Professional Documents
Culture Documents
Write your name, centre number and candidate number in the spaces at the top of this page and any additional
pages you use.
Write in dark blue or black pen.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.
No marks will be awarded for using brand names of software packages or hardware.
Answer all questions.
Any businesses described in this paper are entirely fictitious.
At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.
This syllabus is regulated for use in England, Wales and Northern Ireland as a Cambridge International Level 1/Level 2 Certificate.
06_0417_13_2019_1.15
© UCLES 2019 [Turn over
2
Blu-ray disc
Hard disk
Pen drive
[4]
2 Tick the most appropriate type of computer that matches each description.
[4]
3 A bank has trialled the replacement of Magnetic Ink Character Recognition (MICR) for the details
at the bottom of the cheques with bar codes.
Describe two advantages of using Magnetic Ink Character Recognition (MICR) rather than bar
codes when processing cheques.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
.................................................................................................................................................. [2]
4 Truck repair shops tend to use dot matrix printers to produce their invoices.
Identify two advantages of using a dot matrix printer rather than a laser printer in this environment.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
.................................................................................................................................................. [2]
...........................................................................................................................................
........................................................................................................................................... [1]
...........................................................................................................................................
........................................................................................................................................... [1]
[2]
6 Phishing, pharming and smishing can affect the security of your data.
For each of these security issues describe the methods which you could use to try to prevent them.
(a) Phishing
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [2]
(b) Pharming
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [2]
(c) Smishing
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [2]
7 A number of devices are used to enable computers to communicate within a network. Two of these
devices are hubs and switches.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [4]
(b) Bluetooth is an alternative method of allowing computers to communicate with other computers
and devices.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [4]
8 Tawara Health Centre is creating a new online appointment system for its patients.
The developer has created a table showing part of the file structure of the new database.
Family_name Text 10
Doctor_name Text 20
Current_medication Text 20
A, O, AB, B
Blood_type Text 3
Each can be + or –
(a) Apart from presence check, for each field, name an appropriate validation check that could be
used. Your answer should be different in each case.
Medical_ID_number
Blood_type
Date_of_birth
Contact_telephone_number
[4]
(b) Referring to the fields in the table, name the most appropriate field that could be used as a
primary key.
........................................................................................................................................... [1]
(c) Using the fields given in the database complete the design below showing a suitable online
data entry form for the receptionist to fill in.
[6]
(d) The health centre has a new logo that appears on their online data entry form. The developers
originally produced a logo and then had to change it so that it could be used appropriately on
the online data entry form. The original logo is shown before the changes and the new logo
after the changes.
Before
After
Describe the changes that have been made to the original logo to create the new logo.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [4]
(e) The doctors in the health centre use an expert system to help them diagnose illnesses.
Describe the processing that the system uses so that it can suggest possible illnesses.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [5]
9 A large city centre hotel uses a computer-controlled barrier for entry into its car park. A light sensor
is used to detect the presence of a car and prevent the barrier from dropping onto the car.
Describe how a microprocessor uses the data from the sensor to control the car park barrier.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
.................................................................................................................................................. [6]
10 Name three physical safety issues associated with the use of ICT equipment, and for each one,
suggest a possible method to help to prevent the issue. The methods should be different in each
case.
Issue 1......................................................................................................................................
..................................................................................................................................................
Method......................................................................................................................................
..................................................................................................................................................
Issue 2......................................................................................................................................
..................................................................................................................................................
Method......................................................................................................................................
..................................................................................................................................................
Issue 3......................................................................................................................................
..................................................................................................................................................
Method......................................................................................................................................
..................................................................................................................................................
[6]
11 A small library is situated in a village. When a book is borrowed from the library the borrower
presents the book and their library card to the librarian.
(a) Discuss the advantages and disadvantages of the different input devices which could be used
by the librarian to record a book being borrowed.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [6]
(b) Sometimes specialist books are needed in the library. When this happens a message has to
be sent to the main library in the town. The message can either be sent by email or by physical
fax.
Describe the advantages and disadvantages of using email compared with sending a fax.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [6]
1.........................................................................................................................................
2.........................................................................................................................................
[2]
(b) Explain using examples why it is necessary to carry out validation as well as verification for
this system.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [4]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [2]
(b) State the purpose of absolute cell referencing and give the symbol that is used to indicate
absolute cell referencing.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [2]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [2]
14 Several EFTPOS terminals have recently been installed in the ticket booking area of a train station.
Describe the inputs and outputs of such a system when purchasing a ticket.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
.................................................................................................................................................. [6]
15 Peter is researching his family tree for his history project. He has the choice of using historical
records stored in the local library or the internet to find the necessary information.
Apart from not having to travel, discuss the advantages and disadvantages to Peter of using historical
records stored in the local library rather than the internet.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
.................................................................................................................................................. [8]
BLANK PAGE
BLANK PAGE
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable
effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will
be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge Assessment
International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at
www.cambridgeinternational.org after the live examination series.
Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of
Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge.
Published
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.
Cambridge International will not enter into discussions about these mark schemes.
Cambridge International is publishing the mark schemes for the May/June 2019 series for most
Cambridge IGCSE™, Cambridge International A and AS Level and Cambridge Pre-U components, and
some Cambridge O Level components.
This syllabus is regulated for use in England, Wales and Northern Ireland as a Cambridge International Level 1/Level 2 Certificate.
These general marking principles must be applied by all examiners when marking candidate answers.
They should be applied alongside the specific content of the mark scheme or generic level descriptors
for a question. Each question paper and mark scheme will also comply with these marking principles.
• the specific content of the mark scheme or the generic level descriptors for the question
• the specific skills defined in the mark scheme or in the generic level descriptors for the question
• the standard of response required by a candidate as exemplified by the standardisation scripts.
Marks awarded are always whole marks (not half marks, or other fractions).
• marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit
is given for valid answers which go beyond the scope of the syllabus and mark scheme,
referring to your Team Leader as appropriate
• marks are awarded when candidates clearly demonstrate what they know and can do
• marks are not deducted for errors
• marks are not deducted for omissions
• answers should only be judged on the quality of spelling, punctuation and grammar when these
features are specifically assessed by the question as indicated by the mark scheme. The
meaning, however, should be unambiguous.
Rules must be applied consistently e.g. in situations where candidates have not followed
instructions or in the application of generic level descriptors.
Marks should be awarded using the full range of marks defined in the mark scheme for the question
(however; the use of the full mark range may be limited according to the quality of the candidate
responses seen).
Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should
not be awarded with grade thresholds or grade descriptors in mind.
1 4
Magnetic Optical Solid state
Blu-ray disc 9
Hard disk 9
Pen drive 9
2 4
Desktop Laptop Smartphone
A portable computer
that would most
9
easily fit into your
pocket
A computer that is
not powered by 9
batteries
A portable computer
with a keyboard and
9
with a built-in 15 inch
monitor
3 Two from: 2
The data on the MICR is human readable easier to check the data
Cannot be read by MICR if the cheque is illegally photocopied
Higher security than using bar codes
4 Two from: 2
Programs that control and manage the computer’s hardware//it runs the
applications software
Interface between the computer hardware and the user applications
5(b) Programs that allow the user to carry out specific tasks 1
5(c) Linker 2
Operating system
Never give your bank details / PIN / password/personal details over the
mobile phone / text message
Ignore text messages from numbers you do not recognise
Report any smishing attempts
Never click on links in text messages from unexpected people
Never phone the phone numbers that are given in a suspect text message
Similarities
A hub and a switch both are used to connect devices to form a LAN
Both a hub and a switch use data packets
A switch is a type of hub
Both check/read the data packets
Differences
In a hub a data packet is broadcast / sent to every computer or device on
the LAN whereas in a switch the data packet is sent to a specific computer
Security is lower in a hub as all data is broadcast
In the switch the destination address is determined/looked up before it is
sent whereas in a hub data packets are sent to all
A switch uses MAC addresses to locate the destination of the device
whereas is a hub MAC addresses are not checked
A switch uses a look up table to determine destination this is not required in
a hub
A switch is capable of more functionality / multiple VLANs but not in a hub
8(a) 4
Field Name Validation check
8(b) Medical_ID_number 1
Heading –1 mark
Fills the page and is clearly an online form - 1 mark
Home / submit button – 1 mark
Radio buttons for blood type / doctor / Drop down lists – 1 mark
Calendar for appointment time – 1 mark
Appropriate boxes to type in the details – 1 mark
Must have the correct details but appropriate headings are allowed
9 Six from: 6
Advantages
Bar code reader / QR reader / Magnetic stripe reader / RFID reader /
Touchscreen is quicker to enter data than keyboard / mouse
Bar code reader / QR reader / Magnetic stripe reader / RFID reader is more
accurate when entering data than keyboard / touchscreen
RFID reader / keyboard can input more information than magnetic stripe
reader / bar code reader / mouse / touchscreen
Disadvantages
Chip / stripe / bar code readers / touchscreen have to be bought / keyboard /
mouse comes with the computer
Continuous use of mouse/keyboard can cause RSI but other devices do not
cause this
If data is typed in using a keyboard / touchscreen then this could lead to
more input errors
More limited options when using a mouse / touchscreen
Advantages of email
Fax the document needs to be printed therefore if the receiving fax is out of
paper this cannot happen / An email does not need to be printed
The document can be more easily lost if sent by fax as it is sent to a device
in a library
The fax machine must be switched on to receive the fax / Emails are
received even if the computer is turned off
The quality of the fax may be poor depending on the print quality
The fax will print even if no ink is in the machine
To use a fax in other documents it needs to be manually entered«
«this could lead to errors
If the line is busy there could be a delay in sending the fax
Each sheet has to be transmitted separately in a fax
No need to buy a fax machine if sending an email
Disadvantages of email
Emails can be spam
The content of the email can be changed electronically whereas the fax is
permanent
Emails can contain viruses
Allow any correct example e.g. the mark registered for a student is incorrect
on the source document and was copied
Correct appropriate explanation of an example of a validation check; e.g.
number of lates for a student is 7 misread as a 1; in a range check of 1 – 10
13(b) The reference of the cell does not change when replicated 2
Uses a $ to show the absolute reference
14 Six from: 6
Level 3 [7 – 8 marks]
Candidates will address both aspects of the question and discuss/consider
different advantages/disadvantages. The issues raised will be justified.
There will be a reasoned conclusion. The information will be relevant, clear,
organised and presented in a structured and coherent format.
Level 2 [4 – 6 marks]
Candidates will address both aspects of the question and discuss/consider
different advantages / disadvantages although development of some of the
points will be limited to one side of the argument. There will be a conclusion.
For the most part the information will be relevant and presented in a
structured and coherent format.
Level 1 [1 – 3 marks]
Candidates may only address one side of the argument, and give basic
advantages/disadvantages. Answers may be simplistic with little or no
relevance.
Level 0 [0 marks]
Response with no valid content
Advantages
No danger of accessing inappropriate information
Relevant information can be found quite quickly, if the information you need
is local to the area and held in the historical records at the library
Don’t have to worry about having to have internet connectivity
Less likely to be information overload compared to the internet
Librarian can recommend what and how to search in the historical records
Index makes searching more efficient
Disadvantages
Historical records have limited amounts of information
Historical records only contain one type of information whereas the internet
contains records from other places
Can be slower to find relevant information than using a search engine
The census contains hand written data that is scanned therefore could be
difficult to read
Manual records don’t have multimedia to help explain information
Data in the historical records is not in digital form therefore cannot be copied
and pasted.
More errors in transferring the data than from the internet
Access is limited to library opening hours
Historical records cannot find information from around the world quickly
It can be slower to search for information compared to the internet
Write your name, centre number and candidate number in the spaces at the top of this page and any additional
pages you use.
Write in dark blue or black pen.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.
No marks will be awarded for using brand names of software packages or hardware.
Answer all questions.
Any businesses described in this paper are entirely fictitious.
At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.
This syllabus is regulated for use in England, Wales and Northern Ireland as a Cambridge International Level 1/Level 2 Certificate.
06_0417_12_2019_1.14
© UCLES 2019 [Turn over
2
...........................................................................................................................................
........................................................................................................................................... [1]
...........................................................................................................................................
........................................................................................................................................... [1]
...........................................................................................................................................
........................................................................................................................................... [1]
(d) Name the piece of hardware found in a tablet computer that is both an input and output device.
...........................................................................................................................................
........................................................................................................................................... [1]
[4]
3 Circle two items which are used for direct data entry.
Keyboard MICR Microphone
[2]
4 Alpine slalom skiing involves a number of skiers racing down a mountain negotiating obstacles.
The time it takes each skier to complete the course is measured. The fastest skier is awarded first
place. This involves the use of a number of different sensors to monitor variables.
Using words from the list below, complete the following statements.
........................................................................................................................................... [1]
(b) This sensor is used to stop the clock when a skier crosses the finish line.
........................................................................................................................................... [1]
(c) This sensor is used to measure the altitude (height above sea level) at the top of the course.
........................................................................................................................................... [1]
(d) Skiers take part in two separate races. The fastest thirty skiers qualify for the second race.
Thirty skiers have already completed the course. In order for the next skier to qualify he has
to beat the race time of the skier currently in 30th place.
Write a formula that can be entered in cell E36 to display Y if the skier has qualified by beating
the time of the skier currently in 30th place. If the skier has not qualified then N is displayed.
=.........................................................................................................................................
........................................................................................................................................... [3]
(e) Just before the second run column E is deleted as it is no longer required. As the skiers in the
second run complete the course their times are entered into the spreadsheet. The spreadsheet
has been changed to display the second run times, as shown.
The combined times for the first and second runs need to be added to the spreadsheet in a
new column between columns E and F.
Describe the steps you would take to add this new column with the heading Combined Time.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [3]
(f) Write a formula that can be entered in the new cell F3 that adds the time taken to complete
the first run to the time taken to complete the second run.
=.........................................................................................................................................
........................................................................................................................................... [1]
(g) When the overall race is completed the data is sorted into order based on the combined times.
The first place skier will be at the top of the list.
Describe the steps you would take to sort the data to show each skier in their correct position,
without using functions.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [4]
(h) Skiers throughout the season earn World Championship points. At the end of the race the
points are calculated for each skier. The winner of the race gains 100 points. The other skiers
have their points calculated by:
• subtracting the combined time of the winner from the combined time of the skier
• then subtracting this value from the winner’s points.
Write a formula to be placed in cell G4 to show the skier’s points for the race. The formula will
be replicated to G32.
=.........................................................................................................................................
........................................................................................................................................... [3]
5 Adinda is a marathon runner. She uses a smartwatch which is a smaller version of her smartphone.
She trains by running in areas near her home. She uses a smartwatch with an in-built GPS system
to navigate the route she is running.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [4]
1.........................................................................................................................................
2.........................................................................................................................................
[2]
(c) Adinda also carries a smartphone strapped to her arm but finds this is difficult to use when
running. A smartphone can be used for communication, either for making phone calls or text
messaging. Adinda stops part way through her run for a rest and wishes to communicate with
her friend using the smartphone.
Describe why text messaging is a better way for Adinda to communicate with her friend rather
than making a phone call.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [3]
(a) Describe four disadvantages to students of using the internet compared with an intranet.
1.........................................................................................................................................
...........................................................................................................................................
2.........................................................................................................................................
...........................................................................................................................................
3.........................................................................................................................................
...........................................................................................................................................
4.........................................................................................................................................
...........................................................................................................................................
[4]
For each of the following problems, associated with email, describe methods of protecting your
data.
(i) Spam
................................................................................................................................
................................................................................................................................
................................................................................................................................
................................................................................................................................
................................................................................................................................
................................................................................................................................
................................................................................................................................
................................................................................................................................ [4]
(ii) Viruses
................................................................................................................................
................................................................................................................................
................................................................................................................................
................................................................................................................................
................................................................................................................................
................................................................................................................................
................................................................................................................................
................................................................................................................................ [4]
7 The introduction of computers into an organisation’s payroll department has affected employees’
working patterns. Two examples of this are part-time working and job sharing.
(a)
(i) Describe what is meant by part-time working.
................................................................................................................................
................................................................................................................................ [2]
................................................................................................................................
................................................................................................................................ [2]
(b) The introduction of these computers has had positive and negative effects on the payroll
department’s workers.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [4]
Discuss the advantages and disadvantages to the customers of the introduction of internet banking.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
.................................................................................................................................................. [6]
1.........................................................................................................................................
2.........................................................................................................................................
[2]
Spreadsheet
Motor
Printer
Knowledge base
Search engine
Actuator
Rules base
[3]
10 The systems life cycle is followed when a new computer system is being created.
Tick whether the following statements are examples of the Analysis stage, the Design stage or
the Evaluation stage of the systems life cycle.
Analysis Design Evaluation
(✓) (✓) (✓)
[4]
Describe the factors which need to be considered when designing the presentation for these
students.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
.................................................................................................................................................. [6]
.xls
.doc
.rtf
.sdc
.bcc
.csv
.accdb
[3]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [2]
13 (a) Describe the following terms with reference to navigation from a web page.
(i) Hyperlink
................................................................................................................................
................................................................................................................................
................................................................................................................................
................................................................................................................................ [2]
(ii) href
................................................................................................................................
................................................................................................................................
................................................................................................................................
................................................................................................................................ [2]
(b) Explain the difference between the use of relative file paths and absolute file paths in navigation
from a web page.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [4]
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
.................................................................................................................................................. [2]
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
.................................................................................................................................................. [8]
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable
effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will
be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge Assessment
International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at
www.cambridgeinternational.org after the live examination series.
Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of
Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge.
Published
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.
Cambridge International will not enter into discussions about these mark schemes.
Cambridge International is publishing the mark schemes for the May/June 2019 series for most
Cambridge IGCSE™, Cambridge International A and AS Level and Cambridge Pre-U components, and
some Cambridge O Level components.
This syllabus is regulated for use in England, Wales and Northern Ireland as a Cambridge International Level 1/Level 2 Certificate.
These general marking principles must be applied by all examiners when marking candidate answers.
They should be applied alongside the specific content of the mark scheme or generic level descriptors
for a question. Each question paper and mark scheme will also comply with these marking principles.
• the specific content of the mark scheme or the generic level descriptors for the question
• the specific skills defined in the mark scheme or in the generic level descriptors for the question
• the standard of response required by a candidate as exemplified by the standardisation scripts.
Marks awarded are always whole marks (not half marks, or other fractions).
• marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit
is given for valid answers which go beyond the scope of the syllabus and mark scheme,
referring to your Team Leader as appropriate
• marks are awarded when candidates clearly demonstrate what they know and can do
• marks are not deducted for errors
• marks are not deducted for omissions
• answers should only be judged on the quality of spelling, punctuation and grammar when these
features are specifically assessed by the question as indicated by the mark scheme. The
meaning, however, should be unambiguous.
Rules must be applied consistently e.g. in situations where candidates have not followed
instructions or in the application of generic level descriptors.
Marks should be awarded using the full range of marks defined in the mark scheme for the question
(however; the use of the full mark range may be limited according to the quality of the candidate
responses seen).
Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should
not be awarded with grade thresholds or grade descriptors in mind.
System
Applications
1(d) Touchscreen 1
2 4
ROM RAM HDD
3 RFID 2
MICR
4(a) Temperature 1
4(b) Light 1
4(c) Pressure 1
4(d) IF(D36<D32,"Y","N") 3
4(f) D3+E3 1
Highlight B3 to F32
Click on sort
Click sort by Col F
Click on ascending order
4(h) G$3–(F4–F$3) 3
or
G$3+F$3–F4
She may be tired / breathless therefore text messaging is better than trying to
talk
A text message is sent quicker than the sending of an audio message
The text message is sent even though the receiver’s phone is turned off / out
of range / on the phone
A text message is more likely to connect as the data footprint is smaller than a
phone call
Workers that work less than full time / limited number of hours
This could be for fewer hours than a full working day/week
This could be for fewer days than a full working week
A full time job is shared between part time / two or more workers
One continues the work when the other has left
One could work in the morning and the other in the afternoon
One could work for 3 days and the other 2 other days
8 Six from: 6
Advantages
Reduces the cost of travelling to the bank
Reduces the time wasted travelling to the bank / waiting in queues
The interest rates are usually better using internet banking
Easier to shop around for the better bank accounts
Disabled people do not have to travel to the bank in order to carry out
transactions
24/7 banking
People can spend more time doing other activities rather than travelling to the
bank
Less physical robberies
Disadvantages
Less physical banks which means that people have to travel further to go to
the bank
Health risks with using the computer
Security is an issue as transactions are carried out over the internet
The user needs a reliable internet connection
More risk of pharming / phishing/fraud
Easier to make errors whilst using internet banking e.g. incorrect input
If the internet connection drops during a transaction, then there may be issues
Mineral prospecting
Diagnostic systems
Chess games
Careers
Tax
9(b) 3
Tick
Spreadsheet
Motor
Printer
Knowledge base 9
Search engine
Actuator
Rules base 9
10 4
Analysis Design Evaluation
11 Six from: 6
12(a) 3
Tick
.xls
.pdf 9
.doc
.rtf 9
.sdc
.bcc
.csv 9
.accdb
Generic file formats allow the user to save files so they can be opened in
other software
To create a standard so that other software can understand the contents
Example of a file saved on one type of device / software being used on
another type e.g. mobile phone to a PC
An attribute
Within a hyperlink / anchor
Can be used to specify the URL of the page / resource to be used
Relative file paths only show the name or file path destination of the
file//Absolute file paths gives the full web address / full path
Absolute always has the domain name//Relative does not need the domain
name
Relative finds files in the current site
If you need to find files on a different website then absolute needs to be
used//absolute starts from the root
Relative does not require a path only sub-folders
Level 3 [7 – 8 marks]
Candidates will address both aspects of the question and discuss/consider
different points. The issues raised will be justified. There will be a reasoned
conclusion. The information will be relevant, clear, organised and presented in
a structured and coherent format.
Level 2 [4 – 6 marks]
Candidates will address both aspects of the question and discuss/consider
different points although development of some of the points will be limited to
one side of the argument. There will be a conclusion. For the most part the
information will be relevant and presented in a structured and coherent format.
Level 1 [1 – 3 marks]
Candidates may only address one side of the argument, and give basic points.
Answers may be simplistic with little or no relevance.
Level 0 [0 marks]
Response with no valid content
E-safety protects personal data from people who should not have access to it
Personal data needs to be kept safe so that others cannot use it against us
Protects sensitive data
Use of it e-safety protects vulnerable people
Protects other people’s views
Example of issues of access to personal data: blackmail / spreading rumours /
identity theft / stalking
E-safety reduces the risks when using ICT using social media sites, online
gaming users believe they are safe
E-safety trains users to be responsible on the internet
Giving out personal information can help predators to find out further details
about a person, such as where they live / where they go to school / used to
track the person
People on the internet may not be what they seem
Need to be able to block people on the internet
Need to know how to report problems on the internet
If we do not use e-safety then users are being put at risk as they will not know
the dangers
Freedom of speech can be affected Introduction of the ‘nanny’ state
If we do not apply e-safety approaches we open ourselves up to attack
Use of netiquette
Covers a number of electronic devices like, computers, tablets, mobile
phones, games consoles
An example of personal data
Example of sensitive data ethnic origin / religion / political / criminal records /
sexual orientation
Write your centre number, candidate number and name in the spaces at the top of this page and any additional
pages you use.
Write in dark blue or black pen.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.
No marks will be awarded for using brand names of software packages or hardware.
Answer all questions.
At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.
This syllabus is regulated for use in England, Wales and Northern Ireland as a Cambridge International Level 1/Level 2 Certificate.
DC (JC/CT) 174201/2
© UCLES 2019 [Turn over
2
1 Complete the following sentences about input and output devices, using items from the list below.
(a) An output device that is used to produce hard copy architectural drawings is a
............................................................................................................................................. [1]
............................................................................................................................................. [1]
............................................................................................................................................. [1]
............................................................................................................................................. [1]
2 Tick whether the following are optical, magnetic or solid state storage media.
SD card
CD ROM
Memory stick
[4]
3 A smartphone has many uses, for example making and receiving telephone calls.
1 .......................................................................................................................................................
2 .......................................................................................................................................................
3 .......................................................................................................................................................
4 .......................................................................................................................................................
[4]
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
.................................................................................................................................................... [2]
For each of the statements below, identify the health problem most likely to be associated with the
use of a computer and a possible solution to the problem. Your answers must be different in each
case.
[6]
6 Many homes use microprocessor-controlled devices to improve people’s lifestyle. However, these
devices can also have a negative effect on lifestyle.
Explain the negative effects that microprocessor-controlled devices can have on lifestyle.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
.................................................................................................................................................... [6]
body {background-image:url('Camblogo.jpg');
background-color:#7g7d76
h1 {text-weight:bold;
font-size:42px
text-align:centre}
h2 {font-size:30px;
text-align:right;
text-decoration: underlined;
font-family:"Times New Roman", Times, serif}
Identify five errors which would prevent this stylesheet from working properly and, for each error,
write down a possible correction.
1 .......................................................................................................................................................
..........................................................................................................................................................
2 .......................................................................................................................................................
..........................................................................................................................................................
3 .......................................................................................................................................................
..........................................................................................................................................................
4 .......................................................................................................................................................
..........................................................................................................................................................
5 .......................................................................................................................................................
..........................................................................................................................................................
[5]
8 An examiner has created a spreadsheet to calculate his travel and hotel expenses when he
attends meetings.
A B C D E F G H I J K
1 ID Departure date Return date Destination Distance Hotel per night Total cost for hotel Travel cost
Distance Distance
2 2018/01 10/01/2019 12/01/2019 Cambridge 702 $98.20 $196.40 $175.50 threshold rate
3 2018/02 15/02/2019 18/02/2019 Coventry 400 $83.40 $250.20 $180.00 greater than 400 $0.25
4 2018/03 20/02/2019 22/02/2019 Manchester 149.8 $98.20 $196.40 $67.41 400 or less $0.45
5
If the car mileage is greater than 400 km he gets paid $0.25 per km for the whole distance otherwise
he gets paid $0.45 per km for the whole distance.
(a) Write a formula, that is easy to replicate, to be placed in cell H2 that calculates the travel cost
for the meeting. Your formula must work even when the distance rates change.
= ................................................................................................................................................
............................................................................................................................................. [7]
(b) Write a formula, that is easy to replicate, to be placed in cell G2 that calculates the total cost
for the hotel for the meeting.
= ................................................................................................................................................
............................................................................................................................................. [2]
(c) When the spreadsheet is completed the examiner will need to list the details of all the
meetings where the distance is 400 km or greater.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
Explain why computer models are used instead of creating the real thing.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
9 A restaurant keeps meals warm in an oven. The meals must be kept at a constant temperature.
A temperature sensor is used to check the temperature in the oven.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
.................................................................................................................................................... [4]
(a) Describe the inputs and processing involved in depositing a cheque using an ATM.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [6]
(b) Discuss the benefits and drawbacks, to the customer, of using ATMs to deposit cheques into
a bank account.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [6]
11 During the analysis stage for a new computer system, the systems analyst could examine existing
documents.
(a) Name two other methods the systems analyst could use to research the current system. Give
one benefit and one drawback of each.
Method 1 ...................................................................................................................................
...................................................................................................................................................
Benefit ......................................................................................................................................
...................................................................................................................................................
Drawback ..................................................................................................................................
...................................................................................................................................................
Method 2 ...................................................................................................................................
...................................................................................................................................................
Benefit ......................................................................................................................................
...................................................................................................................................................
Drawback ..................................................................................................................................
...................................................................................................................................................
[6]
(b) When the new computer system has been produced, it will need to be tested. There are three
types of test data that can be used to test a system, normal, abnormal and extreme.
Normal ......................................................................................................................................
...................................................................................................................................................
Abnormal ..................................................................................................................................
...................................................................................................................................................
Extreme ....................................................................................................................................
...................................................................................................................................................
[3]
(c) Tick three elements you would only find in technical documentation.
Tick
(3)
Program name
Glossary of terms
Algorithm
File structures
Error messages
List of variables
[3]
12 Ralph regularly uses social media websites to stay in contact with his friends.
(a) Describe four strategies that he could use to stay safe when using these websites.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
3 ................................................................................................................................................
...................................................................................................................................................
4 ................................................................................................................................................
...................................................................................................................................................
[4]
(b) Policing the internet has been discussed for many years.
Describe three reasons why the internet has not yet been policed.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [6]
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
.................................................................................................................................................... [4]
15 Biometrics are now commonly used to increase the security of computer system access.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
.................................................................................................................................................... [8]
BLANK PAGE
BLANK PAGE
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.
Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of
Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge.
Published
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.
Cambridge International will not enter into discussions about these mark schemes.
Cambridge International is publishing the mark schemes for the October/November 2019 series for most
Cambridge IGCSE™, Cambridge International A and AS Level components and some Cambridge O Level
components.
This syllabus is regulated for use in England, Wales and Northern Ireland as a Cambridge International Level 1/Level 2 Certificate.
These general marking principles must be applied by all examiners when marking candidate answers.
They should be applied alongside the specific content of the mark scheme or generic level descriptors
for a question. Each question paper and mark scheme will also comply with these marking principles.
• the specific content of the mark scheme or the generic level descriptors for the question
• the specific skills defined in the mark scheme or in the generic level descriptors for the question
• the standard of response required by a candidate as exemplified by the standardisation scripts.
Marks awarded are always whole marks (not half marks, or other fractions).
• marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit
is given for valid answers which go beyond the scope of the syllabus and mark scheme,
referring to your Team Leader as appropriate
• marks are awarded when candidates clearly demonstrate what they know and can do
• marks are not deducted for errors
• marks are not deducted for omissions
• answers should only be judged on the quality of spelling, punctuation and grammar when these
features are specifically assessed by the question as indicated by the mark scheme. The
meaning, however, should be unambiguous.
Rules must be applied consistently e.g. in situations where candidates have not followed
instructions or in the application of generic level descriptors.
Marks should be awarded using the full range of marks defined in the mark scheme for the question
(however; the use of the full mark range may be limited according to the quality of the candidate
responses seen).
Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should
not be awarded with grade thresholds or grade descriptors in mind.
1(d) Speaker 1
2 4
optical magnetic Solid state
(3) (3) (3)
Hard disk 3
SD card 3
CD ROM 3
Memory stick 3
4 Two from: 2
Connects a LAN to a WAN
Allows devices to connect to the internet
Forwards data packets
Sends/receives data packets
5 6
Health problem Possible solution
6 Six from: 6
This can lead to an unhealthy lifestyle as people rely on ready-made foods
People depend on the devices for all their chores making them lazy
Devices carry out the manual tasks leading to lack of exercise/sedentary
People lose their household skills in carrying out tasks
There is a danger that devices that use the internet can have security issues
If the internet crashes/electricity outage, then the device may not operate but the
user would not know
Smart fridges automatically re-order food as it is used but seasonal changes may
lead to wrong food being ordered
Possible health issues from the devices, e.g. microwave leakage
7 Five from: 5
Matched pairs
background-color:#7g7d76
the colour is not correct i.e. g
{text-weight:bold;
Text-weight should be font-weight
font-size:42px
; missing from the end of the command
text-decoration: underlined;
underlined should be underline;
text-align: centre}
should be text-align: center}
background-color:#7g7d76
missing bracket/add } after the 6
8(a) IF(E2>400,E2*K$3,E2*K$4) 7
8(b) (C2-B2)*F2 2
9 Four from: 4
Data from the temperature sensor is sent to the microprocessor
The microprocessor has a stored/preset value
Data from the temperature sensor is compared with the preset value
If the reading is higher than the preset value«
«microprocessor sends signal«
«to the actuator to turn the oven off
If the reading is lower than the preset value signal is sent to the oven to turn/keep
it on
Continual process
Inputs:
Insert card/input account number
Enter PIN
Select deposit
Select the language
Select cheque
Select Account
Enter cheque
Select ‘confirm’ amount
Processing:
Checks the cheque is the right way up
Scans the cheque
Uses OCR to read the font/handwriting
Attempts to read the handwriting
Reads the details on the cheque using MICR
If the cheque cannot be read then stores the cheque for later checking
If it can be read then accept cheque
Checks if information on the cheque is correct
Benefits:
Human validation is needed to check the amount/signature which improves
security
May be closer than the nearest bank branch therefore saves time than going to
the bank
Can deposit cheques 24/7
Saves money in travelling to the bank
Extra security due to using a card and PIN
Less queues in the bank
A picture receipt is given of cheques
May be more ATMs than banks
Drawbacks:
If the cheque is torn then it may not be read by the ATM
The handwriting on the cheque may be difficult to read therefore delaying the
processing
Human validation is needed to check the amount/signature this leads to delays in
processing
People may not be happy in using this method for example for security
reasons/prefer human touch
Not all ATMs use this method
May need a card/PIN to operate
Stolen cheques from the customer could be processed more easily
ATM may not be working
ATM may reject certain types of cheque
Confusion for the customer using the ATM as some ATMs may have a different
process
Cannot get human help if it goes wrong
11(a) Interview 6
Benefit one from:
The user is more open and honest with the answers
Questions can be added to/extended
Questions can be modified
Can see body language/facial expressions
Questionnaire
Benefit one from:
Faster to complete all questionnaires
Cheaper to produce questionnaires than pay/employ an interviewer
Individuals can remain anonymous therefore they are more truthful
More people can answer the questionnaire than can be interviewed
They can fill it in in their own time
Observation
Benefit one from:
Reliable data
Better overall view of the whole system/all the inputs and outputs of the system
Inexpensive method as the analyst is only watching the workers
Drawback:
Description of the Hawthorne effect
11(b) Normal 3
Data is within the range of acceptability
Abnormal
One from:
Data outside the range of acceptability
Data that is of an incorrect type
Extreme
Data that is on the boundary/limit of acceptability
11(c) 3
Tick
(9)
Program name
Glossary of terms
Algorithm 9
File structures 9
Error messages
List of variables 9
14 Four from: 4
Bluetooth sends and receives radio waves
Enable Bluetooth
Bluetooth searches for the other devices
Pairs the two devices
Devices automatically detect and connect to each other
Used for short distances
Randomly picks channels to use one of 79 channels can be used
Uses spread spectrum frequency hopping
Constantly change the channels to stop interference with other communication
systems
Used for low-bandwidth applications, e.g. streaming music
Used when the speed of transmission is not critical
Bluetooth can be used to create a secure Wireless Personal Area Network
Level 0 (0 marks)
Response with no valid content/
Write your centre number, candidate number and name in the spaces at the top of this page and any additional
pages you use.
Write in dark blue or black pen.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.
No marks will be awarded for using brand names of software packages or hardware.
Answer all questions.
At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.
This syllabus is regulated for use in England, Wales and Northern Ireland as a Cambridge International Level 1/Level 2 Certificate.
DC (JC/CT) 174146/4
© UCLES 2019 [Turn over
2
1 A student is creating a test plan for a validation routine. The input to be tested is an integer between
1 and 10. Tick whether the following are the most appropriate examples of normal data, abnormal
data or extreme data.
10
3.2
[4]
2 Tick whether the following statements relate to a command line interface (CLI) or a graphical user
interface (GUI).
CLI GUI
(✓) (✓)
This interface does not need a pointing device
3 Complete the following sentences, using the most appropriate items from the list.
1 ................................................................................................................................................
2 ................................................................................................................................................
3 ................................................................................................................................................
[3]
............................................................................................................................................. [1]
1 ................................................................................................................................................
2 ................................................................................................................................................
[2]
Give four advantages of using a laptop computer rather than a desktop computer.
1 .......................................................................................................................................................
..........................................................................................................................................................
2 .......................................................................................................................................................
..........................................................................................................................................................
3 .......................................................................................................................................................
..........................................................................................................................................................
4 .......................................................................................................................................................
..........................................................................................................................................................
[4]
© UCLES 2019 0417/12/O/N/19 [Turn over
4
6 The computer technician at Tawara School is planning to set up ten new computers to be placed
in the staffroom to form a network. The network will not be connected to the internet. Assume the
school currently has no hardware or software for this network.
(a) State the steps that the technician would need to take to set up this network.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
(b) The teachers have asked the head teacher if they can access the internet. The computer
technician will need to attach a router to the network.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
(c) The school plans to connect some teachers’ laptops to this new network using WiFi.
Describe, in detail, how data is transmitted from the laptops to the new network.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
A B C
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
(b) Complete the following sentences, using the most appropriate file format from the list below.
(iii) ............................................... is a generic file format that stores still and moving images.
[1]
(iv) ............................................... takes data in the form of tables and saves it as text. [1]
9 The director of a small airport has asked his airport manager to look into the punctuality of
departures. The manager obtained details of some of the departures on one day. He has created
a spreadsheet, which contains both the airport data and the times of departure. Part of the
spreadsheet is shown.
A B C D E F
1 Airport code Airport name
2 ALG Algiers
3 BKK Bangkok
4 BXW Bawean
5 DEL Delhi
6 DOH Doha
7 CPH Copenhagen
8 GVA Geneva
9
Scheduled Actual time of Minutes Airport Destination Late / on
departure departure late code time
10 time
11 14:00 15:13 73 CPH Copenhagen L
12 14:15 17:40 205 ALG Algiers L
13 14:45 14:58 13 DOH Doha L
14 14:45 14:48 3 DOH Doha L
15 14:50 15:05 15 BKK Bangkok L
16 14:50 14:50 0 GVA Geneva OT
17 14:50 14:59 9 BXW Bawean L
18
(a) Write a formula that would be entered in cell F11 to display the letter L if the value in C11 is
greater than 0 or the letters OT if it is not.
= ................................................................................................................................................
............................................................................................................................................. [3]
(b) Write a formula, without using named ranges, that would be entered in cell E11. The formula
must be easy to replicate. It should display the name of the airport, using the Airport code
from cell D11 and the list of Airport names.
= ................................................................................................................................................
............................................................................................................................................. [6]
(c) The airport manager is producing a report of his findings to present to the director. The data
will change from day to day.
Before he can produce the findings he needs to enter a formula in cell F19 to count the
number of late departures from the airport.
A B C D E F
Scheduled
Actual time of Minutes Airport Destination Late / on
departure
departure late code time
10 time
11 14:00 15:13 73 CPH Copenhagen L
12 14:15 17:40 205 ALG Algiers L
13 14:45 14:58 13 DOH Doha L
14 14:45 14:48 3 DOH Doha L
15 14:50 15:05 15 BKK Bangkok L
16 14:50 14:50 0 GVA Geneva OT
17 14:50 14:59 9 BXW Bawean L
18
19 Late 6
20 On Time 1
21
Write the formula, without using a named range, to be entered in cell F19.
= ................................................................................................................................................
............................................................................................................................................. [3]
(d) Name the most appropriate type of chart/graph he could produce to show the proportion of
late departures and those that leave on time.
............................................................................................................................................. [1]
10 A company is purchasing a new printer. A choice has to be made between using a laser printer or
a dot matrix printer.
Discuss the advantages and disadvantages of using dot matrix printers rather than laser printers.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
.................................................................................................................................................... [6]
11 Microprocessor-controlled devices in the home have had positive effects on people’s lifestyles.
One of the advantages of using these devices is that we can now set a cooker to switch on whilst
we are out so that we arrive home to a cooked meal.
(a) Apart from the use of cookers, describe the advantages of using microprocessor-controlled
devices in the home.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [6]
(b) Some home devices can be controlled remotely when away from home. These home devices
need to be connected to the internet.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [6]
12 A sports club is planning a new computerised record keeping system to replace their manual
system.
(a) A systems analyst recommends that new software is required. The analyst could either write
the software or purchase it off the shelf.
Give two advantages to the sports club of the analyst writing the software.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
[2]
(b) Explain why it is better to use a computer to store the records rather than the manual system.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [6]
(c) The systems analyst recommends that the system is implemented using direct changeover,
but the sports club feel that parallel running should be used.
Describe direct changeover and parallel running, giving a different benefit and drawback of
using each method of implementation.
...................................................................................................................................................
Benefit ......................................................................................................................................
...................................................................................................................................................
Drawback ..................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Benefit ......................................................................................................................................
...................................................................................................................................................
Drawback ..................................................................................................................................
...................................................................................................................................................
[6]
13 Many companies that make microprocessors use robots to carry out the task rather than using
humans.
(a) Give three advantages of using robots to carry out the task.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
3 ................................................................................................................................................
...................................................................................................................................................
[3]
(b) Give three disadvantages of using robots to carry out the task.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
3 ................................................................................................................................................
...................................................................................................................................................
[3]
14 The internet is not controlled by any one single country. The internet is a very good communication
system, but it can also be seen as a security problem.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
.................................................................................................................................................... [8]
BLANK PAGE
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.
Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of
Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge.
Published
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.
Cambridge International will not enter into discussions about these mark schemes.
Cambridge International is publishing the mark schemes for the October/November 2019 series for most
Cambridge IGCSE™, Cambridge International A and AS Level components and some Cambridge O Level
components.
This syllabus is regulated for use in England, Wales and Northern Ireland as a Cambridge International Level 1/Level 2 Certificate.
These general marking principles must be applied by all examiners when marking candidate answers.
They should be applied alongside the specific content of the mark scheme or generic level descriptors
for a question. Each question paper and mark scheme will also comply with these marking principles.
• the specific content of the mark scheme or the generic level descriptors for the question
• the specific skills defined in the mark scheme or in the generic level descriptors for the question
• the standard of response required by a candidate as exemplified by the standardisation scripts.
Marks awarded are always whole marks (not half marks, or other fractions).
• marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit is
given for valid answers which go beyond the scope of the syllabus and mark scheme, referring to
your Team Leader as appropriate
• marks are awarded when candidates clearly demonstrate what they know and can do
• marks are not deducted for errors
• marks are not deducted for omissions
• answers should only be judged on the quality of spelling, punctuation and grammar when these
features are specifically assessed by the question as indicated by the mark scheme. The
meaning, however, should be unambiguous.
Rules must be applied consistently e.g. in situations where candidates have not followed instructions
or in the application of generic level descriptors.
Marks should be awarded using the full range of marks defined in the mark scheme for the question
(however; the use of the full mark range may be limited according to the quality of the candidate
responses seen).
Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should
not be awarded with grade thresholds or grade descriptors in mind.
1 4
normal abnormal extreme
(3) (3) (3)
one 3
4 3
10 3
3.2 3
2 2
CLI GUI
(3) (3)
3(a) A linker 1
5 Four from: 4
A laptop is more portable
A laptop is made in one unit whereas a desktop has several items of hardware
therefore fewer items to lose
The footprint of the laptop tends to be smaller
Lower power consumption
Uses battery power so can be used in more places
8(b)(i) .css 1
8(b)(ii) .rar 1
8(b)(iii) .gif 1
8(b)(iv) .csv 1
9(a) IF(C11>0,"L","OT") 3
9(b) VLOOKUP(D11,A$2:B$8,2,FALSE) 6
9(c) COUNTIF(F11:F17,"L") 3
10 Disadvantages: 6
Maximum five from:
A dot matrix printer is noisier when it prints therefore would not be used in an
office
Printing is slower using a dot matrix
Dot matrix prints line by line, whereas a laser is a page printer
Dot matrix printers cannot easily handle large print jobs, whereas laser printers
can
Printer ribbon is more expensive that toner
A dot matrix has more limited colour facilities as it uses a ribbon
Print quality is lower than a laser printer
Advantages:
A dot matrix printer can be used is harsh conditions
A dot matrix uses a ribbon and ink which is far safer than toner which gives off
ozone
A dot matrix uses multipart stationery therefore carbon copies can be made as
it prints
Can use continuous stationery therefore less chance of the paper running out
during a print job
Drawback:
If the new system fails there is no system to fall back onto/no backup
Parallel running:
The old and new systems run side by side until the new system takes over
Level 0 (0 marks):
Response with no valid content
Benefits:
Prevents illegal material being posted/shown
Examples racist/prejudice, pornographic
Dark net would be banned
Information that states how to make bombs. how to hack would be banned
Help to prevent children from gaining access to undesirable/pornography
websites
Help to stop incorrect information being found on the net/fake news
Help to stop people that send messages in riots
Helps to prevent discussion groups that incite hatred, racism, etc.
Ensure copyright laws are enforced
Safeguards the vulnerable
14 Drawbacks:
Information on illegal material/how to make bombs, etc. can be found in other
resources
It would be very expensive to police/set up a police group
It would be very difficult to police data being sent from one country to another
It would be very difficult to set standard rules as many countries/states have
different rules
Laws already exist in different parts of the world to police internet data in that
country, would these laws need to still exist.
Freedom of speech/human rights is restricted
Material found on the internet can be found elsewhere
The internet is international therefore there could be problems liaising with
other police forces
A new police force would need to be set up costing a lot of money
Individual police forces/multi-country police internet locally
What is classed as illegal; may be different in other countries therefore difficult
to police
Some medical websites could be classed as illegal but could be legal
elsewhere/could be classed as pornography
The mass of information increases daily therefore difficult to check
People tend to be anonymous therefore difficult to find the culprits
INSTRUCTIONS
• Answer all questions.
• Use a black or dark blue pen.
• Write your name, centre number and candidate number in the boxes at the top of the page.
• Write your answer to each question in the space provided.
• Do not use an erasable pen or correction fluid.
• Do not write on any bar codes.
• You may use an HB pencil for any diagrams, graphs or rough working.
INFORMATION
• The total mark for this paper is 100.
• The number of marks for each question or part question is shown in brackets [ ].
• No marks will be awarded for using brand names of software packages or hardware.
06_0417_12_2021_1.2
© UCLES 2021 [Turn over
2
1 Tick (✓) whether the following are examples of control, measurement or modelling applications.
Personal finance
Weather forecasting
Burglar alarms
Weather stations
[4]
2 (a) Circle two items that could be used to output data directly from a smartphone.
[2]
(b) One of the uses of a smartphone is the sending and receiving of emails.
1.........................................................................................................................................
...........................................................................................................................................
2.........................................................................................................................................
...........................................................................................................................................
3.........................................................................................................................................
...........................................................................................................................................
4.........................................................................................................................................
...........................................................................................................................................
[4]
3 Tick (✓) the most appropriate storage medium that should be used in each scenario.
[4]
4 Complete the sentences below using the most appropriate word from the list.
........................................................................................................................................... [1]
(b) The software that gathers data by monitoring key presses on a user’s keyboard is called
........................................................................................................................................... [1]
(c) A fake text message, that could contain a link, sent to a mobile phone is called
........................................................................................................................................... [1]
5 Petr has set up a database for a science project on planets in the solar system. Part of the database
is shown.
(a) When Petr was designing his database, he had to set the data types for each field.
Complete the design table below by filling in the data types for each named field. Use the most
appropriate data type. Each data type must be different. For any numeric field, specify the type
of number.
Number_of_moons
Orbital_period
Rings
Name_of_planet
[4]
(b) Operators such as AND, OR, NOT, LIKE, >, >=, <, <=, =, <> can be used to search Petr’s
planet database. The search criteria for all the gas giant planets with more than 20 moons
would look like this:
Write down the search criteria that will produce a list of planets that are not gas giants but
have at least one moon and were first observed after 1800.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [7]
(c) Write down the names of the planets that are not gas giants but have at least one moon and
were first observed after 1800.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [2]
(d) Petr has copied the data from the Orbital_period field into a spreadsheet. The data for the
orbital period for Mars, 1.88, is stored in cell A2. In cell B2 he has entered a function of:
ROUND(A2,0)
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [2]
6 Humans can send unmanned aircraft into storms to collect wind speeds and temperature data. The
unmanned aircraft have sensors attached to them which send the data back to computers at the
weather station. The computers analyse the data.
Previously the aircraft was manned and all the data was collected and flown back to the weather
station.
Discuss the advantages and disadvantages of using the unmanned aircraft rather than using the
manned aircraft.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
.................................................................................................................................................. [8]
7 The owner of Tawara Hotels is planning a new computerised booking system. There are ten Tawara
Hotels throughout the world. The current booking system allows people to book rooms in any of
the Tawara Hotels. He has employed a systems analyst to research the current system and then
install the new system.
(a) When analysing the current booking system, the systems analyst must identify the user
requirements.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [3]
(b) Tick (✓) the relevant stage of the systems life cycle for each of the following activities.
Development
Activity Analysis and testing Evaluation
(✓) (✓) (✓)
[4]
(c) Before the new booking system is installed, the systems analyst has to decide on a method
of implementation. One method of implementation is pilot running.
Name two other methods of implementation and describe two benefits of each.
Name.................................................................................................................................
Benefit 1............................................................................................................................
...........................................................................................................................................
Benefit 2............................................................................................................................
...........................................................................................................................................
Name.................................................................................................................................
Benefit 1............................................................................................................................
...........................................................................................................................................
Benefit 2............................................................................................................................
...........................................................................................................................................
[6]
8 Students often use IT equipment; therefore it is important to have a good physical safety strategy.
Evaluate your own use of IT equipment, in terms of physical safety, and describe the strategies
you will need to minimise the potential physical safety risks.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
.................................................................................................................................................. [6]
1.........................................................................................................................................
...........................................................................................................................................
2.........................................................................................................................................
...........................................................................................................................................
[2]
(b) Social networking is used to communicate with friends; this is one use of the internet.
1.........................................................................................................................................
...........................................................................................................................................
2.........................................................................................................................................
...........................................................................................................................................
3.........................................................................................................................................
...........................................................................................................................................
4.........................................................................................................................................
...........................................................................................................................................
[4]
(c) A major part of the everyday use of the internet is social networking. Currently some social
networks are not policed. The owners of a website have full discretion on what material is
removed and what is allowed to be kept.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [8]
10 Describe the advantages, to both the company and employees, of changing work patterns due to
the introduction of computers.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
.................................................................................................................................................. [6]
Explain why a digital certificate is required. Include in your answer items that could be found in a
digital certificate.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
.................................................................................................................................................. [5]
(a) Describe the disadvantages of using a search engine to find information rather than typing in
a web address.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [4]
(b) A student is writing a project on rare animals. He uses a search engine to find information
about the animals from the internet. He is concerned about the reliability of some of the
information he has found.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [6]
The student plans to create a table, using word processing software, to display the information he
has found out about the animal.
Pouched No
Habitat Australia
(c) Explain how the student can create a table to enter this data.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [2]
(d) The student has saved a picture from the internet of a tiger quoll.
Explain how he could create a new row above the Pouched row and place the picture into the
right-hand cell of this new row.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [4]
BLANK PAGE
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable
effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will
be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge Assessment
International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at
www.cambridgeinternational.org after the live examination series.
Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of
Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge.
Published
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.
Cambridge International will not enter into discussions about these mark schemes.
Cambridge International is publishing the mark schemes for the May/June 2021 series for most Cambridge
IGCSE™, Cambridge International A and AS Level components and some Cambridge O Level components.
These general marking principles must be applied by all examiners when marking candidate answers.
They should be applied alongside the specific content of the mark scheme or generic level descriptors
for a question. Each question paper and mark scheme will also comply with these marking principles.
• the specific content of the mark scheme or the generic level descriptors for the question
• the specific skills defined in the mark scheme or in the generic level descriptors for the question
• the standard of response required by a candidate as exemplified by the standardisation scripts.
Marks awarded are always whole marks (not half marks, or other fractions).
• marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit
is given for valid answers which go beyond the scope of the syllabus and mark scheme,
referring to your Team Leader as appropriate
• marks are awarded when candidates clearly demonstrate what they know and can do
• marks are not deducted for errors
• marks are not deducted for omissions
• answers should only be judged on the quality of spelling, punctuation and grammar when these
features are specifically assessed by the question as indicated by the mark scheme. The
meaning, however, should be unambiguous.
Rules must be applied consistently, e.g. in situations where candidates have not followed
instructions or in the application of generic level descriptors.
Marks should be awarded using the full range of marks defined in the mark scheme for the question
(however; the use of the full mark range may be limited according to the quality of the candidate
responses seen).
Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should
not be awarded with grade thresholds or grade descriptors in mind.
1 4
control measurement modelling
Personal
finance
Weather
forecasting
Burglar alarms
Weather
stations
2(a) Speaker 2
Screen
3 4
Scenario Magnetic RAM ROM
tape
4(a) Hacking 1
4(b) Spyware 1
4(c) Smishing 1
5(a) 4
Field name Data type
Rings Boolean
Name_of_planet Text
Type_of_planet – 1 mark
<> "Gas Giant" – 1 mark
First_observed – 1 mark
>1800 – 1 mark
5(c) Pluto 2
Haumea
6 Eight from: 8
Advantages
Less expensive to fly the aircraft into the storm
Less risk to life as there is no flight crew
It can be flown closer to the storm
Time taken to receive the data is shorter as don’t have to land the aircraft
before sending data
Results are processed immediately
On board computers can analyse the data continuously
Readings can be taken more frequently
Disadvantages
The sensors could malfunction and there is no way of repairing them easily
You can lose the signal due to the electrical charges in the storm
Less responsive
Slower to react
May go out of range
7(b) 4
Activity Analysis Development Evaluation
and testing
I make sure all wires are fastened to the wall/placed under carpets/in
ducts//Use wireless...
...This reduces tripping hazards
I make sure all IT equipment is safely in the middle of desks//I make sure
strong tables are used to store IT equipment/I don’t store IT equipment on
high shelves...
...To stop them falling on me and causing an injury
9(c) Benefits 8
Max four:
Can reduce cyber bullying/hate speech/sexual harassment
Can reduce social media from being used for illegal activities
Can reduce the ability to incite violence/trolling
Could prevent people from being subjected to inappropriate messages
Can reduce illegal/inappropriate images
Drawbacks
Freedom of speech is reduced
Would be very difficult to police as there is a massive amount of information
Different rules in different countries and social media crosses borders
Very costly to create an effective deterrent
Could force individuals to use other un-policed methods of communication
Who decides what is acceptable and what is not acceptable
Privacy issues as people checking could read messages
Difficult to police as users can be anonymous
10 Six from: 6
Advantages to employees
Staff are more flexible when they work so they can carry out other activities
Staff are more contented as they can work hours which suit their home life
They can start later/earlier so they avoid rush hour in the morning, so they do
not arrive stressed
They can start earlier/work later to avoid rush hour in evening so cuts travel
time
Compressed hours can lead to longer holidays/weekends therefore staff
more refreshed
Part time working allows people with other commitments to work
Job sharing allows a piece of work to be completed using the skills set of
more than one worker therefore cutting stress
Working from home allows employees to balance their home life
Or
INSTRUCTIONS
• Answer all questions.
• Use a black or dark blue pen.
• Write your name, centre number and candidate number in the boxes at the top of the page.
• Write your answer to each question in the space provided.
• Do not use an erasable pen or correction fluid.
• Do not write on any bar codes.
• You may use an HB pencil for any diagrams, graphs or rough working.
INFORMATION
• The total mark for this paper is 100.
• The number of marks for each question or part question is shown in brackets [ ].
• No marks will be awarded for using brand names of software packages or hardware.
06_0417_13_2021_1.7
© UCLES 2021 [Turn over
2
1 Tick (✓) whether the following statements refer to Backing storage, RAM or ROM.
Backing
storage RAM ROM
(✓) (✓) (✓)
[4]
2 Circle two jobs where there has been an increase in employment as a direct result of the introduction
of computers.
Delivery drivers for
Car production workers Cleaning staff Medical staff
retail stores
Payroll workers Secretaries Teachers Website designers
[2]
3 A mobile phone is used for communications, either for making phone calls or text messaging.
Chang is planning an expedition to the Southern Alps in New Zealand. There is often a limited
mobile phone signal in these areas. He has set his phone up so that if there is an emergency he
can communicate with the rescue teams using text messaging rather than making a phone call.
1 ................................................................................................................................................
..................................................................................................................................................
2 ................................................................................................................................................
..................................................................................................................................................
[2]
4 Tick (✓) whether the following descriptions of analysing a system refer to Interviews, Observation
or Questionnaires.
[4]
5 Complete the sentences using the most appropriate item from the list.
(a) A piece of software that allows a user to display a web page is called a
........................................................................................................................................... [1]
........................................................................................................................................... [1]
(c) A web application that allows a group of people to edit the content is called a
........................................................................................................................................... [1]
6 Susan is creating a database about cars and needs to save it in the shared area (S:) on the school
network. It will be stored in the folder ICT which is contained in the IGCSE folder. She needs to
save the file with a file name that is different from file names used by other students in the group.
(a) Write down a suitable file name for the file so that the teacher can easily find Susan’s work
and identify its contents. The file name should not contain spaces.
...........................................................................................................................................
........................................................................................................................................... [1]
(b) Write down the file path which Susan would use to store the file in the correct folder.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [2]
(c) Susan plans to work on her database at home. However, the database is very large so her
teacher has told her that it needs to be reduced in size. She will then be able to attach it to an
email so she can send it home.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [2]
7 A family has purchased a wireless router for use in their home to allow their devices to be connected
via WiFi to form a wireless local area network (WLAN).
(a) When the family purchased the wireless router they were advised to change the default
password.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [2]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [4]
(c) Their son produces large complex diagrams on his desktop computer at home. He needs to
be able to access the diagrams when he is at university. Even if reduced in file size, the
diagrams would be too large to send using email.
Describe in detail how he could transfer the diagrams from his home desktop computer to be
able to access them at university, without using additional hardware.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [4]
(d) One of the parents in the family works for a government department and sends sensitive data
from their home computer to the office.The data is encrypted before being sent to ensure it is
harder to understand if it is intercepted.
Describe four other preventative measures that could be taken to avoid network security
issues.
1.........................................................................................................................................
...........................................................................................................................................
2.........................................................................................................................................
...........................................................................................................................................
3.........................................................................................................................................
...........................................................................................................................................
4.........................................................................................................................................
...........................................................................................................................................
[4]
8 Many teachers feel that monitoring student progress is an important part of the teaching and learning
process.
Describe how the features of a spreadsheet can be used by a teacher to help monitor student
progress.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
.................................................................................................................................................. [6]
9 One way of communicating with other people is to use emails. It is very important that when you
send and receive emails you are aware of esafety.
Evaluate your own use of email in terms of esafety and describe the strategies you will need to
minimise the potential esafety risks.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
.................................................................................................................................................. [8]
10 Aimi works for a shop that sells toys. She is setting up a relational database of the stock in the
shop. She has started designing the database. Aimi has written down the questions that are asked
about each toy and needs to produce appropriate field names from them. An example of the type
of data that is to be stored is shown.
(a) Complete the design table below by filling in an appropriate field name for each question. Each
field name must be different. Field names must not include spaces.
[4]
(b) When Aimi created the whole database one of the fields was set as integer. However, as data
is entered Aimi realises that the field should have been set to two decimal places.
Describe the steps that need to be taken, by Aimi, to change the field from an integer to a
decimal. This field will be set to two decimal places.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [4]
(c) Aimi created a relational database but could have created a flat file database.
Discuss the advantages and disadvantages of using a relational database rather than a flat
file database.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [6]
11 Tawara College is setting up a new website for its older students. The website will publicise the
events in the college, as well as revision and sporting activities. The headteacher wants the website
to be attractive to the older students and it must meet their needs.
Before the website can be produced the needs of the audience have to be taken into account.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
.................................................................................................................................................. [8]
12 The director of a zoo is writing a document about wallabies. He has taken an image of some
wallabies (Fig. 12.1) and is planning the layout of the pages which will include part of the image.
The image he plans to use is shown in Fig. 12.2.
Fig. 12.1
Fig. 12.2
(a) Name the editing technique that was used to change Fig. 12.1 to Fig. 12.2.
........................................................................................................................................... [1]
(b) The director will include images and information about the wallabies in the document. Each
page will be set out in 2 columns with a line between them.
(i) Describe the steps taken to create the columns. Assume the software has been loaded
and the text has been entered.
................................................................................................................................
................................................................................................................................
................................................................................................................................
................................................................................................................................
................................................................................................................................
................................................................................................................................ [3]
................................................................................................................................
................................................................................................................................
................................................................................................................................
................................................................................................................................
................................................................................................................................
................................................................................................................................
................................................................................................................................
................................................................................................................................ [4]
(c) As the document is being written for the zoo it needs to conform to the corporate house style.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [4]
13 A student is looking for information on the internet for his school project. He has found a number
of web pages that are useful.
(i) Bookmark
................................................................................................................................
................................................................................................................................
................................................................................................................................
................................................................................................................................ [2]
(ii) Anchor
................................................................................................................................
................................................................................................................................
................................................................................................................................
................................................................................................................................ [2]
(iii) Hyperlink
................................................................................................................................
................................................................................................................................
................................................................................................................................
................................................................................................................................ [2]
(b) The student has found a website that is very useful and is planning to bookmark it.
Describe the steps he will need to take to set up a bookmark for the website.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [2]
Describe the advantages and disadvantages of using magnetic tapes rather than flash memory for
backing up data.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
.................................................................................................................................................. [6]
15 Streaming movies and music is replacing downloading or purchasing a physical copy of the files.
Describe the advantages and disadvantages of streaming files rather than using other methods.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
.................................................................................................................................................. [4]
BLANK PAGE
BLANK PAGE
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable
effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will
be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge Assessment
International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at
www.cambridgeinternational.org after the live examination series.
Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of
Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge.
Published
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.
Cambridge International will not enter into discussions about these mark schemes.
Cambridge International is publishing the mark schemes for the May/June 2021 series for most Cambridge
IGCSE™, Cambridge International A and AS Level components and some Cambridge O Level components.
These general marking principles must be applied by all examiners when marking candidate answers.
They should be applied alongside the specific content of the mark scheme or generic level descriptors
for a question. Each question paper and mark scheme will also comply with these marking principles.
• the specific content of the mark scheme or the generic level descriptors for the question
• the specific skills defined in the mark scheme or in the generic level descriptors for the question
• the standard of response required by a candidate as exemplified by the standardisation scripts.
Marks awarded are always whole marks (not half marks, or other fractions).
• marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit
is given for valid answers which go beyond the scope of the syllabus and mark scheme,
referring to your Team Leader as appropriate
• marks are awarded when candidates clearly demonstrate what they know and can do
• marks are not deducted for errors
• marks are not deducted for omissions
• answers should only be judged on the quality of spelling, punctuation and grammar when these
features are specifically assessed by the question as indicated by the mark scheme. The
meaning, however, should be unambiguous.
Rules must be applied consistently, e.g. in situations where candidates have not followed
instructions or in the application of generic level descriptors.
Marks should be awarded using the full range of marks defined in the mark scheme for the question
(however; the use of the full mark range may be limited according to the quality of the candidate
responses seen).
Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should
not be awarded with grade thresholds or grade descriptors in mind.
1 4
Backing RAM ROM
storage
3 Two from: 2
He may be tired/injured therefore text messaging is easier than trying to talk
The text message is sent even though the sender’s phone is in limited signal
strength
Limited signal strength can result in a break of voice
A text message is quicker to send
4 4
Interviews Observation Questionnaires
5(b) Blog 1
5(c) Wiki 1
6(b) S:\IGCSE\ICT\ 2
\IGCSE – 1 mark
\ICT\ – 1 mark
8 Six from: 6
Student progress can be shown over time using graphs
Comparisons between students can be shown using graphs
Comparisons with archive data can be shown using graphs
Conditional formatting can be used to show how a student is performing
compare to other students or past performance
Data can be sorted to show the best performers in the class
Calculate average marks to enable comparisons
Automatic reporting results to parents
Filtering students to show those above/below a threshold
I do not reply by using reply button unless I know the person ...
... because it may be a scam
10(a) 4
Question Field name (Examples)
Disadvantages
More complex than a flat file database as more tables are required
Takes more time to set up
More of a reduction in performance if many tables are needed
Slower extraction of data
Less robust due to broken keys and records//Each table requires a key field
and relationships to other tables
Needs specialist personnel to setup the database
More processing power needed for complex queries
A relational database is more complex to understand that a flat file database
11 Eight from: 8
There needs to be emoticons/clipart to grab the attention
The content needs to be relevant to improve their knowledge
There must be a balance of information and pictures with more information
than pictures
The use of white space is less important
More hyperlinks to related web pages
Fonts must be clear and readable
The interface must be simple, clear and intuitive
Slideshows, videos and images providing more information
High contrast background
The students need to be constantly engaged
Needs to be interactive
The tone of the website needs to be casual
The website needs to be able to work on all platforms especially mobile ones
The content needs to be kept fresh and updated
12(a) Cropping/crop/cut 1
Three from:
Use of corporate/same colours
Same font
Same style of font
Margins and white space look similar
Graphics are similar
Logos are the same
Language used is the same on all documents within the organisation
Position of the images are the same
14 Six from: 6
Advantages
Less expensive per GB/gigabyte of memory
Not as easily lost, as larger in size
Disadvantages
Data access time is slower
Data transfer rate is slower
Affected by magnetic fields
They have moving parts therefore less robust
Read and write is more noisy
Less compact that flash memory
Harder to transfer to other devices
Requires a special reader
15 Four from: 4
Advantages
Files can be larger therefore it can save physical storage space
More likely to get the music you need
More likely to get more up to date music
Can be accessed in more places as only need the internet
Don’t need physical storage space
Don’t need optical drives to view/listen to movie/audio
Can be viewed on mobile devices with internet connection
Copyright owners have more control over who can watch the movie/listen to
the audio as no physical copy exists to be copied/pirated
Don’t have to wait for the whole/large file to be downloaded before viewing
Physical copies can be lost/stolen/damaged rendering them useless/have to
buy again but steamed movies are always available
Disadvantages
Needs a connection to the internet
Never own a physical copy of the file
The playback is dependent on the internet connection therefore may not be as
good a quality
A subscription may be needed to be paid therefore may be more expensive
INSTRUCTIONS
• Answer all questions.
• Use a black or dark blue pen.
• Write your name, centre number and candidate number in the boxes at the top of the page.
• Write your answer to each question in the space provided.
• Do not use an erasable pen or correction fluid.
• Do not write on any bar codes.
• You may use an HB pencil for any diagrams, graphs or rough working.
INFORMATION
• The total mark for this paper is 100.
• The number of marks for each question or part question is shown in brackets [ ].
• No marks will be awarded for using brand names of software packages or hardware.
06_0417_12_2022_1.15
© UCLES 2022 [Turn over
2
[2]
1 ...............................................................................................................................................
2 ...............................................................................................................................................
[2]
(a) The network device that is used to transmit the data along an analogue telephone line is a
........................................................................................................................................... [1]
........................................................................................................................................... [1]
(c) The network device that allows data to be directed to a specific computer on a LAN is a
........................................................................................................................................... [1]
(d) The internal network device that allows a computer to connect to a LAN is a
........................................................................................................................................... [1]
The paragraph below shows some of the formatting features that can be used.
(a) Write down four of the formatting features that have been used in the paragraph shown.
1 ........................................................................................................................................
2 ........................................................................................................................................
3 ........................................................................................................................................
4 ........................................................................................................................................
[4]
(b) The logo for the Summer Steam Festival is shown and labelled A. The organisers of the event
are planning to create a second logo for all their correspondence. This is shown and labelled B.
Summer
Steam Festival Summer
2022 Steam Festival
2022
A B
Describe the steps that have been used to transform logo A into logo B.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [4]
5 A library is considering the way it issues books. The librarians are planning to use RFID rather than
bar codes.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
.................................................................................................................................................. [4]
6 Laptop computers use Solid State Drives (SSD) rather than Hard Disc Drives (HDD).
Describe two disadvantages of using an SSD rather than an HDD in a laptop computer.
1 ...............................................................................................................................................
..................................................................................................................................................
2 ...............................................................................................................................................
..................................................................................................................................................
[2]
7 A patient has an injury and the doctor treating him needs to find out information about the patient.
Most of the data he needs to collect is personal data.
The data collected is protected by data protection legislation. Most data protection acts include the
principle that data should be kept confidential and secure.
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
3 ........................................................................................................................................
...........................................................................................................................................
4 ........................................................................................................................................
...........................................................................................................................................
[4]
(b) Explain what is meant by personal data. Include two examples of personal data in your answer.
Explanation .......................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
Example 1 .........................................................................................................................
...........................................................................................................................................
Example 2 .........................................................................................................................
...........................................................................................................................................
[3]
(c) Explain why personal data should be kept confidential and secure.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [4]
8 Uniform Resource Locators (URL) are used to locate websites and resources. A teacher needs to
find a teaching guide from Cambridge Assessment International Education. To download the
teaching guide she types in:
(a) Write down only the part of the URL which shows the file name of the teaching guide.
........................................................................................................................................... [1]
(b) Write down only the part of the URL which is the folder where the teaching guide is stored.
........................................................................................................................................... [1]
(c) Write down only the part of the URL which is the domain name.
........................................................................................................................................... [1]
...........................................................................................................................................
........................................................................................................................................... [1]
=VLOOKUP(F2,A2:B9,2,0)
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [4]
(b) Before the spreadsheet can be used, data needs to be entered to test the spreadsheet.
There are three types of test data: normal, abnormal and extreme.
Normal ..............................................................................................................................
...........................................................................................................................................
Abnormal ..........................................................................................................................
...........................................................................................................................................
Extreme ............................................................................................................................
...........................................................................................................................................
[3]
(c) Explain, using examples, the differences between a function and a formula.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [6]
(d) The completed file could have been created using a database.
Describe two reasons why databases are used in certain applications rather than spreadsheets.
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
[2]
10 The prolonged use of computers can cause several health problems particularly when sitting down
and using monitors.
Discuss the strategies that you have developed to minimise health risks which only relate to sitting
down and using a monitor.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
.................................................................................................................................................. [8]
Discuss the advantages and disadvantages to the company of using computer-controlled robots
rather than using humans to manufacture the cars.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
.................................................................................................................................................. [6]
Discuss the benefits and drawbacks of analysing a system by observing staff rather than looking
at the current systems documentation.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
.................................................................................................................................................. [6]
13 A librarian in a college department library is entering data into a student borrowers’ file. As the data
is entered it needs to be verified.
1 ........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[4]
(b) Explain, using examples, why it is necessary to carry out validation as well as verification for
this system.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [4]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [2]
(b) Describe the ways that a user can recognise spam and methods to help prevent it.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [6]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [6]
(b) Describe two issues related to the security of data in the cloud.
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
[2]
16 A company uses corporate house style within the headers and footers in its documents.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [2]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [2]
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable
effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will
be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge Assessment
International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at
www.cambridgeinternational.org after the live examination series.
Cambridge Assessment International Education is part of Cambridge Assessment. Cambridge Assessment is the brand name of the University of Cambridge Local
Examinations Syndicate (UCLES), which is a department of the University of Cambridge.
Published
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.
Cambridge International will not enter into discussions about these mark schemes.
Cambridge International is publishing the mark schemes for the May/June 2022 series for most
Cambridge IGCSE, Cambridge International A and AS Level and Cambridge Pre-U components, and some
Cambridge O Level components.
These general marking principles must be applied by all examiners when marking candidate answers. They should be applied alongside the
specific content of the mark scheme or generic level descriptors for a question. Each question paper and mark scheme will also comply with these
marking principles.
the specific content of the mark scheme or the generic level descriptors for the question
the specific skills defined in the mark scheme or in the generic level descriptors for the question
the standard of response required by a candidate as exemplified by the standardisation scripts.
Marks awarded are always whole marks (not half marks, or other fractions).
marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit is given for valid answers which go beyond the
scope of the syllabus and mark scheme, referring to your Team Leader as appropriate
marks are awarded when candidates clearly demonstrate what they know and can do
marks are not deducted for errors
marks are not deducted for omissions
answers should only be judged on the quality of spelling, punctuation and grammar when these features are specifically assessed by the
question as indicated by the mark scheme. The meaning, however, should be unambiguous.
Rules must be applied consistently, e.g. in situations where candidates have not followed instructions or in the application of generic level
descriptors.
Marks should be awarded using the full range of marks defined in the mark scheme for the question (however; the use of the full mark range may
be limited according to the quality of the candidate responses seen).
Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should not be awarded with grade thresholds or
grade descriptors in mind.
1 Keyboard 2
Digital camera
3(a) Modem 1
3(b) Router 1
3(c) Switch 1
5 Four from: 4
RFID are faster to read than bar codes
RFID scanning is more accurate than bar codes
RFID does not need line of sight to read but bar code does
RFID will read the data if the reader is further away
RFID can scan multiple items at the same time
RFID allows greater security
RFID can store more data than a bar code
RFID tags can be rewritten, so can be reused
RFID tags are more robust as bar codes will not scan if damaged
8(a) 2193733.pdf 1
8(b) igcse-ICT-0417 1
8(c) www.cambridgeinternational.org 1
9(a) =VLOOKUP(F2,A2:B9,2,0) 4
Four from:
Looks up F2/Airport name
Looks up in the range A2:B9/Code and Name
Finds the corresponding value from the 2nd column
Displays the value in G2
Finds exact match
9(b) Normal 3
Data that is within the boundary of acceptability
Abnormal
Data that is outside the boundary/limit of acceptability/incorrect data
Extreme
Data on the edge of acceptability
One mark
Examples =A1+B1, =SUM(A2:B2)
One mark
Examples SUM/AVERAGE etc
10 Eight from: 8
Use of the monitor
Using a flat screen monitor can reduce eye strain and headaches
I turn the monitor 90 deg to the window to reduce the glare on the screen
If I turn the monitor this can cause problems with the layout of the room
I need to buy a monitor that could tilt to reduce neck ache
I close the window blinds to avoid glare on monitor/headaches
I should not use rooms with more than one window but this could be difficult
I could use a matt screen to prevent glare/headaches
I use a flat screen monitor as there is less flicker therefore reduces the chance of an epileptic seizure/eye strain/headaches
I keep the screen clear of dust to reduce static and eye strain
I could have my eyesight tested regularly
Brightness of the room should equal the brightness of the screen to prevent eye strain
Enable blue light filter/blue light glasses to prevent eye strain
I could set night light on the computer to prevent eye strain
I sit at arms length from the screen to prevent eye strain
Sitting down
I use an ergonomic chair/standing desk to reduce back and neck pains
I sit with correct posture to help reduce back and neck pain
I use a footrest to reduce DVT/improve posture
If there are wheels on the chair for easy movement I should be careful to avoid injury problems with the chair moving
backwards
Maximum of six marks if candidate only mention strategies for either sitting down or using a monitor
11 Six from: 6
Advantages
Robots can work in sterile/harmful areas which are dangerous for humans
Humans would need protective clothing which would cost the company more money
Robots can more easily be used for transferring large delicate items
Robots can work 24/7
Cheaper in the long run
Higher productivity
More accurate/precise engineering
More frequent checking of the equipment
Fewer workers are needed therefore lowering costs
Production of the cars is more consistent
Disadvantages
Expensive to buy robots
Maintenance is expensive
Requires backup systems, which are expensive
They replace skilled workers, leading to de-skilling
They need constant observation which increases the cost of maintenance crews
To gain full marks the discussion must have correct answers for both advantages and disadvantages
12 Observation 6
The analyst sees it with their own eyes
Get a complete picture of the whole system
Cheaper as it does not take the worker away from work
Description of the Hawthorne effect
The quality and accuracy of information is highly dependent on the skill of the observer
Examining documents
Can see exact details of inputs, processing and outputs
Saves time as there could be copies of previous analysis
Allows the analyst to predict the size of the new system by analysing the amount of data
Very time consuming to look through all the documents
Very expensive to pay for an analyst to look through all the documents
To gain full marks the discussion must have correct answers for both observation and examining documents
13(a) One mark for naming the verification and one mark for explanation 4
Visual verification
Person enters the data it is read through and corrected as needed using the original copy
How is it used:
User accesses the cloud storage using the internet
Cloud data can be accessed from any device
Clients send files to a data server
The server is maintained by a cloud provider
Data can be shared with other users
Cloud storage automatically backs up data
If one server fails there are others used as backup
Users pay a monthly/annual fee for storage used
To gain full marks the explanation must have correct answers for both what it is and how it is used
INSTRUCTIONS
• Answer all questions.
• Use a black or dark blue pen.
• Write your name, centre number and candidate number in the boxes at the top of the page.
• Write your answer to each question in the space provided.
• Do not use an erasable pen or correction fluid.
• Do not write on any bar codes.
• You may use an HB pencil for any diagrams, graphs or rough working.
INFORMATION
• The total mark for this paper is 100.
• The number of marks for each question or part question is shown in brackets [ ].
• No marks will be awarded for using brand names of software packages or hardware.
06_0417_13_2022_1.12
© UCLES 2022 [Turn over
2
Memory
Mouse Printer Spreadsheet
stick
[2]
2 Name an appropriate validation routine for each statement. Each answer must be different.
(a) The last digit in a code used to ensure the other digits have been entered correctly.
........................................................................................................................................... [1]
........................................................................................................................................... [1]
(c) This validation routine ensures data has been entered into a field.
........................................................................................................................................... [1]
........................................................................................................................................... [1]
3 Identify two input devices which are used in computer control systems.
1 ...............................................................................................................................................
2 ...............................................................................................................................................
[2]
4 Computers can store data in the cloud rather than using storage devices in the computer.
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
3 ........................................................................................................................................
...........................................................................................................................................
[3]
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
3 ........................................................................................................................................
...........................................................................................................................................
[3]
5 The manager of a cinema has purchased a new booking system. There are 26 rows in the cinema
with 20 seats on a row. Each seat is identified by a unique ID. The seat ID consists of the row letter
followed by the position of the seat on the row. An example of the seat on row F position 12 would
be F12.
(a) Write down one example of each of the following types of test data. The answers must be
different in each case.
Normal ..............................................................................................................................
Abnormal ..........................................................................................................................
[2]
(b) When a ticket is produced for the new system it contains a QR code.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [5]
(c) Discuss the advantages and disadvantages of using manual booking systems rather than
online booking systems.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [8]
6 Eye strain is one of the health issues associated with using computers.
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
3 ........................................................................................................................................
...........................................................................................................................................
[3]
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
3 ........................................................................................................................................
...........................................................................................................................................
4 ........................................................................................................................................
...........................................................................................................................................
[4]
7 Tawara Stores has realised that the number of people shopping for food online has increased over
the past few years.
(a) Discuss the advantages and disadvantages to the customer of shopping for food online.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [8]
(b) Tawara Stores are also aware that many current websites do not cater for older people. They
intend to create a version of their website for this audience.
Describe the features of this website to meet the needs of an older audience, giving reasons
for your choice of features.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [4]
8 Tawara Hotel uses magnetic stripe cards to allow guests access to their bedrooms. The hotel is
changing the electronic lock it uses on its bedroom doors so the lock can work with RFID cards.
Compare the use of magnetic stripe cards and RFID cards for key entry. Your answer must include
similarities and differences.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
.................................................................................................................................................. [6]
9 The Internet of Things (IoT) allows devices as well as computers to connect to the internet using
a router. Each device uses an IP address.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [3]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [3]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [4]
10 Both the internet and the intranet are used for communication.
(i) Internet
................................................................................................................................
................................................................................................................................
................................................................................................................................
................................................................................................................................ [2]
(ii) Intranet
................................................................................................................................
................................................................................................................................
................................................................................................................................
................................................................................................................................ [2]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [6]
11 An image has been taken of a bird watcher and a bird. The original image has been saved as a
jpg file type. You have been asked to remove parts of the image to just show the bird and to save
it as a png file type to become the new image.
Original image
New image
(a) Explain the steps needed to change the original image to the new image.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [4]
(b) Explain the differences between a jpg and a png file type.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [4]
12 The protection of personal data is important as many transactions are carried out online.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [4]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [4]
13 In a college library if a book is not available students can reserve the book. When the book becomes
available the librarian needs to inform the student. He does this by typing a letter and printing it.
He has a database of students and has decided that in future he will use mail merge to produce
the letters.
Give four advantages of using mail merge instead of typing out the letter each time.
1 ...............................................................................................................................................
..................................................................................................................................................
2 ...............................................................................................................................................
..................................................................................................................................................
3 ...............................................................................................................................................
..................................................................................................................................................
4 ...............................................................................................................................................
..................................................................................................................................................
[4]
14 People can manage their banking transactions using the internet. However, if the internet signal is
poor telephone banking can be used.
A person wishes to use telephone banking without speaking to an operator to transfer money from
one bank account to another.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
.................................................................................................................................................. [6]
BLANK PAGE
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable
effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will
be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge Assessment
International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at
www.cambridgeinternational.org after the live examination series.
Cambridge Assessment International Education is part of Cambridge Assessment. Cambridge Assessment is the brand name of the University of Cambridge Local
Examinations Syndicate (UCLES), which is a department of the University of Cambridge.
Published
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.
Cambridge International will not enter into discussions about these mark schemes.
Cambridge International is publishing the mark schemes for the May/June 2022 series for most
Cambridge IGCSE, Cambridge International A and AS Level and Cambridge Pre-U components, and some
Cambridge O Level components.
These general marking principles must be applied by all examiners when marking candidate answers. They should be applied alongside the
specific content of the mark scheme or generic level descriptors for a question. Each question paper and mark scheme will also comply with these
marking principles.
the specific content of the mark scheme or the generic level descriptors for the question
the specific skills defined in the mark scheme or in the generic level descriptors for the question
the standard of response required by a candidate as exemplified by the standardisation scripts.
Marks awarded are always whole marks (not half marks, or other fractions).
marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit is given for valid answers which go beyond the
scope of the syllabus and mark scheme, referring to your Team Leader as appropriate
marks are awarded when candidates clearly demonstrate what they know and can do
marks are not deducted for errors
marks are not deducted for omissions
answers should only be judged on the quality of spelling, punctuation and grammar when these features are specifically assessed by the
question as indicated by the mark scheme. The meaning, however, should be unambiguous.
Rules must be applied consistently, e.g. in situations where candidates have not followed instructions or in the application of generic level
descriptors.
Marks should be awarded using the full range of marks defined in the mark scheme for the question (however; the use of the full mark range may
be limited according to the quality of the candidate responses seen).
Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should not be awarded with grade thresholds or
grade descriptors in mind.
3 Two from: 2
Sensors
Keypad/Number pad
Touch screen
Microphone
Camera
5(a) Normal 2
Any seat from A1 to Z20//Any letter from A to Z inclusive followed by any number 1 to 20 inclusive
Abnormal
Any incorrect seat row or number/Any character other than A to Z and/or any number outside range 120 or anything that’s
incorrect
Disadvantages
Manual systems can result in double booking
Manual booking systems update the data less often than online systems
Difficult to see if a seat is taken as the seats are not updated when booked
Bookings can only be made when the booking office is open
Can only book at a booking office
People have to travel to the booking office to book, therefore wastes time
People have to travel to the booking office to book wastes cost
More difficult to change bookings
Physical tickets are issued which can be lost more easily
To gain full marks the discussion must have correct answers for both advantages and disadvantages
Disadvantages
Makes people lazy/lack of exercise
Over-reliance on computers
More security issues
Needs a reliable internet connection
Goods can take time to arrive
Goods could be damaged in transit
More chance of errors in the ordering
More difficult to amend an order after purchase
No way of checking the goods before buying
There may be delivery/packaging costs
To gain full marks the discussion must have correct answers for both advantages and disadvantages
8 Six from: 6
Similarities
Both have improved security by using encryption
Data cannot be read by eye so more secure
Data can be re-written
Direct data entry
Both allow fast access to the room
Both are read by a reader/scanner
Both can be easily damaged
Differences
RFID is contactless therefore has less wear and tear whereas magnetic is placed in reader
RFID reads the data faster
More data on RFID card
RFID cannot be left in the lock accidentally
RFID cards can be read by others from a distance using a device
Easier to clone a magnetic stripe card
Magnetic cards can only be read in one direction whereas RFID are only tapped
Magnetic stripe can be affected by magnets/mobile phones
RFID cards are more robust
To gain full marks the comparison must have correct answers for both similarities and differences
Against policed
Governments block text/viewpoints/their own bias viewpoint
Unsuitable material is easily available in other ways
Control would cost money and users would have to pay
Control would be very difficult to enforce
Could cause less people to use it
Laws are different in each country but the internet is world wide
Creates a feeling of big brother/always being watched
To gain full marks the discussion must have correct answers for both for and against policed
13 Four from: 4
Letters can be personalised for each student
The data is from the file therefore fewer errors
Saves time than typing in all the details each time
Letter can be saved and used again
Standard letter can be used each time/More consistency
Data in the database need only be checked
Easier to make changes to the letters
14 Six from: 6
User telephones the bank telephone centre
System asks for the long number on the credit/debit card/sort code and account number/customer Access/ID number
The user taps out the number on the phone keypad and presses #/speaks the number
System asks for certain characters in a password/phone banking security number
The user taps out the characters asked for/security number and presses #
System checks the number is correct
System rejects the password/security number
The user re-enters the characters/security number
After three attempts the telephone connection drops
System asks other security answers
The user taps it in/speaks the answer
System asks which service you require/options given
Users tap in the number to select transfer from one account to another
System asks number of account transfer from
User taps in account number
System connects with the bank account
System asks for number of account transfer money to
User taps in account number
System asks amount to transfer
User taps in the amount
Checks the amount in the account/maximum not exceeded
Approves request
If amount exceeded the call is terminated/transaction declined/insufficient funds
System asks when the transfer should happen
The user taps in the date
System asks you to confirm it/sends a text message/send email
Customer hangs up to end the transaction
INSTRUCTIONS
• Answer all questions.
• Use a black or dark blue pen.
• Write your name, centre number and candidate number in the boxes at the top of the page.
• Write your answer to each question in the space provided.
• Do not use an erasable pen or correction fluid.
• Do not write on any bar codes.
• You may use an HB pencil for any diagrams, graphs or rough working.
INFORMATION
• The total mark for this paper is 100.
• The number of marks for each question or part question is shown in brackets [ ].
• No marks will be awarded for using brand names of software packages or hardware.
11_0417_13_2022_1.11
© UCLES 2022 [Turn over
2
1 Complete the following sentences using the most appropriate words from the list.
........................................................................................................................................... [1]
........................................................................................................................................... [1]
(c) The first line of a paragraph that appears as the last line of the previous page is called
........................................................................................................................................... [1]
........................................................................................................................................... [1]
1 ...............................................................................................................................................
2 ...............................................................................................................................................
3 ...............................................................................................................................................
[3]
3 Circle two features of multimedia presentations which would not be found in a word processed
document.
[2]
4 A person contacts an online medical website that uses an expert system to allow users to
self-diagnose illnesses.
(a) Write down the component within the expert system that matches the definition given.
................................................................................................................................
................................................................................................................................ [1]
(ii) This component carries out the reasoning of the expert system.
................................................................................................................................
................................................................................................................................ [1]
(iii) This component allows the person to interact with the system.
................................................................................................................................
................................................................................................................................ [1]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [6]
5 A restaurant uses a number of different types of software. These include control, measurement,
spreadsheet and word processing software.
(a) Tick (✓) the most appropriate piece of software to carry out the tasks shown.
Word
Control Measurement Spreadsheet processing
(✓) (✓) (✓) (✓)
[4]
The restaurant owner is planning to upgrade the software used to book reservations. He has
employed a systems analyst who is analysing the current system. The systems analyst can either
send out questionnaires for staff to answer or observe staff working with the current system.
(b) Discuss the advantages and disadvantages of using questionnaires that staff answer rather
than observing staff to gather information about the current system.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [6]
6 A web page can contain images saved as png or gif file types.
png ....................................................................................................................................
...........................................................................................................................................
gif ......................................................................................................................................
...........................................................................................................................................
[2]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [3]
7 A school librarian is setting up a database of all the revision books he has in stock. The school
library sells revision books to students. The books range in value from $1 to $10 and are available
either in electronic book type (E) or physical book type (P).
(a) The librarian is planning to set up a number of different types of validation rule for the fields
to check data entry. Write down the most appropriate field name from the table that could be
used with each of the validation rules. Your answers must be different in each case.
Presence ..........................................................................................................................
Lookup ..............................................................................................................................
Range ...............................................................................................................................
Length ...............................................................................................................................
[4]
(b) Write down the most appropriate field name from the table that could be used as a primary
key field.
........................................................................................................................................... [1]
Most of the revision books are available in electronic book type as digital versions of the printed
books. These are stored as interactive PDF files.
(c) Describe the benefits and drawbacks of using the digital versions.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [6]
8 An organisation has changed the way in which members of staff can enter the building. Previously
they typed in a four-digit code on a key pad; now they use a device that reads a handprint.
(a) Discuss the effectiveness of using a handprint to enter the building rather than keying in a
code.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [8]
(b) Give two other examples of biometric methods that could be used in this scenario.
1 ........................................................................................................................................
2 ........................................................................................................................................
[2]
Describe the constraints that you need to consider when writing and sending an email.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
.................................................................................................................................................. [6]
10 (a) For each of the following types of backing storage give one example of its associated media.
Your answers must be different in each case.
Optical ..............................................................................................................................
...........................................................................................................................................
Magnetic ...........................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[3]
(b) Describe three differences between optical and magnetic backing storage.
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
3 ........................................................................................................................................
...........................................................................................................................................
[3]
(a) Explain two ways she could search for information on the World Wide Web (WWW).
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
[2]
(b) Explain the differences between the internet and the World Wide Web (WWW).
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [4]
12 The internet contains three web development layers. One layer is the content layer. This layer is
used to enter the content of a web page structure.
(a) Name and describe the other two web development layers.
Layer .................................................................................................................................
Description ........................................................................................................................
...........................................................................................................................................
Layer .................................................................................................................................
Description ........................................................................................................................
...........................................................................................................................................
[4]
(b) Explain why tables can be used to structure elements within a web page.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [3]
13 A teacher is concerned that students are playing online computer games at home without considering
eSafety. The teacher is going to create a set of rules that he feels they should be following.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
.................................................................................................................................................. [6]
14 Explain why page, section and column breaks are used in documents.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
.................................................................................................................................................. [3]
15 An employee is carrying out work for her company at home. The work she is doing is confidential.
She has been advised by her company to use encryption. She wishes to transfer some of this work
to the office.
(a) Discuss two different methods she could use to transfer this work to the office. Include in your
answer the advantages and disadvantages of each method.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [6]
(b) Describe what is meant by the term encryption and why it is used.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [3]
(c) Tick (✓) the most appropriate working pattern to match the following statements.
[3]
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable
effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will
be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge Assessment
International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at
www.cambridgeinternational.org after the live examination series.
Cambridge Assessment International Education is part of Cambridge Assessment. Cambridge Assessment is the brand name of the University of Cambridge Local
Examinations Syndicate (UCLES), which is a department of the University of Cambridge.
Published
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.
Cambridge International will not enter into discussions about these mark schemes.
Cambridge International is publishing the mark schemes for the October/November 2022 series for most
Cambridge IGCSE™, Cambridge International A and AS Level components and some Cambridge O Level
components.
These general marking principles must be applied by all examiners when marking candidate answers.
They should be applied alongside the specific content of the mark scheme or generic level descriptors
for a question. Each question paper and mark scheme will also comply with these marking principles.
• the specific content of the mark scheme or the generic level descriptors for the question
• the specific skills defined in the mark scheme or in the generic level descriptors for the question
• the standard of response required by a candidate as exemplified by the standardisation scripts.
Marks awarded are always whole marks (not half marks, or other fractions).
• marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit
is given for valid answers which go beyond the scope of the syllabus and mark scheme,
referring to your Team Leader as appropriate
• marks are awarded when candidates clearly demonstrate what they know and can do
• marks are not deducted for errors
• marks are not deducted for omissions
• answers should only be judged on the quality of spelling, punctuation and grammar when these
features are specifically assessed by the question as indicated by the mark scheme. The
meaning, however, should be unambiguous.
Rules must be applied consistently, e.g. in situations where candidates have not followed
instructions or in the application of generic level descriptors.
Marks should be awarded using the full range of marks defined in the mark scheme for the question
(however; the use of the full mark range may be limited according to the quality of the candidate
responses seen).
Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should
not be awarded with grade thresholds or grade descriptors in mind.
1(a) portrait 1
1(b) a footer 1
1(c) an orphan 1
1(d) centred 1
2 Three from: 3
Light
Temperature
Humidity/moisture
pH
CO2
3 Sound 2
Video
5(a) 4
Control Measure Spread Wordproc
(✓) ment sheet essing
(✓) (✓) (✓)
Automatically turning on
the fans when the room ✓
gets too hot
Monitoring the
temperature in the ✓
restaurant
Disadvantages
Users do not always complete the questionnaire and hand it back but
observation watches users working
Work rate can be influenced by being observed but this does not apply to
questionnaires
More chances of incorrect data if question not understood
The observer can see exactly how the system works well and not so well
whereas a questionnaire takes the users viewpoint
To gain full marks the discussion must have correct answers for both
advantages and disadvantages
6(a) png 2
One from:
Raster/full colour digital photos
Images with a transparent background
gif
Moving/animated image
7(b) ISBN 1
Drawbacks
Health issues with using a computer to read the book
Cannot be written in braille
May require extra software/reader
Never own the book as it is only data
Need to purchase a device to read them
Needs the internet to download the book
To gain full marks the description must have correct answers for both
benefits and drawbacks
Negatives
If the hand is damaged, then may not work
More difficult to change biometric data
Only works with one hand therefore difficult for right-handed people
Recognition could be slower as system is more complex
Harder to set up the biometric system
Takes longer to add new people/change biometric data to the system
Biometrics can use a lot of memory to store the data
Intrusive as personal details must be stored in biometrics
More likely to be affected by the environment
To gain full marks the discussion must have correct answers for both
positives and negatives
9 Six from: 6
Abide by the laws within the country that affect the general use of emails
Use acceptable language
Abide by copyright
Follow local guidelines set by an employer/schools
Use appropriate security
Follow netiquette
Respect other people/s/own privacy
Be aware of the need for password protection
Be aware that email accounts can be Illegally accessed
10(a) Optical 3
CD ROM/DVD ROM, CD R/DVD R, CD RW/DVD RW, DVD RAM, Blu-ray
discs/CD/DVD
Magnetic
Fixed/portable/removable hard disks/magnetic tape.
Solid state
Memory stick/flash card
To gain full marks the explanation must have correct answers for both
the internet and World Wide Web
12(a) Presentation 4
Defines the format of a web page/individual elements through styling
Behaviour
To enter scripting language to a web page/individual element
13 Six from: 6
Examples
Do not give away personal information
Do not use your real name as your username
Do not use your face image as your avatar
If you receive messages from unwanted users block and report them
Do not meet unknown users in real life//use a chaperone
Do not give financial information to other users
If you receive unwanted and abusive messages report the sender of the
messages
When sending messages always us appropriate language
Think before you reply to a message
14 Three from: 3
To adjust pagination
To avoid orphans/widows
To improve layout on the page
To allow for the change of orientation of pages in the document
To enable to start a new chapter on a new page
Email as an attachment
Do not require physical device
Require access to the email account both at home and in the office
The memory size could be an issue
Requires the use of the internet
15(c) 3
Part-
Compressed Flexible Job
time
hours hours sharing
working
(✓) (✓) (✓)
(✓)
An employee works a
full day but negotiates
✓
with the employer the
start and end times
INSTRUCTIONS
• Answer all questions.
• Use a black or dark blue pen.
• Write your name, centre number and candidate number in the boxes at the top of the page.
• Write your answer to each question in the space provided.
• Do not use an erasable pen or correction fluid.
• Do not write on any bar codes.
• You may use an HB pencil for any diagrams, graphs or rough working.
INFORMATION
• The total mark for this paper is 100.
• The number of marks for each question or part question is shown in brackets [ ].
• No marks will be awarded for using brand names of software packages or hardware.
11_0417_13_2022_1.11
© UCLES 2022 [Turn over
2
1 Complete the following sentences using the most appropriate words from the list.
........................................................................................................................................... [1]
........................................................................................................................................... [1]
(c) The first line of a paragraph that appears as the last line of the previous page is called
........................................................................................................................................... [1]
........................................................................................................................................... [1]
1 ...............................................................................................................................................
2 ...............................................................................................................................................
3 ...............................................................................................................................................
[3]
3 Circle two features of multimedia presentations which would not be found in a word processed
document.
[2]
4 A person contacts an online medical website that uses an expert system to allow users to
self-diagnose illnesses.
(a) Write down the component within the expert system that matches the definition given.
................................................................................................................................
................................................................................................................................ [1]
(ii) This component carries out the reasoning of the expert system.
................................................................................................................................
................................................................................................................................ [1]
(iii) This component allows the person to interact with the system.
................................................................................................................................
................................................................................................................................ [1]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [6]
5 A restaurant uses a number of different types of software. These include control, measurement,
spreadsheet and word processing software.
(a) Tick (✓) the most appropriate piece of software to carry out the tasks shown.
Word
Control Measurement Spreadsheet processing
(✓) (✓) (✓) (✓)
[4]
The restaurant owner is planning to upgrade the software used to book reservations. He has
employed a systems analyst who is analysing the current system. The systems analyst can either
send out questionnaires for staff to answer or observe staff working with the current system.
(b) Discuss the advantages and disadvantages of using questionnaires that staff answer rather
than observing staff to gather information about the current system.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [6]
6 A web page can contain images saved as png or gif file types.
png ....................................................................................................................................
...........................................................................................................................................
gif ......................................................................................................................................
...........................................................................................................................................
[2]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [3]
7 A school librarian is setting up a database of all the revision books he has in stock. The school
library sells revision books to students. The books range in value from $1 to $10 and are available
either in electronic book type (E) or physical book type (P).
(a) The librarian is planning to set up a number of different types of validation rule for the fields
to check data entry. Write down the most appropriate field name from the table that could be
used with each of the validation rules. Your answers must be different in each case.
Presence ..........................................................................................................................
Lookup ..............................................................................................................................
Range ...............................................................................................................................
Length ...............................................................................................................................
[4]
(b) Write down the most appropriate field name from the table that could be used as a primary
key field.
........................................................................................................................................... [1]
Most of the revision books are available in electronic book type as digital versions of the printed
books. These are stored as interactive PDF files.
(c) Describe the benefits and drawbacks of using the digital versions.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [6]
8 An organisation has changed the way in which members of staff can enter the building. Previously
they typed in a four-digit code on a key pad; now they use a device that reads a handprint.
(a) Discuss the effectiveness of using a handprint to enter the building rather than keying in a
code.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [8]
(b) Give two other examples of biometric methods that could be used in this scenario.
1 ........................................................................................................................................
2 ........................................................................................................................................
[2]
Describe the constraints that you need to consider when writing and sending an email.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
.................................................................................................................................................. [6]
10 (a) For each of the following types of backing storage give one example of its associated media.
Your answers must be different in each case.
Optical ..............................................................................................................................
...........................................................................................................................................
Magnetic ...........................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[3]
(b) Describe three differences between optical and magnetic backing storage.
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
3 ........................................................................................................................................
...........................................................................................................................................
[3]
(a) Explain two ways she could search for information on the World Wide Web (WWW).
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
[2]
(b) Explain the differences between the internet and the World Wide Web (WWW).
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [4]
12 The internet contains three web development layers. One layer is the content layer. This layer is
used to enter the content of a web page structure.
(a) Name and describe the other two web development layers.
Layer .................................................................................................................................
Description ........................................................................................................................
...........................................................................................................................................
Layer .................................................................................................................................
Description ........................................................................................................................
...........................................................................................................................................
[4]
(b) Explain why tables can be used to structure elements within a web page.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [3]
13 A teacher is concerned that students are playing online computer games at home without considering
eSafety. The teacher is going to create a set of rules that he feels they should be following.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
.................................................................................................................................................. [6]
14 Explain why page, section and column breaks are used in documents.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
.................................................................................................................................................. [3]
15 An employee is carrying out work for her company at home. The work she is doing is confidential.
She has been advised by her company to use encryption. She wishes to transfer some of this work
to the office.
(a) Discuss two different methods she could use to transfer this work to the office. Include in your
answer the advantages and disadvantages of each method.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [6]
(b) Describe what is meant by the term encryption and why it is used.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [3]
(c) Tick (✓) the most appropriate working pattern to match the following statements.
[3]
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable
effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will
be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge Assessment
International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at
www.cambridgeinternational.org after the live examination series.
Cambridge Assessment International Education is part of Cambridge Assessment. Cambridge Assessment is the brand name of the University of Cambridge Local
Examinations Syndicate (UCLES), which is a department of the University of Cambridge.
Published
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.
Cambridge International will not enter into discussions about these mark schemes.
Cambridge International is publishing the mark schemes for the October/November 2022 series for most
Cambridge IGCSE™, Cambridge International A and AS Level components and some Cambridge O Level
components.
These general marking principles must be applied by all examiners when marking candidate answers.
They should be applied alongside the specific content of the mark scheme or generic level descriptors
for a question. Each question paper and mark scheme will also comply with these marking principles.
• the specific content of the mark scheme or the generic level descriptors for the question
• the specific skills defined in the mark scheme or in the generic level descriptors for the question
• the standard of response required by a candidate as exemplified by the standardisation scripts.
Marks awarded are always whole marks (not half marks, or other fractions).
• marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit
is given for valid answers which go beyond the scope of the syllabus and mark scheme,
referring to your Team Leader as appropriate
• marks are awarded when candidates clearly demonstrate what they know and can do
• marks are not deducted for errors
• marks are not deducted for omissions
• answers should only be judged on the quality of spelling, punctuation and grammar when these
features are specifically assessed by the question as indicated by the mark scheme. The
meaning, however, should be unambiguous.
Rules must be applied consistently, e.g. in situations where candidates have not followed
instructions or in the application of generic level descriptors.
Marks should be awarded using the full range of marks defined in the mark scheme for the question
(however; the use of the full mark range may be limited according to the quality of the candidate
responses seen).
Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should
not be awarded with grade thresholds or grade descriptors in mind.
1(a) portrait 1
1(b) a footer 1
1(c) an orphan 1
1(d) centred 1
2 Three from: 3
Light
Temperature
Humidity/moisture
pH
CO2
3 Sound 2
Video
5(a) 4
Control Measure Spread Wordproc
(✓) ment sheet essing
(✓) (✓) (✓)
Automatically turning on
the fans when the room ✓
gets too hot
Monitoring the
temperature in the ✓
restaurant
Disadvantages
Users do not always complete the questionnaire and hand it back but
observation watches users working
Work rate can be influenced by being observed but this does not apply to
questionnaires
More chances of incorrect data if question not understood
The observer can see exactly how the system works well and not so well
whereas a questionnaire takes the users viewpoint
To gain full marks the discussion must have correct answers for both
advantages and disadvantages
6(a) png 2
One from:
Raster/full colour digital photos
Images with a transparent background
gif
Moving/animated image
7(b) ISBN 1
Drawbacks
Health issues with using a computer to read the book
Cannot be written in braille
May require extra software/reader
Never own the book as it is only data
Need to purchase a device to read them
Needs the internet to download the book
To gain full marks the description must have correct answers for both
benefits and drawbacks
Negatives
If the hand is damaged, then may not work
More difficult to change biometric data
Only works with one hand therefore difficult for right-handed people
Recognition could be slower as system is more complex
Harder to set up the biometric system
Takes longer to add new people/change biometric data to the system
Biometrics can use a lot of memory to store the data
Intrusive as personal details must be stored in biometrics
More likely to be affected by the environment
To gain full marks the discussion must have correct answers for both
positives and negatives
9 Six from: 6
Abide by the laws within the country that affect the general use of emails
Use acceptable language
Abide by copyright
Follow local guidelines set by an employer/schools
Use appropriate security
Follow netiquette
Respect other people/s/own privacy
Be aware of the need for password protection
Be aware that email accounts can be Illegally accessed
10(a) Optical 3
CD ROM/DVD ROM, CD R/DVD R, CD RW/DVD RW, DVD RAM, Blu-ray
discs/CD/DVD
Magnetic
Fixed/portable/removable hard disks/magnetic tape.
Solid state
Memory stick/flash card
To gain full marks the explanation must have correct answers for both
the internet and World Wide Web
12(a) Presentation 4
Defines the format of a web page/individual elements through styling
Behaviour
To enter scripting language to a web page/individual element
13 Six from: 6
Examples
Do not give away personal information
Do not use your real name as your username
Do not use your face image as your avatar
If you receive messages from unwanted users block and report them
Do not meet unknown users in real life//use a chaperone
Do not give financial information to other users
If you receive unwanted and abusive messages report the sender of the
messages
When sending messages always us appropriate language
Think before you reply to a message
14 Three from: 3
To adjust pagination
To avoid orphans/widows
To improve layout on the page
To allow for the change of orientation of pages in the document
To enable to start a new chapter on a new page
Email as an attachment
Do not require physical device
Require access to the email account both at home and in the office
The memory size could be an issue
Requires the use of the internet
15(c) 3
Part-
Compressed Flexible Job
time
hours hours sharing
working
(✓) (✓) (✓)
(✓)
An employee works a
full day but negotiates
✓
with the employer the
start and end times
INSTRUCTIONS
• Answer all questions.
• Use a black or dark blue pen.
• Write your name, centre number and candidate number in the boxes at the top of the page.
• Write your answer to each question in the space provided.
• Do not use an erasable pen or correction fluid.
• Do not write on any bar codes.
• You may use an HB pencil for any diagrams, graphs or rough working.
INFORMATION
• The total mark for this paper is 80.
• The number of marks for each question or part question is shown in brackets [ ].
• No marks will be awarded for using brand names of software packages or hardware.
06_0417_13_2023_1.12
© UCLES 2023 [Turn over
2
Tick (✓) the most appropriate validation check to test the validity of the ISBN.
A character check
B format check
C length check
D range check
[1]
(a) An internal hardware component that connects a computer to a Local Area Network.
........................................................................................................................................... [1]
(b) An external device that retains a computer’s data even after the computer is turned off.
........................................................................................................................................... [1]
........................................................................................................................................... [1]
3 A group of students are producing a class newsletter which they will email to parents of
students in the class. They are deciding whether to use a laptop computer or a smartphone
to type the newsletter.
(a) Discuss the advantages and disadvantages of using a laptop computer rather than a
smartphone for this purpose.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [6]
(b) The students have decided to use a smartphone. Data for the newsletter will be input,
stored and output by the smartphone.
(i) Identify two devices that are part of the smartphone that could be used to input
the data for the newsletter.
1 ............................................................................................................................
2 ............................................................................................................................
[2]
(ii) Identify two devices that are part of the smartphone that could be used to output
data from the newsletter.
1 ............................................................................................................................
2 ............................................................................................................................
[2]
(iii) Identify two appropriate devices that could be used to store data for the
newsletter.
1 ............................................................................................................................
2 ............................................................................................................................
[2]
(c) The newsletter is to be saved as a PDF and sent as an email attachment to parents.
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
[2]
(d) Describe the features that the students must include to make the newsletter appeal to
the parents.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [4]
Compare an intranet with an extranet. Your answer must include similarities and differences.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
.................................................................................................................................................. [6]
5 Identify two appropriate IT-related causes for each of the health issues. Your answers
must be different in each case.
1 ........................................................................................................................................
2 ........................................................................................................................................
[2]
1 ........................................................................................................................................
2 ........................................................................................................................................
[2]
1 ........................................................................................................................................
...........................................................................................................................................
Example ............................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
Example ............................................................................................................................
...........................................................................................................................................
[4]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [2]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [4]
(b) Describe the steps involved in automatic stock control when an item is sold at a POS
terminal.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [6]
8 A teacher is creating a spreadsheet as an electronic mark book. Part of the electronic mark
book displays how well a student did on a piece of work. When a student completes a piece
of work the teacher will enter the mark into the electronic mark book and a message will be
displayed.
=IF(A1>=60,"Merit",IF(A1>50,"Pass","Not Pass"))
The formula will need to be tested. The teacher will do this by entering test data into cell A1.
(a) Explain the steps that need to be taken to test the formula. Include in your answer any
test data used and the reasons why these were chosen.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [5]
State the changes he needs to make to the formula to ensure ‘Pass’ is displayed.
...........................................................................................................................................
........................................................................................................................................... [1]
(c) When the electronic mark book is complete it needs to be tested with live data.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [2]
9 The manager of an organisation is planning a meeting of its directors. The manager plans
to use audio-conferencing for the meeting.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [3]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [3]
(c) Identify the hardware and software required to join the audio-conference.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [4]
10 A school secretary is composing an email. She will send the email to a teacher and will
copy the headteacher into the message. She can either copy the headteacher in as cc or
bcc.
Compose
To:
cc:
bcc:
Subject:
cc ......................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
bcc ....................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[4]
(b) A teacher is considering setting up either a forum or a blog for his class to help his
students with their studies.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [5]
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
.................................................................................................................................................. [3]
12 A web page has an attached stylesheet in the head section and also has an inline style
attribute in the body section.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
.................................................................................................................................................. [2]
BLANK PAGE
BLANK PAGE
BLANK PAGE
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.
Cambridge Assessment International Education is part of Cambridge Assessment. Cambridge Assessment is the brand name of the University of Cambridge
Local Examinations Syndicate (UCLES), which is a department of the University of Cambridge.
Published
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.
Cambridge International will not enter into discussions about these mark schemes.
Cambridge International is publishing the mark schemes for the May/June 2023 series for most
Cambridge IGCSE, Cambridge International A and AS Level and Cambridge Pre-U components, and some
Cambridge O Level components.
These general marking principles must be applied by all examiners when marking candidate answers.
They should be applied alongside the specific content of the mark scheme or generic level descriptors
for a question. Each question paper and mark scheme will also comply with these marking principles.
the specific content of the mark scheme or the generic level descriptors for the question
the specific skills defined in the mark scheme or in the generic level descriptors for the question
the standard of response required by a candidate as exemplified by the standardisation scripts.
Marks awarded are always whole marks (not half marks, or other fractions).
marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit
is given for valid answers which go beyond the scope of the syllabus and mark scheme,
referring to your Team Leader as appropriate
marks are awarded when candidates clearly demonstrate what they know and can do
marks are not deducted for errors
marks are not deducted for omissions
answers should only be judged on the quality of spelling, punctuation and grammar when these
features are specifically assessed by the question as indicated by the mark scheme. The
meaning, however, should be unambiguous.
Rules must be applied consistently, e.g. in situations where candidates have not followed
instructions or in the application of generic level descriptors.
Marks should be awarded using the full range of marks defined in the mark scheme for the question
(however; the use of the full mark range may be limited according to the quality of the candidate
responses seen).
Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should
not be awarded with grade thresholds or grade descriptors in mind.
Note: No marks are awarded for using brand names of software packages or hardware. These must
be created.
Examiners must ensure that annotations are placed to show that the whole answer has been
seen
Annotations MUST be placed in white space close to where the mark is awarded
At the end of prose answers place a TV to show that the whole answer has been marked
If an answer is left blank then use SEEN and award NR, but if anything has been written for
example ‘Don’t know’, ‘?’ etc. then use NAQ and award 0. If an answer has been attempted
and crossed out then attempt to mark it.
1 B Format check 1
Advantages
Larger screen to read the typed data
Laptop uses a physical keyboard therefore easier to type
Larger keyboard to type in the data
Fewer data entry errors due to larger screen / keyboard
More suited for entering mass amounts of data
Laptop version of software will have more features than smartphone version
of software
More computer storage for typed text
Easier to add other devices to store the data
Disadvantages
Less portable / heavier than a smartphone as the smartphone can be
slipped into a pocket
Smartphones are smaller therefore easier to carry
More likely to have a smartphone with them
To gain full marks candidates must have correct answers from both
advantages and disadvantages.
Camera
Microphone
Touch screen
Speaker
Screen
SD card
Flash memory
Internal storage
SSD
4 Six from: 6
Similarities
Both have shared content
Both use internet technologies / TCP-IP
Both have restricted access
Both sit behind a firewall
Differences
Intranet shares data within an organisation whereas extranet shares content
with external users and employees
Extranet is part of a company’s intranet
Intranet allows communication within the organisation whereas extranet
allows communication with customers / suppliers
Extranet can lead to more security breaches
Intranet is owned is by a single organisation whereas extranet can be used
by several organisations
To gain full marks candidates must have correct answers from both
similarities and differences
6(a) One mark for each form of identification and one mark for each 4
corresponding example given:
By electronically tracking the sales of goods the industry could know when
to order items…
…so that the goods do not run out in the stores
The POS system allows a business to identify which products are selling
well / selling badly…
…so products do not run out / left of the shelves
Through this identification, a business can increase the order of profitable
products and reduce unmarketable inventory
Increases speed of transaction as the checkout staff do not need to enter
the price of each item
Itemised bills can be generated on screen and printed for customers
It allows self check out which means less staff are needed therefore
reducing staff costs
Real data relating to tests that have been carried out previously
To ensure that the electronic mark book should work with real data
Easier to set up
Does not need specialist equipment…
…therefore saves money
No issue with lip syncing
Less bandwidth is needed therefore reduces hanging / freeze
More privacy as they do not use cameras
CC
Cc stands for carbon copy
The Headteacher would receive a copy of the message with the teacher
knowing
All recipients would know who is on the cc list and where it was from
BCC
Bcc stands for blind carbon copy
The Headteacher would receive a copy of the message without the teacher
knowing
All recipients on bcc would only know where it was from to and the cc list
To gain full marks candidates must have correct answers from both cc
and bcc.
11 Three from: 3
12 Two from: 2
INSTRUCTIONS
• Answer all questions.
• Use a black or dark blue pen.
• Write your name, centre number and candidate number in the boxes at the top of the page.
• Write your answer to each question in the space provided.
• Do not use an erasable pen or correction fluid.
• Do not write on any bar codes.
• You may use an HB pencil for any diagrams, graphs or rough working.
INFORMATION
• The total mark for this paper is 80.
• The number of marks for each question or part question is shown in brackets [ ].
• No marks will be awarded for using brand names of software packages or hardware.
06_0417_12_2023_1.13
© UCLES 2023 [Turn over
2
Tick (✓) the most appropriate validation check to test the validity of the bar code.
A check digit
B format check
C range check
D spell check
[1]
........................................................................................................................................... [1]
(b) an internal component that provides the input and output of audio signals
........................................................................................................................................... [1]
(c) an internal component that is composed of the main memory, the control unit and the arithmetic
logic unit.
........................................................................................................................................... [1]
3 A headteacher is producing a web page about the history of her school. She has been given some
old hard-copy photographs which she will include on the web page. She has a digital camera and
a scanner to use to convert the hard-copy photographs into a digital format.
Compare the use of a digital camera with a scanner in this scenario. Your answer must include
similarities and differences.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
.................................................................................................................................................. [4]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [2]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [2]
5 State which health issue is most likely to occur from each description shown. Your answer must
be different in each case.
........................................................................................................................................... [1]
........................................................................................................................................... [1]
........................................................................................................................................... [1]
6 A company requires its employees to regularly change their login passwords for the company’s
computer systems. Passwords must be strong and cannot be reused.
(a) Explain three problems that may occur when the employees change their passwords regularly.
1 ........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
3 ........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[6]
...........................................................................................................................................
........................................................................................................................................... [1]
1 ........................................................................................................................................
2 ........................................................................................................................................
3 ........................................................................................................................................
[3]
7 A student is creating a spreadsheet that includes a formula to check a number entered in a cell is
between two values.
=IF(AND(A10>1,A10<32),"OK","error")
(a) Identify two items of extreme test data the student should use and give the reason why this
data was chosen.
Reason .............................................................................................................................
...........................................................................................................................................
[3]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [3]
8 A teacher provides revision lessons during the holidays. The teacher plans to use web-conferencing
for the lessons.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [3]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [6]
9 (a) The products in a warehouse contain either a bar code or a Radio Frequency Identification
(RFID) tag.
Compare bar code readers and RFID readers. Your answer must include similarities and
differences.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [6]
1 ........................................................................................................................................
2 ........................................................................................................................................
[2]
1 ........................................................................................................................................
2 ........................................................................................................................................
3 ........................................................................................................................................
[3]
........................................................................................................................................... [1]
11 Some gaming systems use gesture based user interfaces to operate a game.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [2]
(b) Describe the drawbacks of using gesture based user interfaces in this way.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [4]
(a) Describe why Blu-ray discs are preferred to an internal hard disk for storing movies.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [4]
(b) Hard disks and Blu-ray discs are examples of backing storage.
1 ............................................................................................................................
................................................................................................................................
2 ............................................................................................................................
................................................................................................................................
[2]
1 ............................................................................................................................
2 ............................................................................................................................
[2]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [4]
(b) Data is collected by different types of sensor and then input to the computer model to be
processed.
1 ........................................................................................................................................
2 ........................................................................................................................................
[2]
1 ........................................................................................................................................
2 ........................................................................................................................................
[2]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [4]
Give two methods that could be used to prevent software copyright legislation being broken.
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
[2]
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.
Cambridge Assessment International Education is part of Cambridge Assessment. Cambridge Assessment is the brand name of the University of Cambridge
Local Examinations Syndicate (UCLES), which is a department of the University of Cambridge.
Published
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.
Cambridge International will not enter into discussions about these mark schemes.
Cambridge International is publishing the mark schemes for the May/June 2023 series for most
Cambridge IGCSE, Cambridge International A and AS Level and Cambridge Pre-U components, and some
Cambridge O Level components.
These general marking principles must be applied by all examiners when marking candidate answers.
They should be applied alongside the specific content of the mark scheme or generic level descriptors
for a question. Each question paper and mark scheme will also comply with these marking principles.
the specific content of the mark scheme or the generic level descriptors for the question
the specific skills defined in the mark scheme or in the generic level descriptors for the question
the standard of response required by a candidate as exemplified by the standardisation scripts.
Marks awarded are always whole marks (not half marks, or other fractions).
marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit
is given for valid answers which go beyond the scope of the syllabus and mark scheme,
referring to your Team Leader as appropriate
marks are awarded when candidates clearly demonstrate what they know and can do
marks are not deducted for errors
marks are not deducted for omissions
answers should only be judged on the quality of spelling, punctuation and grammar when these
features are specifically assessed by the question as indicated by the mark scheme. The
meaning, however, should be unambiguous.
Rules must be applied consistently, e.g. in situations where candidates have not followed
instructions or in the application of generic level descriptors.
Marks should be awarded using the full range of marks defined in the mark scheme for the question
(however; the use of the full mark range may be limited according to the quality of the candidate
responses seen).
Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should
not be awarded with grade thresholds or grade descriptors in mind.
Note: No marks are awarded for using brand names of software packages or hardware. These must
be created
Examiners must ensure that annotations are placed to show that the whole answer has been
seen.
Annotations MUST be placed in white space close to where the mark is awarded.
At the end of prose answers place a TV to show that the whole answer has been marked.
If an answer is left blank then use SEEN and award NR, but if anything has been written for
example ‘Don’t know’, ‘?’ etc. then use NAQ and award 0. If an answer has been attempted and
crossed out then attempt to mark it.
1 Check digit 1
2(c) CPU/Processor 1
3 Four from: 4
Similarities
Both capture images
Both store digital data
Both create digital images
Differences
Digital camera is more portable
Scanner captures the image in more detail
Scanners do not have a keystone effect
Digital camera may capture glare/shadow off the image
Digital camera has faster data capture
To gain full marks the comparison must have correct answers for both
similarities and differences.
Users may have to write the passwords down so they are not forgotten …
… this may lead to others seeing the passwords
7(a) 2 – 1 mark 3
31 – 1 mark
One from:
To test the boundaries (of the formula)
To test the comparisons are correct
Positives
The students save time as they do not need to travel to the school
The students save the cost of travelling to the school.
The school saves costs as it does not need to open in the holidays
Students and teachers can work from anywhere in the world
Can be recorded for students who miss the lesson
Negatives
Hardware/software could be expensive
Requires a good/reliable internet connection
There could be issues with child protection
More difficult to concentrate/motivate
If the hardware breaks/loss of connection/lack of hardware then the student
cannot participate
Only students with the correct specialist devices will be able to access
To gain full marks candidates must have correct answers for both
positives and negatives
Similarities
Both readers scan the product code
Both readers use direct data entry
Both readers allow tracking of products
Both readers are contactless
Differences
Bar code readers only scan one bar code at a time whereas RFID readers
read multiple tags at the same time
Bar code readers require a direct line-of-sight with the code
RFID readers use near-field technology
Bar code readers need to be close to the bar code
Bar code needs to be in the correct position for reader to be able to read it
Bar codes readers might not be able to read a damaged/scratched bar code
whereas RFID can read data as long as chip/tag is not severely damaged.
Bar code reader might have read errors if the bar code is damaged/scratched
whereas RFID readers are more likely to read damaged/scratched tags
Bar code readers emit/use light whereas RFID uses electromagnetic/radio
waves
To gain full marks the comparison must have correct answers for both
similarities and differences.