
...........................................................................................................................................
4 ........................................................................................................................................
...........................................................................................................................................
[4]
Due to data protection laws, personal data should be kept confidential and secure.
(b) Explain why personal data should be kept confidential and secure.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [6]
12 Many students prefer to store data on external storage devices like pen drives or portable hard disk
drives.
Describe four advantages of using a pen drive rather than a portable hard disk drive.
1 ...............................................................................................................................................
..................................................................................................................................................
2 ...............................................................................................................................................
..................................................................................................................................................
3 ...............................................................................................................................................
..................................................................................................................................................
4 ...............................................................................................................................................
..................................................................................................................................................
[4]
13 Hyperlinks, bookmarks and anchors are software tools used in web pages and web browsers.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [2]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [2]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [2]
14 A research student is undertaking a study of endangered animals in the Amazon rainforest. She
is using a drone to replace surveys carried out on foot. A drone is a remote-controlled flying vehicle.
Describe the benefits and drawbacks of using a drone to monitor the animals in the rainforest.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
.................................................................................................................................................. [6]
BLANK PAGE
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable
effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will
be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge Assessment
International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at
www.cambridgeinternational.org after the live examination series.
Cambridge Assessment International Education is part of Cambridge Assessment. Cambridge Assessment is the brand name of the University of Cambridge Local
Examinations Syndicate (UCLES), which is a department of the University of Cambridge.
Published
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.
Cambridge International will not enter into discussions about these mark schemes.
Cambridge International is publishing the mark schemes for the October/November 2022 series for most
Cambridge IGCSE™, Cambridge International A and AS Level components and some Cambridge O Level
components.
These general marking principles must be applied by all examiners when marking candidate answers.
They should be applied alongside the specific content of the mark scheme or generic level descriptors
for a question. Each question paper and mark scheme will also comply with these marking principles.
• the specific content of the mark scheme or the generic level descriptors for the question
• the specific skills defined in the mark scheme or in the generic level descriptors for the question
• the standard of response required by a candidate as exemplified by the standardisation scripts.
Marks awarded are always whole marks (not half marks, or other fractions).
• marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit
is given for valid answers which go beyond the scope of the syllabus and mark scheme,
referring to your Team Leader as appropriate
• marks are awarded when candidates clearly demonstrate what they know and can do
• marks are not deducted for errors
• marks are not deducted for omissions
• answers should only be judged on the quality of spelling, punctuation and grammar when these
features are specifically assessed by the question as indicated by the mark scheme. The
meaning, however, should be unambiguous.
Rules must be applied consistently, e.g. in situations where candidates have not followed
instructions or in the application of generic level descriptors.
Marks should be awarded using the full range of marks defined in the mark scheme for the question
(however; the use of the full mark range may be limited according to the quality of the candidate
responses seen).
Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should
not be awarded with grade thresholds or grade descriptors in mind.
1(a) Gutter 1
1(b) Header 1
1(c) Wrapping 1
1(d) Justified 1
4(a)(ii) Abnormal 2
Normal
Control
Changes the environment
Compares against preset value
Action taken depending on comparison to preset value
To gain full marks the description must have correct answers for both
measurement and control
Against
Dark glasses/facial hair/face coverings may cause the facial recognition
systems to not work
More difficult to change biometric data
Recognising a person can be slower as more checking is carried out
Harder to set up the facial recognition system
Takes longer to add new people to the system
Biometrics can use a lot of memory to store the data
Intrusive as personal details have to be stored
More likely to be affected by the environment
With the video system each frame needs to be checked with known images
which can lead to errors
To gain full marks the discussion must have correct answers for both
for and against
7 Six from: 6
I block unwanted messages/suspicious users…
…and report the sender
Before using the messaging system, I check how to block and report
unwanted users…
…this stops predators
I never arrange to meet strangers alone
I always tell a responsible adult if I plan to meet someone
I always meet in a public place
I avoid giving away personal information
I report abusive messages from a sender of the messages
I report cyber-bullying
When sending messages I always use appropriate language
If someone messages me with private and personal information about
themselves I respect their confidentiality/privacy
I always read carefully the messages before I send
I avoid sarcasm
I am not offensive when replying
I carefully check that I am replying to the correct person
I do not enable my location when messaging
8 Four from: 4
What may be immoral in some cultures may be acceptable in others
Just because something is immoral doesn't mean that it is illegal
The ICT solution can cause distress to others/be offensive
Becomes immoral if the person gains from their actions
9 Six from: 6
Similarities
Both can use Wi-Fi to access the internet
Both can access the internet use hotspots
Both can use Bluetooth Tethering to allow access to the internet
Differences
Desktops
More websites will work with the desktop
Larger keyboards to type in a web address
Larger screens to see the whole webpage
More stable and reliable connections
Tends to be a clearer layout to make it easier to access the internet
More accessible information
A desktop can connect to the internet via an ethernet cable
Smartphones
Access the internet from more locations
Easier to look things up on the go
Screen/keyboard built into the device therefore easier to access websites
A smartphone can use mobile data/4G/3G to access the internet
A smartphone is more portable therefore you can access the internet while
travelling
To gain full marks the comparison must have correct answers for both
similarities and differences
Disadvantages
The multimedia presentation is only available in the school during school time
whereas a web page can be used in other places
The visitor may not see the whole presentation
The multimedia presentation may not include sound due to being shown in
the school
Multimedia presentations can require expensive hardware to produce and
view
Multimedia seen by less people
Multimedia more expensive software needed to produce the presentation
More specialist training needed to produce it
To gain full marks the description must have correct answers for both
advantages and disadvantages
Speaker – 1 mark
To listen if the sound matches the images – 1 mark
Printer – 1 mark
To check that handout format works – 1 mark
12 Four from: 4
Is more robust as no moving parts
Can be more easily carried
Use less power
Have faster data access
Have faster data transfer times
14 Six from: 6
Benefits
Safer to use drones than human life being risked in forest areas
Drones can gain a better overall view of the forest than the human
Drones can be used in areas that would not be accessible to humans
Drones can cover a greater area than a human in the time available
Data from the drone can be automatically uploaded to computer system
May change animal behaviour if humans are used//Less invasive for the
animals
Drawbacks
Damp conditions/environment/weather may cause issues with the electronics
Difficult to navigate in the tree areas
Noise/sight of the drone may affect the animals
More chance of collision/bird attack
If drone crashes it could be difficult to find/retrieve
Potential danger to other animals/birds
To gain full marks the description must have correct answers for both
benefits and drawbacks
INSTRUCTIONS
• Answer all questions.
• Use a black or dark blue pen.
• Write your name, centre number and candidate number in the boxes at the top of the page.
• Write your answer to each question in the space provided.
• Do not use an erasable pen or correction fluid.
• Do not write on any bar codes.
• You may use an HB pencil for any diagrams, graphs or rough working.
INFORMATION
• The total mark for this paper is 100.
• The number of marks for each question or part question is shown in brackets [ ].
• No marks will be awarded for using brand names of software packages or hardware.
11_0417_12_2022_1.13
© UCLES 2022 [Turn over
2
1 Complete the following sentences using the most appropriate words from this list of word processing
terms.
........................................................................................................................................... [1]
........................................................................................................................................... [1]
(c) The indentation of a paragraph where all the lines except the first are indented is called
........................................................................................................................................... [1]
(d) The last line of a paragraph that appears as the first line of the next page is called a
........................................................................................................................................... [1]
2 Database, presentation, spreadsheet and word processing software are used by a medical centre.
Tick (✓) the most appropriate piece of software to carry out the tasks shown.
[4]
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
3 ........................................................................................................................................
...........................................................................................................................................
[3]
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
3 ........................................................................................................................................
...........................................................................................................................................
[3]
4 Workers in an office log onto the office computer network using a password.
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
[2]
(b) One method that hackers use to find people’s passwords is to install key-logging spyware onto
computers.
Give two methods that could be used to safely enter passwords even if key-logging spyware
has been installed on a computer.
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
[2]
5 The secretary of a sports club is setting up a database of members to replace the current manual
system. He will need to create a database structure.
(a) Describe the steps involved in setting up and testing the database structure before it can be
used in the new system.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [4]
When the new system is completed it needs to be implemented. The secretary of the sports club
can implement it using direct changeover or parallel running.
(b) Describe the term parallel running, giving one benefit and one drawback of using this method
of implementation.
...........................................................................................................................................
Benefit ..............................................................................................................................
...........................................................................................................................................
Drawback ..........................................................................................................................
...........................................................................................................................................
[3]
6 In June 2000 the London Millennium Bridge opened to the public but closed shortly afterwards for
repairs. The bridge was swaying as people walked across it. Before bridges are built, computer
models are produced and the models are tested.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
.................................................................................................................................................. [4]
7 A club has many members. The secretary of the club wants to keep details of the club members
in a database.
(a) Describe the benefits and drawbacks of storing membership details on a computer database.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [6]
(b) The secretary collects data from the members on paper-based forms.
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
3 ........................................................................................................................................
...........................................................................................................................................
4 ........................................................................................................................................
...........................................................................................................................................
5 ........................................................................................................................................
...........................................................................................................................................
[5]
8 In 2019 Cambridge recorded the highest temperature for July in the UK. The data was collected
automatically using sensors by a weather station and sent to a computer.
Discuss the advantages and disadvantages of using sensors to collect data rather than humans
collecting the data.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
.................................................................................................................................................. [8]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [3]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [6]
As our use of the cloud increases, new ways of accessing it safely need to be developed.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [8]
10 High street banks now offer customers access to internet banking when they are in the physical
bank.
Discuss the advantages and disadvantages to the bank of using internet banking in this way.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
.................................................................................................................................................. [6]
11 A village is built next to a river. During heavy rain the river floods and endangers the people living
in the village. If the river is in danger of flooding, an email is sent to all members of the village.
(a) Explain why an email group is used when contacting the villagers.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [3]
Sensors are placed in the river to check the water level. If the water level in the river rises more
than 5m above normal river levels, a flood barrier is raised to safeguard the village. The flood barrier
remains raised until the water level drops to normal levels.
(b) Explain why the data from the sensors cannot be read directly by the computer and name the
device that needs to be used so that the computer can read the data.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [3]
(c) Describe how a microprocessor uses the data from the sensors to raise and lower the flood
barrier.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [6]
Write down two features of a GUI and for each give a reason why they are needed.
Feature 1 ..................................................................................................................................
Reason 1 ..................................................................................................................................
..................................................................................................................................................
Feature 2 ..................................................................................................................................
Reason 2 ..................................................................................................................................
..................................................................................................................................................
[4]
Describe how the use of computers has affected the work of employees and their working patterns.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
.................................................................................................................................................. [6]
rtf ......................................................................................................................................
...........................................................................................................................................
pdf .....................................................................................................................................
...........................................................................................................................................
[2]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [3]
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
.................................................................................................................................................. [2]
BLANK PAGE
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable
effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will
be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge Assessment
International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at
www.cambridgeinternational.org after the live examination series.
Cambridge Assessment International Education is part of Cambridge Assessment. Cambridge Assessment is the brand name of the University of Cambridge Local
Examinations Syndicate (UCLES), which is a department of the University of Cambridge.
Published
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.
Cambridge International will not enter into discussions about these mark schemes.
Cambridge International is publishing the mark schemes for the October/November 2022 series for most
Cambridge IGCSE™, Cambridge International A and AS Level components and some Cambridge O Level
components.
These general marking principles must be applied by all examiners when marking candidate answers.
They should be applied alongside the specific content of the mark scheme or generic level descriptors
for a question. Each question paper and mark scheme will also comply with these marking principles.
• the specific content of the mark scheme or the generic level descriptors for the question
• the specific skills defined in the mark scheme or in the generic level descriptors for the question
• the standard of response required by a candidate as exemplified by the standardisation scripts.
Marks awarded are always whole marks (not half marks, or other fractions).
• marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit
is given for valid answers which go beyond the scope of the syllabus and mark scheme,
referring to your Team Leader as appropriate
• marks are awarded when candidates clearly demonstrate what they know and can do
• marks are not deducted for errors
• marks are not deducted for omissions
• answers should only be judged on the quality of spelling, punctuation and grammar when these
features are specifically assessed by the question as indicated by the mark scheme. The
meaning, however, should be unambiguous.
Rules must be applied consistently, e.g. in situations where candidates have not followed
instructions or in the application of generic level descriptors.
Marks should be awarded using the full range of marks defined in the mark scheme for the question
(however; the use of the full mark range may be limited according to the quality of the candidate
responses seen).
Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should
not be awarded with grade thresholds or grade descriptors in mind.
1(a) Landscape 1
1(b) Bullet 1
1(c) Hanging 1
1(d) Widow 1
2 4
database presentation spreadsheet word
(✓) (✓) (✓) processing
(✓)
Producing a
letter to send
✓
out to
patients
Creating
graphs to
show
numbers of
✓
people
attending the
medical
centre
Creating
queries from
✓
patient’s
details
Creating an
interactive
display of ✓
services
offered
5(b) The old and new systems/both run side by side until the new system takes 3
over
Benefit
One from:
The old system can be used as a back up
Staff can be trained gradually
Drawback
One from:
More time consuming as the data needs to be entered into two systems
More chance of error on data entry as two systems are being used
More costly as there are two sets of staff
Uses more power running two systems
6 Four from: 4
Fewer errors in final version of real item as errors would have been resolved
in model
Saves money as it saves on resources
Safer to run a computer model rather than risking human life
Different scenarios/what ifs can be carried out which may happen in real life/to
experiment
To build the bridge and test it would be impracticable due to cost/time
Drawbacks
Need IT skills to use the software/computer
Need to have to additional equipment which is expensive
Can take up a lot of storage space/memory in the computer
Expensive to buy software
Expensive to secure the system as it contains personal data
Training staff on how to use the software will be time consuming
Training could be expensive for the club
To gain full marks the description must have correct answers for both
benefits and drawbacks
8 Eight from: 8
Advantages
Readings are taken at a more consistent time interval
The sensor reads the data more accurately
Safer as humans do not need to take the measurements
Computers can analyse the data continuously
Readings taken more frequently
Multiple variables can be monitored at the same time
Disadvantages
Sensors can malfunction due to the temperature
If sensors malfunction this could lead to incorrect readings
Sensors could be stolen
To gain full marks the discussion must have correct answers for both
advantages and disadvantages
Drawbacks
Invasion of privacy
User may not know they have logged off
Biometrics may change therefore data will need to be kept up to date
Expensive method/technology to set up
Environment can affect measurements
Over usage can affect the measurements
Difficult to reset once compromised
Difficult to set up
Time consuming to set up as measurements must be taken
Facial coverings/changes can prevent system from working
To gain full marks the discussion must have correct answers for both
benefits and drawbacks
10 Six from: 6
Advantages
Branches can stay open longer and offer other services
More bank staff are available to help customers
Less chance of hacking/fraud as system used in the banks
Fewer bank tellers so more profitable for the bank
As the service is quicker/more services more likely to remain
Disadvantages
Initial cost of hardware/software is expensive
Need to retrain staff which can be expensive
System maintenance costs will be expensive as more inexperienced people
are using the system
Staff numbers may increase as staff are needed to help internet banking
customers
To gain full marks the discussion must have correct answers for both
advantages and disadvantages
12 One mark for correct feature and one mark for correct associated reason 4
Feature: Windows
Reasons: See more than one task at a time
Each task can be in a separate window
To display the task
Feature: Icons
Reasons: Tasks can be recognised
Click on an icon and it opens (a task/app)
Easy/faster to open an app by clicking on it
Feature: Menus
Reasons: To choose all the available options
Feature: Pointers
Reasons: To select tasks/icons
14(a) rtf 2
Text file with formatting/generic text files
pdf
Standard/generic image file
15 Two from: 2
Visual verification refers to the original document whereas proofreading does
not need to refer to the original document
Proofreading is checking spelling and grammar errors whereas visual
verification does not check for errors
Visual verification checks that the data has been copied correctly
INSTRUCTIONS
• Answer all questions.
• Use a black or dark blue pen.
• Write your name, centre number and candidate number in the boxes at the top of the page.
• Write your answer to each question in the space provided.
• Do not use an erasable pen or correction fluid.
• Do not write on any bar codes.
• You may use an HB pencil for any diagrams, graphs or rough working.
INFORMATION
• The total mark for this paper is 100.
• The number of marks for each question or part question is shown in brackets [ ].
• No marks will be awarded for using brand names of software packages or hardware.
11_0417_13_2022_1.11
© UCLES 2022 [Turn over
2
1 Complete the following sentences using the most appropriate words from the list.
........................................................................................................................................... [1]
........................................................................................................................................... [1]
(c) The first line of a paragraph that appears as the last line of the previous page is called
........................................................................................................................................... [1]
........................................................................................................................................... [1]
1 ...............................................................................................................................................
2 ...............................................................................................................................................
3 ...............................................................................................................................................
[3]
3 Circle two features of multimedia presentations which would not be found in a word processed
document.
[2]
4 A person contacts an online medical website that uses an expert system to allow users to
self-diagnose illnesses.
(a) Write down the component within the expert system that matches the definition given.
................................................................................................................................
................................................................................................................................ [1]
(ii) This component carries out the reasoning of the expert system.
................................................................................................................................
................................................................................................................................ [1]
(iii) This component allows the person to interact with the system.
................................................................................................................................
................................................................................................................................ [1]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [6]
5 A restaurant uses a number of different types of software. These include control, measurement,
spreadsheet and word processing software.
(a) Tick (✓) the most appropriate piece of software to carry out the tasks shown.
Word
Control Measurement Spreadsheet processing
(✓) (✓) (✓) (✓)
[4]
The restaurant owner is planning to upgrade the software used to book reservations. He has
employed a systems analyst who is analysing the current system. The systems analyst can either
send out questionnaires for staff to answer or observe staff working with the current system.
(b) Discuss the advantages and disadvantages of using questionnaires that staff answer rather
than observing staff to gather information about the current system.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [6]
6 A web page can contain images saved as png or gif file types.
png ....................................................................................................................................
...........................................................................................................................................
gif ......................................................................................................................................
...........................................................................................................................................
[2]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [3]
7 A school librarian is setting up a database of all the revision books he has in stock. The school
library sells revision books to students. The books range in value from $1 to $10 and are available
either in electronic book type (E) or physical book type (P).
(a) The librarian is planning to set up a number of different types of validation rule for the fields
to check data entry. Write down the most appropriate field name from the table that could be
used with each of the validation rules. Your answers must be different in each case.
Presence ..........................................................................................................................
Lookup ..............................................................................................................................
Range ...............................................................................................................................
Length ...............................................................................................................................
[4]
(b) Write down the most appropriate field name from the table that could be used as a primary
key field.
........................................................................................................................................... [1]
Most of the revision books are available in electronic book type as digital versions of the printed
books. These are stored as interactive PDF files.
(c) Describe the benefits and drawbacks of using the digital versions.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [6]
8 An organisation has changed the way in which members of staff can enter the building. Previously
they typed in a four-digit code on a key pad; now they use a device that reads a handprint.
(a) Discuss the effectiveness of using a handprint to enter the building rather than keying in a
code.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [8]
(b) Give two other examples of biometric methods that could be used in this scenario.
1 ........................................................................................................................................
2 ........................................................................................................................................
[2]
Describe the constraints that you need to consider when writing and sending an email.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
.................................................................................................................................................. [6]
10 (a) For each of the following types of backing storage give one example of its associated media.
Your answers must be different in each case.
Optical ..............................................................................................................................
...........................................................................................................................................
Magnetic ...........................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[3]
(b) Describe three differences between optical and magnetic backing storage.
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
3 ........................................................................................................................................
...........................................................................................................................................
[3]
(a) Explain two ways she could search for information on the World Wide Web (WWW).
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
[2]
(b) Explain the differences between the internet and the World Wide Web (WWW).
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [4]
12 The internet contains three web development layers. One layer is the content layer. This layer is
used to enter the content of a web page structure.
(a) Name and describe the other two web development layers.
Layer .................................................................................................................................
Description ........................................................................................................................
...........................................................................................................................................
Layer .................................................................................................................................
Description ........................................................................................................................
...........................................................................................................................................
[4]
(b) Explain why tables can be used to structure elements within a web page.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [3]
13 A teacher is concerned that students are playing online computer games at home without considering
eSafety. The teacher is going to create a set of rules that he feels they should be following.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
.................................................................................................................................................. [6]
14 Explain why page, section and column breaks are used in documents.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
.................................................................................................................................................. [3]
15 An employee is carrying out work for her company at home. The work she is doing is confidential.
She has been advised by her company to use encryption. She wishes to transfer some of this work
to the office.
(a) Discuss two different methods she could use to transfer this work to the office. Include in your
answer the advantages and disadvantages of each method.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [6]
(b) Describe what is meant by the term encryption and why it is used.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [3]
(c) Tick (✓) the most appropriate working pattern to match the following statements.
[3]
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable
effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will
be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge Assessment
International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at
www.cambridgeinternational.org after the live examination series.
Cambridge Assessment International Education is part of Cambridge Assessment. Cambridge Assessment is the brand name of the University of Cambridge Local
Examinations Syndicate (UCLES), which is a department of the University of Cambridge.
Published
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.
Cambridge International will not enter into discussions about these mark schemes.
Cambridge International is publishing the mark schemes for the October/November 2022 series for most
Cambridge IGCSE™, Cambridge International A and AS Level components and some Cambridge O Level
components.
These general marking principles must be applied by all examiners when marking candidate answers.
They should be applied alongside the specific content of the mark scheme or generic level descriptors
for a question. Each question paper and mark scheme will also comply with these marking principles.
• the specific content of the mark scheme or the generic level descriptors for the question
• the specific skills defined in the mark scheme or in the generic level descriptors for the question
• the standard of response required by a candidate as exemplified by the standardisation scripts.
Marks awarded are always whole marks (not half marks, or other fractions).
• marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit
is given for valid answers which go beyond the scope of the syllabus and mark scheme,
referring to your Team Leader as appropriate
• marks are awarded when candidates clearly demonstrate what they know and can do
• marks are not deducted for errors
• marks are not deducted for omissions
• answers should only be judged on the quality of spelling, punctuation and grammar when these
features are specifically assessed by the question as indicated by the mark scheme. The
meaning, however, should be unambiguous.
Rules must be applied consistently, e.g. in situations where candidates have not followed
instructions or in the application of generic level descriptors.
Marks should be awarded using the full range of marks defined in the mark scheme for the question
(however; the use of the full mark range may be limited according to the quality of the candidate
responses seen).
Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should
not be awarded with grade thresholds or grade descriptors in mind.
1(a) portrait 1
1(b) a footer 1
1(c) an orphan 1
1(d) centred 1
2 Three from: 3
Light
Temperature
Humidity/moisture
pH
CO2
3 Sound 2
Video
5(a) 4
Control Measure Spread Wordproc
(✓) ment sheet essing
(✓) (✓) (✓)
Automatically turning on
the fans when the room ✓
gets too hot
Monitoring the
temperature in the ✓
restaurant
Disadvantages
Users do not always complete the questionnaire and hand it back but
observation watches users working
Work rate can be influenced by being observed but this does not apply to
questionnaires
More chances of incorrect data if question not understood
The observer can see exactly how the system works well and not so well
whereas a questionnaire takes the users viewpoint
To gain full marks the discussion must have correct answers for both
advantages and disadvantages
6(a) png 2
One from:
Raster/full colour digital photos
Images with a transparent background
gif
Moving/animated image
7(b) ISBN 1
Drawbacks
Health issues with using a computer to read the book
Cannot be written in braille
May require extra software/reader
Never own the book as it is only data
Need to purchase a device to read them
Needs the internet to download the book
To gain full marks the description must have correct answers for both
benefits and drawbacks
Negatives
If the hand is damaged, then may not work
More difficult to change biometric data
Only works with one hand therefore difficult for right-handed people
Recognition could be slower as system is more complex
Harder to set up the biometric system
Takes longer to add new people/change biometric data to the system
Biometrics can use a lot of memory to store the data
Intrusive as personal details must be stored in biometrics
More likely to be affected by the environment
To gain full marks the discussion must have correct answers for both
positives and negatives
9 Six from: 6
Abide by the laws within the country that affect the general use of emails
Use acceptable language
Abide by copyright
Follow local guidelines set by an employer/schools
Use appropriate security
Follow netiquette
Respect other people/s/own privacy
Be aware of the need for password protection
Be aware that email accounts can be Illegally accessed
10(a) Optical 3
CD ROM/DVD ROM, CD R/DVD R, CD RW/DVD RW, DVD RAM, Blu-ray
discs/CD/DVD
Magnetic
Fixed/portable/removable hard disks/magnetic tape.
Solid state
Memory stick/flash card
To gain full marks the explanation must have correct answers for both
the internet and World Wide Web
12(a) Presentation 4
Defines the format of a web page/individual elements through styling
Behaviour
To enter scripting language to a web page/individual element
13 Six from: 6
Examples
Do not give away personal information
Do not use your real name as your username
Do not use your face image as your avatar
If you receive messages from unwanted users block and report them
Do not meet unknown users in real life//use a chaperone
Do not give financial information to other users
If you receive unwanted and abusive messages report the sender of the
messages
When sending messages always us appropriate language
Think before you reply to a message
14 Three from: 3
To adjust pagination
To avoid orphans/widows
To improve layout on the page
To allow for the change of orientation of pages in the document
To enable to start a new chapter on a new page
Email as an attachment
Do not require physical device
Require access to the email account both at home and in the office
The memory size could be an issue
Requires the use of the internet
15(c) 3
Part-
Compressed Flexible Job
time
hours hours sharing
working
(✓) (✓) (✓)
(✓)
An employee works a
full day but negotiates
✓
with the employer the
start and end times