You are on page 1of 326

Cambridge Assessment International Education

Cambridge International General Certificate of Secondary Education


*0296975089*

INFORMATION AND COMMUNICATION TECHNOLOGY 0417/13


Paper 1 Theory May/June 2019
2 hours

Candidates answer on the Question Paper.

No Additional Materials are required.

READ THESE INSTRUCTIONS FIRST

Write your name, centre number and candidate number in the spaces at the top of this page and any additional
pages you use.
Write in dark blue or black pen.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.

No marks will be awarded for using brand names of software packages or hardware.
Answer all questions.
Any businesses described in this paper are entirely fictitious.

At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.

This syllabus is regulated for use in England, Wales and Northern Ireland as a Cambridge International Level 1/Level 2 Certificate.

This document consists of 17 printed pages and 3 blank pages.

06_0417_13_2019_1.15
© UCLES 2019 [Turn over
2

1 Data can be stored on Magnetic, Optical or Solid state media.


Tick the most appropriate type of medium for each of the examples.

Magnetic Optical Solid state


(✓) (✓) (✓)

Blu-ray disc

Hard disk

Pen drive

Flash memory card

[4]

2 Tick the most appropriate type of computer that matches each description.

Desktop Laptop Smartphone


(✓) (✓) (✓)

A portable computer that would most easily fit


into your pocket

A computer that is not powered by batteries

A computer that has the smallest screen

A portable computer with a keyboard and with


a built-in 15 inch monitor

[4]

3 A bank has trialled the replacement of Magnetic Ink Character Recognition (MICR) for the details
at the bottom of the cheques with bar codes.

Describe two advantages of using Magnetic Ink Character Recognition (MICR) rather than bar
codes when processing cheques.

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

.................................................................................................................................................. [2]

© UCLES 2019 06_0417_13_2019_1.15


3

4 Truck repair shops tend to use dot matrix printers to produce their invoices.

Identify two advantages of using a dot matrix printer rather than a laser printer in this environment.

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

.................................................................................................................................................. [2]

5 A computer contains system software and applications software.

(a) Explain what is meant by system software.

...........................................................................................................................................

........................................................................................................................................... [1]

(b) Explain what is meant by applications software.

...........................................................................................................................................

........................................................................................................................................... [1]

(c) Circle two types of system software.

Actuator Linker Operating system

Photo-editing software Sensor Spreadsheet

[2]

© UCLES 2019 06_0417_13_2019_1.15 [Turn over


4

6 Phishing, pharming and smishing can affect the security of your data.

For each of these security issues describe the methods which you could use to try to prevent them.

(a) Phishing

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [2]

(b) Pharming

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [2]

(c) Smishing

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [2]

© UCLES 2019 06_0417_13_2019_1.15


5

7 A number of devices are used to enable computers to communicate within a network. Two of these
devices are hubs and switches.

(a) Compare and contrast the use of a hub and a switch.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [4]

(b) Bluetooth is an alternative method of allowing computers to communicate with other computers
and devices.

Describe how a tablet computer can connect to a printer using Bluetooth.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [4]

© UCLES 2019 06_0417_13_2019_1.15 [Turn over


6

8 Tawara Health Centre is creating a new online appointment system for its patients.

The developer has created a table showing part of the file structure of the new database.

Field name Data type Field length Comment

Medical_ID_number Numeric: integer 12-digit unique number

Date_of_birth Date/Time dd/mmm/yyyy

Family_name Text 10

Doctor_name Text 20

Appointment_time Date/Time 5 hh:mm

Contact_telephone_number Text 01617151234

Current_medication Text 20

A, O, AB, B
Blood_type Text 3
Each can be + or –

(a) Apart from presence check, for each field, name an appropriate validation check that could be
used. Your answer should be different in each case.

Field name Validation check

Medical_ID_number

Blood_type

Date_of_birth

Contact_telephone_number

[4]

(b) Referring to the fields in the table, name the most appropriate field that could be used as a
primary key.

........................................................................................................................................... [1]

© UCLES 2019 06_0417_13_2019_1.15


7

(c) Using the fields given in the database complete the design below showing a suitable online
data entry form for the receptionist to fill in.

[6]

© UCLES 2019 06_0417_13_2019_1.15 [Turn over


8

(d) The health centre has a new logo that appears on their online data entry form. The developers
originally produced a logo and then had to change it so that it could be used appropriately on
the online data entry form. The original logo is shown before the changes and the new logo
after the changes.

Before

After

Describe the changes that have been made to the original logo to create the new logo.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [4]

© UCLES 2019 06_0417_13_2019_1.15


9

(e) The doctors in the health centre use an expert system to help them diagnose illnesses.

The symptoms of the patient’s illness are typed in by the doctor.

Describe the processing that the system uses so that it can suggest possible illnesses.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [5]

© UCLES 2019 06_0417_13_2019_1.15 [Turn over


10

9 A large city centre hotel uses a computer-controlled barrier for entry into its car park. A light sensor
is used to detect the presence of a car and prevent the barrier from dropping onto the car.

Describe how a microprocessor uses the data from the sensor to control the car park barrier.

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

.................................................................................................................................................. [6]

© UCLES 2019 06_0417_13_2019_1.15


11

10 Name three physical safety issues associated with the use of ICT equipment, and for each one,
suggest a possible method to help to prevent the issue. The methods should be different in each
case.

Issue 1......................................................................................................................................

..................................................................................................................................................

Method......................................................................................................................................

..................................................................................................................................................

Issue 2......................................................................................................................................

..................................................................................................................................................

Method......................................................................................................................................

..................................................................................................................................................

Issue 3......................................................................................................................................

..................................................................................................................................................

Method......................................................................................................................................

..................................................................................................................................................

[6]

© UCLES 2019 06_0417_13_2019_1.15 [Turn over


12

11 A small library is situated in a village. When a book is borrowed from the library the borrower
presents the book and their library card to the librarian.

(a) Discuss the advantages and disadvantages of the different input devices which could be used
by the librarian to record a book being borrowed.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [6]

© UCLES 2019 06_0417_13_2019_1.15


13

(b) Sometimes specialist books are needed in the library. When this happens a message has to
be sent to the main library in the town. The message can either be sent by email or by physical
fax.

Describe the advantages and disadvantages of using email compared with sending a fax.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [6]

© UCLES 2019 06_0417_13_2019_1.15 [Turn over


14

12 As student data is entered into a school registration system it needs to be verified.

(a) Name two types of verification.

1.........................................................................................................................................

2.........................................................................................................................................

[2]

(b) Explain using examples why it is necessary to carry out validation as well as verification for
this system.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [4]

© UCLES 2019 06_0417_13_2019_1.15


15

13 (a) Explain the term function with reference to spreadsheets.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [2]

(b) State the purpose of absolute cell referencing and give the symbol that is used to indicate
absolute cell referencing.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [2]

(c) Explain why named ranges are sometimes used in spreadsheets.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [2]

© UCLES 2019 06_0417_13_2019_1.15 [Turn over


16

14 Several EFTPOS terminals have recently been installed in the ticket booking area of a train station.

Describe the inputs and outputs of such a system when purchasing a ticket.

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

.................................................................................................................................................. [6]

© UCLES 2019 06_0417_13_2019_1.15


17

15 Peter is researching his family tree for his history project. He has the choice of using historical
records stored in the local library or the internet to find the necessary information.

Apart from not having to travel, discuss the advantages and disadvantages to Peter of using historical
records stored in the local library rather than the internet.

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

.................................................................................................................................................. [8]

© UCLES 2019 06_0417_13_2019_1.15


18

BLANK PAGE

© UCLES 2019 06_0417_13_2019_1.15


19

BLANK PAGE

© UCLES 2019 06_0417_13_2019_1.15


20

BLANK PAGE

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable
effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will
be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge Assessment
International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at
www.cambridgeinternational.org after the live examination series.

Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of
Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge.

© UCLES 2019 06_0417_13_2019_1.15


Cambridge Assessment International Education
Cambridge International General Certificate of Secondary Education

INFORMATION AND COMMUNICATION TECHNOLOGY 0417/13


Paper 1 Written May/June 2019
MARK SCHEME
Maximum Mark: 100

Published

This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.

Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.

Cambridge International will not enter into discussions about these mark schemes.

Cambridge International is publishing the mark schemes for the May/June 2019 series for most
Cambridge IGCSE™, Cambridge International A and AS Level and Cambridge Pre-U components, and
some Cambridge O Level components.

This syllabus is regulated for use in England, Wales and Northern Ireland as a Cambridge International Level 1/Level 2 Certificate.

This document consists of 11 printed pages.

© UCLES 2019 [Turn over


0417/13 Cambridge IGCSE – Mark Scheme May/June 2019
PUBLISHED

Generic Marking Principles

These general marking principles must be applied by all examiners when marking candidate answers.
They should be applied alongside the specific content of the mark scheme or generic level descriptors
for a question. Each question paper and mark scheme will also comply with these marking principles.

GENERIC MARKING PRINCIPLE 1:

Marks must be awarded in line with:

• the specific content of the mark scheme or the generic level descriptors for the question
• the specific skills defined in the mark scheme or in the generic level descriptors for the question
• the standard of response required by a candidate as exemplified by the standardisation scripts.

GENERIC MARKING PRINCIPLE 2:

Marks awarded are always whole marks (not half marks, or other fractions).

GENERIC MARKING PRINCIPLE 3:

Marks must be awarded positively:

• marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit
is given for valid answers which go beyond the scope of the syllabus and mark scheme,
referring to your Team Leader as appropriate
• marks are awarded when candidates clearly demonstrate what they know and can do
• marks are not deducted for errors
• marks are not deducted for omissions
• answers should only be judged on the quality of spelling, punctuation and grammar when these
features are specifically assessed by the question as indicated by the mark scheme. The
meaning, however, should be unambiguous.

GENERIC MARKING PRINCIPLE 4:

Rules must be applied consistently e.g. in situations where candidates have not followed
instructions or in the application of generic level descriptors.

GENERIC MARKING PRINCIPLE 5:

Marks should be awarded using the full range of marks defined in the mark scheme for the question
(however; the use of the full mark range may be limited according to the quality of the candidate
responses seen).

GENERIC MARKING PRINCIPLE 6:

Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should
not be awarded with grade thresholds or grade descriptors in mind.

© UCLES 2019 Page 2 of 11


0417/13 Cambridge IGCSE – Mark Scheme May/June 2019
PUBLISHED

Question Answer Marks

1 4
Magnetic Optical Solid state

Blu-ray disc 9

Hard disk 9

Pen drive 9

Flash memory card 9

Question Answer Marks

2 4
Desktop Laptop Smartphone

A portable computer
that would most
9
easily fit into your
pocket

A computer that is
not powered by 9
batteries

A computer that has


9
the smallest screen

A portable computer
with a keyboard and
9
with a built-in 15 inch
monitor

Question Answer Marks

3 Two from: 2

The data on the MICR is human readable easier to check the data
Cannot be read by MICR if the cheque is illegally photocopied
Higher security than using bar codes

Question Answer Marks

4 Two from: 2

Noise of the printer will not be a distraction in a noisy environment


The dot matrix is more resistant to an oily / dirty environment
Don’t have to fill the paper tray as often
Uses multi-part stationery
Can use carbonised paper

© UCLES 2019 Page 3 of 11


0417/13 Cambridge IGCSE – Mark Scheme May/June 2019
PUBLISHED

Question Answer Marks

5(a) One from: 1

Programs that control and manage the computer’s hardware//it runs the
applications software
Interface between the computer hardware and the user applications

5(b) Programs that allow the user to carry out specific tasks 1

5(c) Linker 2
Operating system

Question Answer Marks

6(a) Two from: 2

Be careful when opening emails from people you do not know


Be careful when opening attachments from people you do not know
Do not click on executable (.exe) files / batch (.bat) files sent to you
Never give out bank details / PIN / passwords / personal details in an email
Report any phishing attempts
Do not respond to emails from addresses you do not recognise

6(b) Two from: 2

Use anti-spyware to remove pharming code


Check sites carefully before a link is clicked
Delay using a link sent in an email as some sites are time related
Check the URL / web address of the website before you enter personal
details
Make sure you are on a secure website

6(c) Two from: 2

Never give your bank details / PIN / password/personal details over the
mobile phone / text message
Ignore text messages from numbers you do not recognise
Report any smishing attempts
Never click on links in text messages from unexpected people
Never phone the phone numbers that are given in a suspect text message

© UCLES 2019 Page 4 of 11


0417/13 Cambridge IGCSE – Mark Scheme May/June 2019
PUBLISHED

Question Answer Marks

7(a) Four from: 4

Similarities
A hub and a switch both are used to connect devices to form a LAN
Both a hub and a switch use data packets
A switch is a type of hub
Both check/read the data packets

Differences
In a hub a data packet is broadcast / sent to every computer or device on
the LAN whereas in a switch the data packet is sent to a specific computer
Security is lower in a hub as all data is broadcast
In the switch the destination address is determined/looked up before it is
sent whereas in a hub data packets are sent to all
A switch uses MAC addresses to locate the destination of the device
whereas is a hub MAC addresses are not checked
A switch uses a look up table to determine destination this is not required in
a hub
A switch is capable of more functionality / multiple VLANs but not in a hub

To gain full marks both similarities and differences are required

7(b) Four from: 4

The devices automatically connect when they come into range


Tablet sends radio signals to the printer / printer receives radio signals from
the tablet
Tablet receives radio signals from the printer / printer responds using radio
signals
A handshake takes place
Award a mark for mention of use of 4 digit code for access / default code /
auto connection with code / some devices don’t need code
Uses a band of 79 radio frequencies / channels
The tablet computer randomly chooses one of the radio frequencies /
channels to use
If it is being used it chooses another at random until it finds a free one
Uses spread-spectrum frequency hopping

2 marks can be awarded for a good description of the handshake.

© UCLES 2019 Page 5 of 11


0417/13 Cambridge IGCSE – Mark Scheme May/June 2019
PUBLISHED

Question Answer Marks

8(a) 4
Field Name Validation check

Medical_ID_number length check/check digit/type/character


check

Blood_type Lookup check

Date_of_birth Format check/range check/length


check

Contact_telephone_number Length check/character check/type


check

8(b) Medical_ID_number 1

8(c) Max Six from: 6

Information about the patient :


Medical_ID_number, Date_of_birth, Family_name, Doctor_name,
Appointment_time, Contact_telephone_number, Current_medication,
Blood_type
2 marks for all 8 items
1 mark for at least 6 items

Heading –1 mark
Fills the page and is clearly an online form - 1 mark
Home / submit button – 1 mark
Radio buttons for blood type / doctor / Drop down lists – 1 mark
Calendar for appointment time – 1 mark
Appropriate boxes to type in the details – 1 mark

Must have the correct details but appropriate headings are allowed

8(d) Four from: 4

The image has been reduced in size


The background and foreground colours have been inverted
The image has been rotated anti-clockwise / counter-clockwise
The image has been cropped

8(e) Five from: 5

System generates questions


Inference Engine compares data
Compares data with that held in the knowledge base
Uses rules base
Matches to the symptoms are found
System generates a list of possible diagnoses

© UCLES 2019 Page 6 of 11


0417/13 Cambridge IGCSE – Mark Scheme May/June 2019
PUBLISHED

Question Answer Marks

9 Six from: 6

Microprocessor is programmed with pre-set values


Microprocessor reads data from the sensor
Microprocessor compares sensor readings with pre-set values
If the readings show there is a car present...
...the microprocessor sends a signal to the actuator
Actuator opens/raises the barrier
If the readings show no car present the microprocessor sends a signal to
the actuator
Actuator lowers the barrier

Question Answer Marks

10 Three Matched pairs: 6

Electrocution from spilling drinks


Use of RCB / Check insulation regularly / check equipment regularly /
No drinks or food near ICT equipment

Fire from sockets being overloaded or equipment overheating


Use a CO2 fire extinguisher / Don’t cover IT equipment vents / check
electrics regularly / don’t overload sockets / ensure good ventilation

Tripping over trailing cables


Use cable ducts / fasten cables to walls / use wireless devices / hide cables
under flooring

Heavy equipment falling could injure someone


Use strong desks / use large desks / secure equipment to wall or floor or
desk

© UCLES 2019 Page 7 of 11


0417/13 Cambridge IGCSE – Mark Scheme May/June 2019
PUBLISHED

Question Answer Marks

11(a) Six from: 6

Advantages
Bar code reader / QR reader / Magnetic stripe reader / RFID reader /
Touchscreen is quicker to enter data than keyboard / mouse
Bar code reader / QR reader / Magnetic stripe reader / RFID reader is more
accurate when entering data than keyboard / touchscreen
RFID reader / keyboard can input more information than magnetic stripe
reader / bar code reader / mouse / touchscreen

Disadvantages
Chip / stripe / bar code readers / touchscreen have to be bought / keyboard /
mouse comes with the computer
Continuous use of mouse/keyboard can cause RSI but other devices do not
cause this
If data is typed in using a keyboard / touchscreen then this could lead to
more input errors
More limited options when using a mouse / touchscreen

To gain full marks both advantages and disadvantages are required

11(b) Six from: 6

Advantages of email
Fax the document needs to be printed therefore if the receiving fax is out of
paper this cannot happen / An email does not need to be printed
The document can be more easily lost if sent by fax as it is sent to a device
in a library
The fax machine must be switched on to receive the fax / Emails are
received even if the computer is turned off
The quality of the fax may be poor depending on the print quality
The fax will print even if no ink is in the machine
To use a fax in other documents it needs to be manually entered«
«this could lead to errors
If the line is busy there could be a delay in sending the fax
Each sheet has to be transmitted separately in a fax
No need to buy a fax machine if sending an email

An email is sent directly to the inbox/a person / more private


The email’s data is digital therefore it can be directly used in other software
It is faster to send an email than a fax
The email could be sent to a number of different places at once
The email could be sent to numerous devices at once
The email can have the book order as an attachment

Disadvantages of email
Emails can be spam
The content of the email can be changed electronically whereas the fax is
permanent
Emails can contain viruses

To gain full marks both advantages and disadvantages are required

© UCLES 2019 Page 8 of 11


0417/13 Cambridge IGCSE – Mark Scheme May/June 2019
PUBLISHED

Question Answer Marks

12(a) Visual verification 2


Double data entry

12(b) Max three from: 4

Not all errors are found by either validation or verification separately


Source document may contain errors
Verification only checks that data is copied correctly
Validation only checks if data is reasonable/sensible

Max two from:

Allow any correct example e.g. the mark registered for a student is incorrect
on the source document and was copied
Correct appropriate explanation of an example of a validation check; e.g.
number of lates for a student is 7 misread as a 1; in a range check of 1 – 10

Question Answer Marks

13(a) Two from: 2

A function is a pre-defined piece of code


Pass parameters / variables to functions
Function has a pre-defined name in the software / reserved word
They are used inside formulae
A built in operation

Allow 1 mark for examples SUM() / AVERAGE() / NOW() etc.

13(b) The reference of the cell does not change when replicated 2
Uses a $ to show the absolute reference

13(c) Two from: 2

Used if a range of cells are to be used many times


Easier to remember a name rather than the cell references
Example – a range of cells, constant value or a formula
If the range of cells moves the reference remains within the workbook

© UCLES 2019 Page 9 of 11


0417/13 Cambridge IGCSE – Mark Scheme May/June 2019
PUBLISHED

Question Answer Marks

14 Six from: 6

Output: ‘Message about the journey’


Input: Customer selects journey details
Output: Message ‘Please enter your card / swipe card’
Input: Customer inserts card into chip reader / customer swipes
card/customer places (contactless) card on reader
Input: Data from the card is read by RFID / magnetic stripe reader /
chip reader
Output: message ‘Please enter your PIN’
Input: PIN is entered
If incorrect, customer is asked to re-enter PIN
Output: Message 'Do not remove your card'
Output: Message 'Please remove your card'
Output: Ticket is printed
Output: Message 'Do you require a receipt?'
Input: Yes / No selected
Output: If Yes selected, the station EFTPOS terminal produces a receipt
Output: verbal instructions on what to do

© UCLES 2019 Page 10 of 11


0417/13 Cambridge IGCSE – Mark Scheme May/June 2019
PUBLISHED

Question Answer Marks

15 To be marked as a level of response: 8

Level 3 [7 – 8 marks]
Candidates will address both aspects of the question and discuss/consider
different advantages/disadvantages. The issues raised will be justified.
There will be a reasoned conclusion. The information will be relevant, clear,
organised and presented in a structured and coherent format.

Level 2 [4 – 6 marks]
Candidates will address both aspects of the question and discuss/consider
different advantages / disadvantages although development of some of the
points will be limited to one side of the argument. There will be a conclusion.
For the most part the information will be relevant and presented in a
structured and coherent format.

Level 1 [1 – 3 marks]
Candidates may only address one side of the argument, and give basic
advantages/disadvantages. Answers may be simplistic with little or no
relevance.

Level 0 [0 marks]
Response with no valid content

Answers may make reference to e.g.:

Advantages
No danger of accessing inappropriate information
Relevant information can be found quite quickly, if the information you need
is local to the area and held in the historical records at the library
Don’t have to worry about having to have internet connectivity
Less likely to be information overload compared to the internet
Librarian can recommend what and how to search in the historical records
Index makes searching more efficient

Disadvantages
Historical records have limited amounts of information
Historical records only contain one type of information whereas the internet
contains records from other places
Can be slower to find relevant information than using a search engine
The census contains hand written data that is scanned therefore could be
difficult to read
Manual records don’t have multimedia to help explain information
Data in the historical records is not in digital form therefore cannot be copied
and pasted.
More errors in transferring the data than from the internet
Access is limited to library opening hours
Historical records cannot find information from around the world quickly
It can be slower to search for information compared to the internet

© UCLES 2019 Page 11 of 11


Cambridge Assessment International Examinations
Cambridge International General Certificate of Secondary Education
*2099221217*

INFORMATION AND COMMUNICATION TECHNOLOGY 0417/12


Paper 1 Theory May/June 2019
2 hours

Candidates answer on the Question Paper.

No Additional Materials are required.

READ THESE INSTRUCTIONS FIRST

Write your name, centre number and candidate number in the spaces at the top of this page and any additional
pages you use.
Write in dark blue or black pen.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.

No marks will be awarded for using brand names of software packages or hardware.
Answer all questions.
Any businesses described in this paper are entirely fictitious.

At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.

This syllabus is regulated for use in England, Wales and Northern Ireland as a Cambridge International Level 1/Level 2 Certificate.

This document consists of 15 printed pages and 1 blank page.

06_0417_12_2019_1.14
© UCLES 2019 [Turn over
2

1 A computer consists of hardware and software.

(a) State what is meant by hardware.

...........................................................................................................................................

........................................................................................................................................... [1]

(b) State what is meant by software.

...........................................................................................................................................

........................................................................................................................................... [1]

(c) There are two types of software.

Name one of the two types of software used by a computer.

...........................................................................................................................................

........................................................................................................................................... [1]

(d) Name the piece of hardware found in a tablet computer that is both an input and output device.

...........................................................................................................................................

........................................................................................................................................... [1]

2 There are many types of data storage.


Tick whether the following statements are examples of read-only memory (ROM), random access
memory (RAM) or a hard disk drive (HDD).

ROM RAM HDD


(✓) (✓) (✓)

It loses its data when the computer is switched off.

It is classed as backing storage.

It stores the start-up instructions of the computer.

It temporarily stores the current work of the current user.

[4]

© UCLES 2019 06_0417_12_2019_1.14


3

3 Circle two items which are used for direct data entry.
Keyboard MICR Microphone

Mouse Printer RFID

[2]

4 Alpine slalom skiing involves a number of skiers racing down a mountain negotiating obstacles.
The time it takes each skier to complete the course is measured. The fastest skier is awarded first
place. This involves the use of a number of different sensors to monitor variables.

Using words from the list below, complete the following statements.

Humidity Light Motion pH


Pressure Sunlight Temperature Turbidity

(a) This sensor is used to measure how cold it is on the course.

........................................................................................................................................... [1]

(b) This sensor is used to stop the clock when a skier crosses the finish line.

........................................................................................................................................... [1]

(c) This sensor is used to measure the altitude (height above sea level) at the top of the course.

........................................................................................................................................... [1]

© UCLES 2019 06_0417_12_2019_1.14 [Turn over


4

(d) Skiers take part in two separate races. The fastest thirty skiers qualify for the second race.

Thirty skiers have already completed the course. In order for the next skier to qualify he has
to beat the race time of the skier currently in 30th place.

Part of the spreadsheet showing the current standings is shown.

Write a formula that can be entered in cell E36 to display Y if the skier has qualified by beating
the time of the skier currently in 30th place. If the skier has not qualified then N is displayed.

=.........................................................................................................................................

........................................................................................................................................... [3]

© UCLES 2019 06_0417_12_2019_1.14


5

(e) Just before the second run column E is deleted as it is no longer required. As the skiers in the
second run complete the course their times are entered into the spreadsheet. The spreadsheet
has been changed to display the second run times, as shown.

The combined times for the first and second runs need to be added to the spreadsheet in a
new column between columns E and F.

Describe the steps you would take to add this new column with the heading Combined Time.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [3]

(f) Write a formula that can be entered in the new cell F3 that adds the time taken to complete
the first run to the time taken to complete the second run.

=.........................................................................................................................................

........................................................................................................................................... [1]

© UCLES 2019 06_0417_12_2019_1.14 [Turn over


6

(g) When the overall race is completed the data is sorted into order based on the combined times.
The first place skier will be at the top of the list.

Part of the final spreadsheet before the data is sorted is shown.

The 30th place skier is on row 32.

Describe the steps you would take to sort the data to show each skier in their correct position,
without using functions.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [4]

© UCLES 2019 06_0417_12_2019_1.14


7

(h) Skiers throughout the season earn World Championship points. At the end of the race the
points are calculated for each skier. The winner of the race gains 100 points. The other skiers
have their points calculated by:

• subtracting the combined time of the winner from the combined time of the skier
• then subtracting this value from the winner’s points.

Write a formula to be placed in cell G4 to show the skier’s points for the race. The formula will
be replicated to G32.

=.........................................................................................................................................

........................................................................................................................................... [3]

5 Adinda is a marathon runner. She uses a smartwatch which is a smaller version of her smartphone.
She trains by running in areas near her home. She uses a smartwatch with an in-built GPS system
to navigate the route she is running.

(a) Describe the disadvantages of using a smartwatch in this way.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [4]

(b) Name two other uses of GPS systems.

1.........................................................................................................................................

2.........................................................................................................................................

[2]

© UCLES 2019 06_0417_12_2019_1.14 [Turn over


8

(c) Adinda also carries a smartphone strapped to her arm but finds this is difficult to use when
running. A smartphone can be used for communication, either for making phone calls or text
messaging. Adinda stops part way through her run for a rest and wishes to communicate with
her friend using the smartphone.

Describe why text messaging is a better way for Adinda to communicate with her friend rather
than making a phone call.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [3]

6 Tawara school uses both the internet and an intranet.

(a) Describe four disadvantages to students of using the internet compared with an intranet.

1.........................................................................................................................................

...........................................................................................................................................

2.........................................................................................................................................

...........................................................................................................................................

3.........................................................................................................................................

...........................................................................................................................................

4.........................................................................................................................................

...........................................................................................................................................

[4]

© UCLES 2019 06_0417_12_2019_1.14


9

(b) Email is a service provided by the internet.

For each of the following problems, associated with email, describe methods of protecting your
data.

(i) Spam

................................................................................................................................

................................................................................................................................

................................................................................................................................

................................................................................................................................

................................................................................................................................

................................................................................................................................

................................................................................................................................

................................................................................................................................ [4]

(ii) Viruses

................................................................................................................................

................................................................................................................................

................................................................................................................................

................................................................................................................................

................................................................................................................................

................................................................................................................................

................................................................................................................................

................................................................................................................................ [4]

© UCLES 2019 06_0417_12_2019_1.14 [Turn over


10

7 The introduction of computers into an organisation’s payroll department has affected employees’
working patterns. Two examples of this are part-time working and job sharing.

(a)
(i) Describe what is meant by part-time working.

................................................................................................................................

................................................................................................................................ [2]

(ii) Describe what is meant by job sharing.

................................................................................................................................

................................................................................................................................ [2]

(b) The introduction of these computers has had positive and negative effects on the payroll
department’s workers.

Describe the benefits to workers of introducing computers into this department.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [4]

© UCLES 2019 06_0417_12_2019_1.14


11

8 Internet banking is changing how we carry out banking transactions.

Discuss the advantages and disadvantages to the customers of the introduction of internet banking.

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

.................................................................................................................................................. [6]

© UCLES 2019 06_0417_12_2019_1.14 [Turn over


12

9 Expert systems have many applications.

(a) Name two applications that use expert systems.

1.........................................................................................................................................

2.........................................................................................................................................

[2]

(b) Tick three components of an expert system.


Tick
(✓)

Interactive user interface

Spreadsheet

Motor

Printer

Knowledge base

Search engine

Actuator

Rules base

[3]

10 The systems life cycle is followed when a new computer system is being created.

Tick whether the following statements are examples of the Analysis stage, the Design stage or
the Evaluation stage of the systems life cycle.
Analysis Design Evaluation
(✓) (✓) (✓)

Identifying the problems with the current system

Deciding on testing strategies

Observation of workers using the current system

Comparing the solution with the original task


requirements

[4]

© UCLES 2019 06_0417_12_2019_1.14


13

11 A teacher is planning to develop a presentation to show his younger students, aged 5 to 6.

Describe the factors which need to be considered when designing the presentation for these
students.

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

.................................................................................................................................................. [6]

12 Generic file formats can be used when saving files.

(a) Tick three generic file formats.


Tick
(✓)

.xls

.pdf

.doc

.rtf

.sdc

.bcc

.csv

.accdb

[3]

© UCLES 2019 06_0417_12_2019_1.14 [Turn over


14

(b) Explain why generic file formats are needed.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [2]

13 (a) Describe the following terms with reference to navigation from a web page.

(i) Hyperlink

................................................................................................................................

................................................................................................................................

................................................................................................................................

................................................................................................................................ [2]

(ii) href

................................................................................................................................

................................................................................................................................

................................................................................................................................

................................................................................................................................ [2]

(b) Explain the difference between the use of relative file paths and absolute file paths in navigation
from a web page.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [4]

© UCLES 2019 06_0417_12_2019_1.14


15

14 Explain the difference between analogue data and digital data.

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

.................................................................................................................................................. [2]

15 As our use of the internet increases e-safety becomes essential.

Discuss why e-safety is needed.

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

.................................................................................................................................................. [8]

© UCLES 2019 06_0417_12_2019_1.14


16

BLANK PAGE

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable
effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will
be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge Assessment
International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at
www.cambridgeinternational.org after the live examination series.

Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of
Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge.

© UCLES 2019 06_0417_12_2019_1.14


Cambridge Assessment International Education
Cambridge International General Certificate of Secondary Education

INFORMATION AND COMMUNICATION TECHNOLOGY 0417/12


Paper 1 Written May/June 2019
MARK SCHEME
Maximum Mark: 100

Published

This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.

Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.

Cambridge International will not enter into discussions about these mark schemes.

Cambridge International is publishing the mark schemes for the May/June 2019 series for most
Cambridge IGCSE™, Cambridge International A and AS Level and Cambridge Pre-U components, and
some Cambridge O Level components.

This syllabus is regulated for use in England, Wales and Northern Ireland as a Cambridge International Level 1/Level 2 Certificate.

This document consists of 10 printed pages.

© UCLES 2019 [Turn over


0417/12 Cambridge IGCSE – Mark Scheme May/June 2019
PUBLISHED

Generic Marking Principles

These general marking principles must be applied by all examiners when marking candidate answers.
They should be applied alongside the specific content of the mark scheme or generic level descriptors
for a question. Each question paper and mark scheme will also comply with these marking principles.

GENERIC MARKING PRINCIPLE 1:

Marks must be awarded in line with:

• the specific content of the mark scheme or the generic level descriptors for the question
• the specific skills defined in the mark scheme or in the generic level descriptors for the question
• the standard of response required by a candidate as exemplified by the standardisation scripts.

GENERIC MARKING PRINCIPLE 2:

Marks awarded are always whole marks (not half marks, or other fractions).

GENERIC MARKING PRINCIPLE 3:

Marks must be awarded positively:

• marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit
is given for valid answers which go beyond the scope of the syllabus and mark scheme,
referring to your Team Leader as appropriate
• marks are awarded when candidates clearly demonstrate what they know and can do
• marks are not deducted for errors
• marks are not deducted for omissions
• answers should only be judged on the quality of spelling, punctuation and grammar when these
features are specifically assessed by the question as indicated by the mark scheme. The
meaning, however, should be unambiguous.

GENERIC MARKING PRINCIPLE 4:

Rules must be applied consistently e.g. in situations where candidates have not followed
instructions or in the application of generic level descriptors.

GENERIC MARKING PRINCIPLE 5:

Marks should be awarded using the full range of marks defined in the mark scheme for the question
(however; the use of the full mark range may be limited according to the quality of the candidate
responses seen).

GENERIC MARKING PRINCIPLE 6:

Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should
not be awarded with grade thresholds or grade descriptors in mind.

© UCLES 2019 Page 2 of 10


0417/12 Cambridge IGCSE – Mark Scheme May/June 2019
PUBLISHED

Question Answer Marks

1(a) Physical components of a computer system 1

1(b) One from: 1

Programs for controlling the operation of a computer


Programs for processing of data

1(c) One from: 1

System
Applications

1(d) Touchscreen 1

Question Answer Marks

2 4
ROM RAM HDD

It loses its data when the computer is


9
switched off.

It is classed as backing storage. 9

It stores the start-up instructions of the


9
computer.

It temporarily stores the current work of the


9
current user.

Question Answer Marks

3 RFID 2
MICR

© UCLES 2019 Page 3 of 10


0417/12 Cambridge IGCSE – Mark Scheme May/June 2019
PUBLISHED

Question Answer Marks

4(a) Temperature 1

4(b) Light 1

4(c) Pressure 1

4(d) IF(D36<D32,"Y","N") 3

1 mark for IF()


1 mark for (D36<D32,
1 mark for "Y","N")

4(e) Three from: 3

Select column F / any cell in column F


Click Insert...new column / Right click«select Insert«new column
Select cell F2 / F1
Type in Combined Time
Select text wrap

4(f) D3+E3 1

4(g) Four from: 4

Highlight B3 to F32
Click on sort
Click sort by Col F
Click on ascending order

4(h) G$3–(F4–F$3) 3
or
G$3+F$3–F4

Give 1 mark for G3


Give 1 mark for correct use of $//both values correct
Give 1 mark for –(F4–F3) / +F3–F4 / F3–F4+

Question Answer Marks

5(a) Four from: 4

The software in the smartwatch needs to be kept up to date


Loss of satellite signal can be an issue
Problems with battery failure / empty battery
Allow example for problems with battery failure e.g. loses the route
Problems with electrical storms / weather
Problems with mugging
Sunlight making the device unreadable
Using / programming the smartwatch can slow the runner down

© UCLES 2019 Page 4 of 10


0417/12 Cambridge IGCSE – Mark Scheme May/June 2019
PUBLISHED

Question Answer Marks

5(b) Two from: 2

Use in cars / lorries to calculate routes


Used in ships / aircraft to locate current position
Used in agriculture for tractor navigation
Example of Tracking systems

5(c) Three from: 3

She may be tired / breathless therefore text messaging is better than trying to
talk
A text message is sent quicker than the sending of an audio message
The text message is sent even though the receiver’s phone is turned off / out
of range / on the phone
A text message is more likely to connect as the data footprint is smaller than a
phone call

Question Answer Marks

6(a) Four from: 4

Internet is not policed


Material on the internet can be biased
Material on the internet may not be reliable
Anyone can create a website on the internet so inaccurate information can be
posted
Can visit inappropriate sites on the internet
There are more security issues when using the internet
There are more distractions when using the internet

6(b)(i) Four from: 4

Do not reply to spam emails


Use a spam email filter
Block images in HTML messages as these are used as web beacons
Unclick check boxes when buying items online
Do not sign up to commercial mailing lists

6b(ii) Four from: 4

Scan emails / attachments before opening


Use up to date anti-virus software
Do not download attachments from unknown sources
Avoid opening spam emails

© UCLES 2019 Page 5 of 10


0417/12 Cambridge IGCSE – Mark Scheme May/June 2019
PUBLISHED

Question Answer Marks

7(a)(i) Two from: 2

Workers that work less than full time / limited number of hours
This could be for fewer hours than a full working day/week
This could be for fewer days than a full working week

7(a)(ii) Two from: 2

A full time job is shared between part time / two or more workers
One continues the work when the other has left
One could work in the morning and the other in the afternoon
One could work for 3 days and the other 2 other days

7(b) Four from: 4

Staff are kept more up to date with their work


Increase in job opportunities
More accurate calculation of wages / less errors made in the calculations
Manual tasks are reduced

1 mark can be awarded for an example of new jobs created

Question Answer Marks

8 Six from: 6

Advantages
Reduces the cost of travelling to the bank
Reduces the time wasted travelling to the bank / waiting in queues
The interest rates are usually better using internet banking
Easier to shop around for the better bank accounts
Disabled people do not have to travel to the bank in order to carry out
transactions
24/7 banking
People can spend more time doing other activities rather than travelling to the
bank
Less physical robberies

Disadvantages
Less physical banks which means that people have to travel further to go to
the bank
Health risks with using the computer
Security is an issue as transactions are carried out over the internet
The user needs a reliable internet connection
More risk of pharming / phishing/fraud
Easier to make errors whilst using internet banking e.g. incorrect input
If the internet connection drops during a transaction, then there may be issues

1 mark can be awarded for a reasoned conclusion


To gain full marks both advantages and disadvantages are required

© UCLES 2019 Page 6 of 10


0417/12 Cambridge IGCSE – Mark Scheme May/June 2019
PUBLISHED

Question Answer Marks

9(a) Two from: 2

Mineral prospecting
Diagnostic systems
Chess games
Careers
Tax

9(b) 3
Tick

Interactive user interface 9

Spreadsheet

Motor

Printer

Knowledge base 9

Search engine

Actuator

Rules base 9

Question Answer Marks

10 4
Analysis Design Evaluation

Identifying the problems with


9
the current system

Deciding on testing strategies 9

Observation of workers using


9
the current system

Comparing the solution with


9
the original task requirements

© UCLES 2019 Page 7 of 10


0417/12 Cambridge IGCSE – Mark Scheme May/June 2019
PUBLISHED

Question Answer Marks

11 Six from: 6

Use animation to keep their attention


Use sound to keep them interested
Use larger font size so the text is easier to read
Use a font that is easier to read
Use a font that is suitable to the age group
Make the presentation colourful to keep their attention
More vibrant colours used
The language used needs to be simple
Short sentences should be used
The words used need to be short and simple
More images than text is needed
Slide transitions need to be used/exciting

Question Answer Marks

12(a) 3
Tick

.xls

.pdf 9

.doc

.rtf 9

.sdc

.bcc

.csv 9

.accdb

12(b) Two from: 2

Generic file formats allow the user to save files so they can be opened in
other software
To create a standard so that other software can understand the contents
Example of a file saved on one type of device / software being used on
another type e.g. mobile phone to a PC

© UCLES 2019 Page 8 of 10


0417/12 Cambridge IGCSE – Mark Scheme May/June 2019
PUBLISHED

Question Answer Marks

13(a)(i) Two from: 2

Method of accessing other resources / webpages from the current webpage


Navigation by hovering / clicking on the link
Clicking on word / phrase / image / area of page
Links one webpage to part of the same webpage

13(a)(ii) Two from: 2

An attribute
Within a hyperlink / anchor
Can be used to specify the URL of the page / resource to be used

13(b) Four from: 4

Relative file paths only show the name or file path destination of the
file//Absolute file paths gives the full web address / full path
Absolute always has the domain name//Relative does not need the domain
name
Relative finds files in the current site
If you need to find files on a different website then absolute needs to be
used//absolute starts from the root
Relative does not require a path only sub-folders

Question Answer Marks

14 Analogue data is variable/continuous // Digital data is discrete / 1 or 0 2


Analogue data can only be read by a sensor / Analogue data is the output
from a sensor // Analogue data cannot be understood by a computer //
Analogue data needs to be converted before it is read by the computer

© UCLES 2019 Page 9 of 10


0417/12 Cambridge IGCSE – Mark Scheme May/June 2019
PUBLISHED

Question Answer Marks

15 To be marked as a level of response: 8

The candidate must complete L1 to get into L2 and L2 to get into L3

Level 3 [7 – 8 marks]
Candidates will address both aspects of the question and discuss/consider
different points. The issues raised will be justified. There will be a reasoned
conclusion. The information will be relevant, clear, organised and presented in
a structured and coherent format.

Level 2 [4 – 6 marks]
Candidates will address both aspects of the question and discuss/consider
different points although development of some of the points will be limited to
one side of the argument. There will be a conclusion. For the most part the
information will be relevant and presented in a structured and coherent format.

Level 1 [1 – 3 marks]
Candidates may only address one side of the argument, and give basic points.
Answers may be simplistic with little or no relevance.

Level 0 [0 marks]
Response with no valid content

Answers may make reference to e.g.:

E-safety protects personal data from people who should not have access to it
Personal data needs to be kept safe so that others cannot use it against us
Protects sensitive data
Use of it e-safety protects vulnerable people
Protects other people’s views
Example of issues of access to personal data: blackmail / spreading rumours /
identity theft / stalking
E-safety reduces the risks when using ICT using social media sites, online
gaming users believe they are safe
E-safety trains users to be responsible on the internet
Giving out personal information can help predators to find out further details
about a person, such as where they live / where they go to school / used to
track the person
People on the internet may not be what they seem
Need to be able to block people on the internet
Need to know how to report problems on the internet
If we do not use e-safety then users are being put at risk as they will not know
the dangers
Freedom of speech can be affected Introduction of the ‘nanny’ state
If we do not apply e-safety approaches we open ourselves up to attack
Use of netiquette
Covers a number of electronic devices like, computers, tablets, mobile
phones, games consoles
An example of personal data
Example of sensitive data ethnic origin / religion / political / criminal records /
sexual orientation

© UCLES 2019 Page 10 of 10


Cambridge Assessment International Education
Cambridge International General Certificate of Secondary Education
* 3 1 7 1 2 6 2 4 6 8 *

INFORMATION AND COMMUNICATION TECHNOLOGY 0417/13


Paper 1 Theory October/November 2019
2 hours
Candidates answer on the Question Paper.
No Additional Materials are required.

READ THESE INSTRUCTIONS FIRST

Write your centre number, candidate number and name in the spaces at the top of this page and any additional
pages you use.
Write in dark blue or black pen.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.

No marks will be awarded for using brand names of software packages or hardware.
Answer all questions.

Any businesses described in this paper are entirely fictitious.

At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.

This syllabus is regulated for use in England, Wales and Northern Ireland as a Cambridge International Level 1/Level 2 Certificate.

This document consists of 13 printed pages and 3 blank pages.

DC (JC/CT) 174201/2
© UCLES 2019 [Turn over
2

1 Complete the following sentences about input and output devices, using items from the list below.

dot matrix printer driving wheel MICR motor

speaker TFT monitor touchpad wide format printer

(a) An output device that is used to produce hard copy architectural drawings is a

............................................................................................................................................. [1]

(b) An input device that is used in a virtual reality system is a

............................................................................................................................................. [1]

(c) The inbuilt input device on a laptop is a

............................................................................................................................................. [1]

(d) An output device that is designed to output music is a

............................................................................................................................................. [1]

2 Tick whether the following are optical, magnetic or solid state storage media.

optical magnetic solid state


(3) (3) (3)
Hard disk

SD card

CD ROM

Memory stick
[4]

3 A smartphone has many uses, for example making and receiving telephone calls.

Give four other uses of a smartphone.

1 .......................................................................................................................................................

2 .......................................................................................................................................................

3 .......................................................................................................................................................

4 .......................................................................................................................................................
[4]

© UCLES 2019 0417/13/O/N/19


3

4 Explain the purpose of a router.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

.................................................................................................................................................... [2]

5 A student is using her computer to do her homework.

For each of the statements below, identify the health problem most likely to be associated with the
use of a computer and a possible solution to the problem. Your answers must be different in each
case.

Health problem Possible solution


Reading from the
monitor in poor
lighting

Using a mouse for


prolonged periods
of time

Sitting too long in


one position

[6]

© UCLES 2019 0417/13/O/N/19 [Turn over


4

6 Many homes use microprocessor-controlled devices to improve people’s lifestyle. However, these
devices can also have a negative effect on lifestyle.

Explain the negative effects that microprocessor-controlled devices can have on lifestyle.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

.................................................................................................................................................... [6]

© UCLES 2019 0417/13/O/N/19


5

7 The following is an external stylesheet which contains a number of mistakes.

body {background-image:url('Camblogo.jpg');
background-color:#7g7d76

h1 {text-weight:bold;
font-size:42px
text-align:centre}

h2 {font-size:30px;
text-align:right;
text-decoration: underlined;
font-family:"Times New Roman", Times, serif}

Identify five errors which would prevent this stylesheet from working properly and, for each error,
write down a possible correction.

1 .......................................................................................................................................................

..........................................................................................................................................................

2 .......................................................................................................................................................

..........................................................................................................................................................

3 .......................................................................................................................................................

..........................................................................................................................................................

4 .......................................................................................................................................................

..........................................................................................................................................................

5 .......................................................................................................................................................

..........................................................................................................................................................
[5]

© UCLES 2019 0417/13/O/N/19 [Turn over


6

8 An examiner has created a spreadsheet to calculate his travel and hotel expenses when he
attends meetings.

Part of the spreadsheet that he has created is shown below.

A B C D E F G H I J K
1 ID Departure date Return date Destination Distance Hotel per night Total cost for hotel Travel cost
Distance Distance
2 2018/01 10/01/2019 12/01/2019 Cambridge 702 $98.20 $196.40 $175.50 threshold rate
3 2018/02 15/02/2019 18/02/2019 Coventry 400 $83.40 $250.20 $180.00 greater than 400 $0.25
4 2018/03 20/02/2019 22/02/2019 Manchester 149.8 $98.20 $196.40 $67.41 400 or less $0.45
5

If the car mileage is greater than 400 km he gets paid $0.25 per km for the whole distance otherwise
he gets paid $0.45 per km for the whole distance.

(a) Write a formula, that is easy to replicate, to be placed in cell H2 that calculates the travel cost
for the meeting. Your formula must work even when the distance rates change.

= ................................................................................................................................................

............................................................................................................................................. [7]

(b) Write a formula, that is easy to replicate, to be placed in cell G2 that calculates the total cost
for the hotel for the meeting.

= ................................................................................................................................................

............................................................................................................................................. [2]

(c) When the spreadsheet is completed the examiner will need to list the details of all the
meetings where the distance is 400 km or greater.

Explain how the examiner would use a filter to achieve this.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

© UCLES 2019 0417/13/O/N/19


7

(d) A computer can be used to model scenarios.

Explain why computer models are used instead of creating the real thing.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [4]

9 A restaurant keeps meals warm in an oven. The meals must be kept at a constant temperature.
A temperature sensor is used to check the temperature in the oven.

Describe the use of a microprocessor to control the temperature in the oven.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

.................................................................................................................................................... [4]

© UCLES 2019 0417/13/O/N/19 [Turn over


8

10 Many ATMs now allow customers to deposit cash and cheques.

(a) Describe the inputs and processing involved in depositing a cheque using an ATM.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [6]

(b) Discuss the benefits and drawbacks, to the customer, of using ATMs to deposit cheques into
a bank account.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [6]

© UCLES 2019 0417/13/O/N/19


9

11 During the analysis stage for a new computer system, the systems analyst could examine existing
documents.

(a) Name two other methods the systems analyst could use to research the current system. Give
one benefit and one drawback of each.

Method 1 ...................................................................................................................................

...................................................................................................................................................

Benefit ......................................................................................................................................

...................................................................................................................................................

Drawback ..................................................................................................................................

...................................................................................................................................................

Method 2 ...................................................................................................................................

...................................................................................................................................................

Benefit ......................................................................................................................................

...................................................................................................................................................

Drawback ..................................................................................................................................

...................................................................................................................................................
[6]

(b) When the new computer system has been produced, it will need to be tested. There are three
types of test data that can be used to test a system, normal, abnormal and extreme.

Explain what is meant by normal, abnormal and extreme test data.

Normal ......................................................................................................................................

...................................................................................................................................................

Abnormal ..................................................................................................................................

...................................................................................................................................................

Extreme ....................................................................................................................................

...................................................................................................................................................
[3]

© UCLES 2019 0417/13/O/N/19 [Turn over


10

Following testing and implementation, documentation needs to be produced.

(c) Tick three elements you would only find in technical documentation.

Tick
(3)
Program name

Glossary of terms

Frequently asked questions

Algorithm

How to print data

File structures

Error messages

List of variables
[3]

© UCLES 2019 0417/13/O/N/19


11

12 Ralph regularly uses social media websites to stay in contact with his friends.

(a) Describe four strategies that he could use to stay safe when using these websites.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................

3 ................................................................................................................................................

...................................................................................................................................................

4 ................................................................................................................................................

...................................................................................................................................................
[4]

(b) Policing the internet has been discussed for many years.

Describe three reasons why the internet has not yet been policed.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [6]

© UCLES 2019 0417/13/O/N/19 [Turn over


12

13 Explain the following terms.

(a) HTTPS ......................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

(b) URL ...........................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

14 One example of wireless communication is Bluetooth.

Describe how computers can use Bluetooth to connect to a device.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

.................................................................................................................................................... [4]

© UCLES 2019 0417/13/O/N/19


13

15 Biometrics are now commonly used to increase the security of computer system access.

Discuss the effectiveness of using biometric methods to increase security.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

.................................................................................................................................................... [8]

© UCLES 2019 0417/13/O/N/19


14

BLANK PAGE

© UCLES 2019 0417/13/O/N/19


15

BLANK PAGE

© UCLES 2019 0417/13/O/N/19


16

BLANK PAGE

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.

Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of
Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge.

© UCLES 2019 0417/13/O/N/19


Cambridge Assessment International Education
Cambridge International General Certificate of Secondary Education

INFORMATION AND COMMUNICATION TECHNOLOGY 0417/13


Paper 1 Written October/November 2019
MARK SCHEME
Maximum Mark: 100

Published

This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.

Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.

Cambridge International will not enter into discussions about these mark schemes.

Cambridge International is publishing the mark schemes for the October/November 2019 series for most
Cambridge IGCSE™, Cambridge International A and AS Level components and some Cambridge O Level
components.

This syllabus is regulated for use in England, Wales and Northern Ireland as a Cambridge International Level 1/Level 2 Certificate.

This document consists of 13 printed pages.

© UCLES 2019 [Turn over


0417/13 Cambridge IGCSE – Mark Scheme October/November
PUBLISHED 2019

Generic Marking Principles

These general marking principles must be applied by all examiners when marking candidate answers.
They should be applied alongside the specific content of the mark scheme or generic level descriptors
for a question. Each question paper and mark scheme will also comply with these marking principles.

GENERIC MARKING PRINCIPLE 1:

Marks must be awarded in line with:

• the specific content of the mark scheme or the generic level descriptors for the question
• the specific skills defined in the mark scheme or in the generic level descriptors for the question
• the standard of response required by a candidate as exemplified by the standardisation scripts.

GENERIC MARKING PRINCIPLE 2:

Marks awarded are always whole marks (not half marks, or other fractions).

GENERIC MARKING PRINCIPLE 3:

Marks must be awarded positively:

• marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit
is given for valid answers which go beyond the scope of the syllabus and mark scheme,
referring to your Team Leader as appropriate
• marks are awarded when candidates clearly demonstrate what they know and can do
• marks are not deducted for errors
• marks are not deducted for omissions
• answers should only be judged on the quality of spelling, punctuation and grammar when these
features are specifically assessed by the question as indicated by the mark scheme. The
meaning, however, should be unambiguous.

GENERIC MARKING PRINCIPLE 4:

Rules must be applied consistently e.g. in situations where candidates have not followed
instructions or in the application of generic level descriptors.

GENERIC MARKING PRINCIPLE 5:

Marks should be awarded using the full range of marks defined in the mark scheme for the question
(however; the use of the full mark range may be limited according to the quality of the candidate
responses seen).

GENERIC MARKING PRINCIPLE 6:

Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should
not be awarded with grade thresholds or grade descriptors in mind.

© UCLES 2019 Page 2 of 13


0417/13 Cambridge IGCSE – Mark Scheme October/November
PUBLISHED 2019

Question Answer Mark

1(a) Wide format printer 1

1(b) Driving wheel 1

1(c) Touch pad 1

1(d) Speaker 1

Question Answer Mark

2 4
optical magnetic Solid state
(3) (3) (3)

Hard disk 3

SD card 3

CD ROM 3

Memory stick 3

Question Answer Mark

3 Four from, for example: 4


GPS/location services/sat nav
Telephone banking
Social networking
Emails sending/receiving
Streaming videos/music
Making/receiving text messaging
Taking photos
Play music

Question Answer Mark

4 Two from: 2
Connects a LAN to a WAN
Allows devices to connect to the internet
Forwards data packets
Sends/receives data packets

© UCLES 2019 Page 3 of 13


0417/13 Cambridge IGCSE – Mark Scheme October/November
PUBLISHED 2019

Question Answer Mark

5 6
Health problem Possible solution

Reading from the Headache/eye strain Use anti-glare screen


monitor in poor Turn the screen 90 degrees to
lighting the window
Improve the lighting

Using a mouse for RSI/pains in Use a wrist rest


prolonged periods fingers/wrist/Carpel Regular breaks
of time Tunnel Syndrome Use a trackerball/ergonomic
mouse
Hand exercises

Sitting too long in Back ache/neck ache Use a footrest


one position Taking breaks
Use an ergonomic/adjustable
chair
Sit with correct posture/straight
back

Maximum of one mark per box

Question Answer Mark

6 Six from: 6
This can lead to an unhealthy lifestyle as people rely on ready-made foods
People depend on the devices for all their chores making them lazy
Devices carry out the manual tasks leading to lack of exercise/sedentary
People lose their household skills in carrying out tasks
There is a danger that devices that use the internet can have security issues
If the internet crashes/electricity outage, then the device may not operate but the
user would not know
Smart fridges automatically re-order food as it is used but seasonal changes may
lead to wrong food being ordered
Possible health issues from the devices, e.g. microwave leakage

© UCLES 2019 Page 4 of 13


0417/13 Cambridge IGCSE – Mark Scheme October/November
PUBLISHED 2019

Question Answer Mark

7 Five from: 5
Matched pairs

background-color:#7g7d76
the colour is not correct i.e. g

{text-weight:bold;
Text-weight should be font-weight

font-size:42px
; missing from the end of the command

text-decoration: underlined;
underlined should be underline;

text-align: centre}
should be text-align: center}

background-color:#7g7d76
missing bracket/add } after the 6

© UCLES 2019 Page 5 of 13


0417/13 Cambridge IGCSE – Mark Scheme October/November
PUBLISHED 2019

Question Answer Mark

8(a) IF(E2>400,E2*K$3,E2*K$4) 7

One mark for IF()


One mark for E2>400,
One mark for E2*K$3,
One mark for E2*K$4

One mark for correct use of absolute referencing/$ K3 and K4 only


One mark for correct order operator, then TRUE then FALSE
One mark for use of K3 and K4 rather than numeric values K3 not 0.25, K4 not
0.45

8(b) (C2-B2)*F2 2

One mark for (C2-B2)


One mark for *F2

8(c) Two from: 2


Highlight Column E
Select filter
Select number filter greater than or equal to/untick all the cells that are less than
400
Type in 400

8(d) Four from: 4


Fewer errors in final version of real item as errors would have been resolved in
model
Saves money as it saves on resources
Safer to run a computer model rather than risking human life
Different scenarios/what ifs can be carried out which may happen in real life/to
experiment
Impossible to try out the real thing due to cost/time
Time scales are reduced, the real thing could take a long time to operate

Question Answer Mark

9 Four from: 4
Data from the temperature sensor is sent to the microprocessor
The microprocessor has a stored/preset value
Data from the temperature sensor is compared with the preset value
If the reading is higher than the preset value«
«microprocessor sends signal«
«to the actuator to turn the oven off
If the reading is lower than the preset value signal is sent to the oven to turn/keep
it on
Continual process

© UCLES 2019 Page 6 of 13


0417/13 Cambridge IGCSE – Mark Scheme October/November
PUBLISHED 2019

Question Answer Mark

10(a) Maximum five from each of: 6

Inputs:
Insert card/input account number
Enter PIN
Select deposit
Select the language
Select cheque
Select Account
Enter cheque
Select ‘confirm’ amount

Processing:
Checks the cheque is the right way up
Scans the cheque
Uses OCR to read the font/handwriting
Attempts to read the handwriting
Reads the details on the cheque using MICR
If the cheque cannot be read then stores the cheque for later checking
If it can be read then accept cheque
Checks if information on the cheque is correct

© UCLES 2019 Page 7 of 13


0417/13 Cambridge IGCSE – Mark Scheme October/November
PUBLISHED 2019

Question Answer Mark

10(b) Maximum five from each of: 6

Benefits:
Human validation is needed to check the amount/signature which improves
security
May be closer than the nearest bank branch therefore saves time than going to
the bank
Can deposit cheques 24/7
Saves money in travelling to the bank
Extra security due to using a card and PIN
Less queues in the bank
A picture receipt is given of cheques
May be more ATMs than banks

Drawbacks:
If the cheque is torn then it may not be read by the ATM
The handwriting on the cheque may be difficult to read therefore delaying the
processing
Human validation is needed to check the amount/signature this leads to delays in
processing
People may not be happy in using this method for example for security
reasons/prefer human touch
Not all ATMs use this method
May need a card/PIN to operate
Stolen cheques from the customer could be processed more easily
ATM may not be working
ATM may reject certain types of cheque
Confusion for the customer using the ATM as some ATMs may have a different
process
Cannot get human help if it goes wrong

One mark can be awarded for a reasoned conclusion

© UCLES 2019 Page 8 of 13


0417/13 Cambridge IGCSE – Mark Scheme October/November
PUBLISHED 2019

Question Answer Mark

11(a) Interview 6
Benefit one from:
The user is more open and honest with the answers
Questions can be added to/extended
Questions can be modified
Can see body language/facial expressions

Drawback one from:


Time consuming to complete all the interviews
Expensive due to analyst’s time
Not anonymous so interviewee less likely to answer honestly
Can give answers that they think the interviewer wants
May not be available at the time the analyst is available

Questionnaire
Benefit one from:
Faster to complete all questionnaires
Cheaper to produce questionnaires than pay/employ an interviewer
Individuals can remain anonymous therefore they are more truthful
More people can answer the questionnaire than can be interviewed
They can fill it in in their own time

Drawback one from:


Tend not to be popular with users
Too inflexible cannot ask follow up questions
Users tend to exaggerate their responses as they are anonymous
As its anonymous people may not take it seriously
Cannot expand on their answers/limited in their responses

Observation
Benefit one from:
Reliable data
Better overall view of the whole system/all the inputs and outputs of the system
Inexpensive method as the analyst is only watching the workers

Drawback:
Description of the Hawthorne effect

11(b) Normal 3
Data is within the range of acceptability

Abnormal
One from:
Data outside the range of acceptability
Data that is of an incorrect type

Extreme
Data that is on the boundary/limit of acceptability

© UCLES 2019 Page 9 of 13


0417/13 Cambridge IGCSE – Mark Scheme October/November
PUBLISHED 2019

Question Answer Mark

11(c) 3
Tick
(9)

Program name

Glossary of terms

Frequently asked questions

Algorithm 9

How to print data

File structures 9

Error messages

List of variables 9

© UCLES 2019 Page 10 of 13


0417/13 Cambridge IGCSE – Mark Scheme October/November
PUBLISHED 2019

Question Answer Mark

12(a) Four from: 4


Don't give out personal information such as his address or phone number
Don’t send pictures of himself to anyone, especially indecent pictures
Don't open/click on suspicious links/adverts on social media
Don't become online ‘friends’ with people he does not know/don’t contact/chat to
people you do not know
Never arrange to meet someone in person who he has only met online
If anything he sees or reads online worries him, he should tell someone about
it/block them
Use appropriate language
Set security so only friends can contact

12(b) Three from with an expansion, for example: 6


Material found on the internet can be found elsewhere
People can make their own decisions on what they read on the internet«
«reduces their freedom
The internet is international«
«therefore there could be problems liaising with other police forces
A new police force would need to be set up«
«costing, a lot of money
The laws regarding the use of the internet are not consistent«
«different law in states/countries
It goes against freedom of speech/human rights«
«comments could be blocked
Individual police forces/multi-country police«
«internet is policed locally
What is classed as illegal; may be different in other countries«
«therefore difficult to police
Some medical websites could be classed as illegal«
«but could be legal elsewhere/could be classed as pornography
The mass of information increases daily«
«therefore difficult to check
People tend to be anonymous«
«therefore difficult to find the culprits

© UCLES 2019 Page 11 of 13


0417/13 Cambridge IGCSE – Mark Scheme October/November
PUBLISHED 2019

Question Answer Mark

13(a) Two from: 2


Hypertext Transfer Protocol Secure
Set of communication rules
Used when transferring data across the internet
Uses encryption/SSL/TLS

13(b) Two from: 2


Uniform Resource Locator
Resource/website address
Used by web browsers
To access/link web pages/retrieve files

Question Answer Mark

14 Four from: 4
Bluetooth sends and receives radio waves
Enable Bluetooth
Bluetooth searches for the other devices
Pairs the two devices
Devices automatically detect and connect to each other
Used for short distances
Randomly picks channels to use one of 79 channels can be used
Uses spread spectrum frequency hopping
Constantly change the channels to stop interference with other communication
systems
Used for low-bandwidth applications, e.g. streaming music
Used when the speed of transmission is not critical
Bluetooth can be used to create a secure Wireless Personal Area Network

© UCLES 2019 Page 12 of 13


0417/13 Cambridge IGCSE – Mark Scheme October/November
PUBLISHED 2019

Question Answer Mark

15 To be marked as a level of response: 8

The candidate must complete L1 to get into L2 and L2 to get into L3

Level 3 (7–8 marks):


Candidates will address both aspects of the question and discuss/consider
different benefits/drawbacks. The issues raised will be justified. There will be a
reasoned conclusion. The information will be relevant, clear, organised and
presented in a structured and coherent format.

Level 2 (4–6 marks):


Candidates will address both aspects of the question and discuss/consider
different benefits/drawbacks although development of some of the points will be
limited to one side of the argument. There will be a conclusion. For the most part
the information will be relevant and presented in a structured and coherent
format.

Level 1 (1–3 marks):


Candidates may only address one side of the argument, and give basic benefits
and drawbacks. Answers may be simplistic with little or no relevance.

Level 0 (0 marks)
Response with no valid content/

Answers may make reference to, e.g.:

The user has to be present to enter the computer system


Non-biometric systems allow others to enter system by stealing
passwords/security cards
Biometrics not affected by strong electromagnetic fields but a swipe card could be
Relative higher level of accuracy
Passwords need to be strong to reach same level of accuracy
Passwords can be forgotten whereas biometrics cannot
Encryption does not stop hackers
Firewalls do not stop hackers only unauthorised systems
Firewalls can be turned off
The more complex the password the more chance of it being forgotten
Shoulder surfing passwords can lead to illegal entry but not with biometrics
If fingerprint damaged/use of dark glasses/swipe card damaged/password
forgotten then data entry can be stopped
Intrusive as personal details have to be stored in biometrics
Can be a slower entry using biometrics as more checking is carried out
Security can be lowered with biometrics due to problems in reading data
Harder to set up the biometric system
Takes longer to add new people to the system
Biometrics can use a lot of memory to store the data
Signature/voice entry – person needs to write the signature the same each
time/speak the same each time
Voice can be recorded by mobile device and then used to enter system
Security issues if data from signatures are used in other ways
Examples:
Retina/iris scan/face recognition/fingerprint/hand print

© UCLES 2019 Page 13 of 13


Cambridge Assessment International Education
Cambridge International General Certificate of Secondary Education
* 2 7 2 1 3 7 6 6 5 5 *

INFORMATION AND COMMUNICATION TECHNOLOGY 0417/12


Paper 1 Theory October/November 2019
2 hours
Candidates answer on the Question Paper.
No Additional Materials are required.

READ THESE INSTRUCTIONS FIRST

Write your centre number, candidate number and name in the spaces at the top of this page and any additional
pages you use.
Write in dark blue or black pen.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.

No marks will be awarded for using brand names of software packages or hardware.
Answer all questions.

Any businesses described in this paper are entirely fictitious.

At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.

This syllabus is regulated for use in England, Wales and Northern Ireland as a Cambridge International Level 1/Level 2 Certificate.

This document consists of 14 printed pages and 2 blank pages.

DC (JC/CT) 174146/4
© UCLES 2019 [Turn over
2

1 A student is creating a test plan for a validation routine. The input to be tested is an integer between
1 and 10. Tick whether the following are the most appropriate examples of normal data, abnormal
data or extreme data.

normal abnormal extreme


(✓) (✓) (✓)
one

10

3.2
[4]

2 Tick whether the following statements relate to a command line interface (CLI) or a graphical user
interface (GUI).

CLI GUI
(✓) (✓)
This interface does not need a pointing device

This is an example of a WIMP interface

The user has to type in instructions

This interface takes up more memory in the computer


[2]

3 Complete the following sentences, using the most appropriate items from the list.

An app Coding A data projector A linker Pen drive

Quantum A TFT monitor A touch screen Vision Web cam


cryptography enhancement

(a) ...................................................................... is an example of system software.

(b) ...................................................................... is an example of an output device that can also


act as an input device.

(c) ...................................................................... projects an image inside the headset of the user.

(d) ...................................................................... is a form of encryption of data.


[4]

© UCLES 2019 0417/12/O/N/19


3

4 This diagram shows a smartphone.

(a) Name three input devices found on a smartphone.

1 ................................................................................................................................................

2 ................................................................................................................................................

3 ................................................................................................................................................
[3]

(b) Name one storage device which is available in a smartphone.

............................................................................................................................................. [1]

(c) Name two output devices found in a smartphone.

1 ................................................................................................................................................

2 ................................................................................................................................................
[2]

5 People are buying laptop computers rather than desktop computers.

Give four advantages of using a laptop computer rather than a desktop computer.

1 .......................................................................................................................................................

..........................................................................................................................................................

2 .......................................................................................................................................................

..........................................................................................................................................................

3 .......................................................................................................................................................

..........................................................................................................................................................

4 .......................................................................................................................................................

..........................................................................................................................................................
[4]
© UCLES 2019 0417/12/O/N/19 [Turn over
4

6 The computer technician at Tawara School is planning to set up ten new computers to be placed
in the staffroom to form a network. The network will not be connected to the internet. Assume the
school currently has no hardware or software for this network.

(a) State the steps that the technician would need to take to set up this network.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [4]

(b) The teachers have asked the head teacher if they can access the internet. The computer
technician will need to attach a router to the network.

Explain how a router works.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [3]

© UCLES 2019 0417/12/O/N/19


5

(c) The school plans to connect some teachers’ laptops to this new network using WiFi.

Describe, in detail, how data is transmitted from the laptops to the new network.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [4]

A B C

(a) Describe the steps required to transform shape A into shape B.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

(b) Describe the steps required to transform shape A into shape C.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

© UCLES 2019 0417/12/O/N/19 [Turn over


6

8 Files can be saved in a generic file format.

(a) Explain why generic file formats are needed.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

(b) Complete the following sentences, using the most appropriate file format from the list below.

.css .csv .doc .gif .htm

.pdf .png .rar .sdb .xls

(i) ............................................... is a stylesheet used in the creation of web pages. [1]

(ii) ............................................... is a generic archive file format. [1]

(iii) ............................................... is a generic file format that stores still and moving images.
[1]

(iv) ............................................... takes data in the form of tables and saves it as text. [1]

© UCLES 2019 0417/12/O/N/19


7

9 The director of a small airport has asked his airport manager to look into the punctuality of
departures. The manager obtained details of some of the departures on one day. He has created
a spreadsheet, which contains both the airport data and the times of departure. Part of the
spreadsheet is shown.

A B C D E F
1 Airport code Airport name
2 ALG Algiers
3 BKK Bangkok
4 BXW Bawean
5 DEL Delhi
6 DOH Doha
7 CPH Copenhagen
8 GVA Geneva
9
Scheduled Actual time of Minutes Airport Destination Late / on
departure departure late code time
10 time
11 14:00 15:13 73 CPH Copenhagen L
12 14:15 17:40 205 ALG Algiers L
13 14:45 14:58 13 DOH Doha L
14 14:45 14:48 3 DOH Doha L
15 14:50 15:05 15 BKK Bangkok L
16 14:50 14:50 0 GVA Geneva OT
17 14:50 14:59 9 BXW Bawean L
18

(a) Write a formula that would be entered in cell F11 to display the letter L if the value in C11 is
greater than 0 or the letters OT if it is not.

= ................................................................................................................................................

............................................................................................................................................. [3]

(b) Write a formula, without using named ranges, that would be entered in cell E11. The formula
must be easy to replicate. It should display the name of the airport, using the Airport code
from cell D11 and the list of Airport names.

= ................................................................................................................................................

............................................................................................................................................. [6]

© UCLES 2019 0417/12/O/N/19 [Turn over


8

(c) The airport manager is producing a report of his findings to present to the director. The data
will change from day to day.

Before he can produce the findings he needs to enter a formula in cell F19 to count the
number of late departures from the airport.

A B C D E F
Scheduled
Actual time of Minutes Airport Destination Late / on
departure
departure late code time
10 time
11 14:00 15:13 73 CPH Copenhagen L
12 14:15 17:40 205 ALG Algiers L
13 14:45 14:58 13 DOH Doha L
14 14:45 14:48 3 DOH Doha L
15 14:50 15:05 15 BKK Bangkok L
16 14:50 14:50 0 GVA Geneva OT
17 14:50 14:59 9 BXW Bawean L
18
19 Late 6
20 On Time 1
21

Write the formula, without using a named range, to be entered in cell F19.

= ................................................................................................................................................

............................................................................................................................................. [3]

(d) Name the most appropriate type of chart/graph he could produce to show the proportion of
late departures and those that leave on time.

............................................................................................................................................. [1]

© UCLES 2019 0417/12/O/N/19


9

10 A company is purchasing a new printer. A choice has to be made between using a laser printer or
a dot matrix printer.

Discuss the advantages and disadvantages of using dot matrix printers rather than laser printers.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

.................................................................................................................................................... [6]

© UCLES 2019 0417/12/O/N/19 [Turn over


10

11 Microprocessor-controlled devices in the home have had positive effects on people’s lifestyles.
One of the advantages of using these devices is that we can now set a cooker to switch on whilst
we are out so that we arrive home to a cooked meal.

(a) Apart from the use of cookers, describe the advantages of using microprocessor-controlled
devices in the home.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [6]

(b) Some home devices can be controlled remotely when away from home. These home devices
need to be connected to the internet.

Describe the disadvantages of connecting home devices to the internet.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [6]

© UCLES 2019 0417/12/O/N/19


11

12 A sports club is planning a new computerised record keeping system to replace their manual
system.

(a) A systems analyst recommends that new software is required. The analyst could either write
the software or purchase it off the shelf.

Give two advantages to the sports club of the analyst writing the software.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................
[2]

(b) Explain why it is better to use a computer to store the records rather than the manual system.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [6]

© UCLES 2019 0417/12/O/N/19 [Turn over


12

(c) The systems analyst recommends that the system is implemented using direct changeover,
but the sports club feel that parallel running should be used.

Describe direct changeover and parallel running, giving a different benefit and drawback of
using each method of implementation.

Direct changeover ....................................................................................................................

...................................................................................................................................................

Benefit ......................................................................................................................................

...................................................................................................................................................

Drawback ..................................................................................................................................

...................................................................................................................................................

Parallel running .........................................................................................................................

...................................................................................................................................................

Benefit ......................................................................................................................................

...................................................................................................................................................

Drawback ..................................................................................................................................

...................................................................................................................................................
[6]

© UCLES 2019 0417/12/O/N/19


13

13 Many companies that make microprocessors use robots to carry out the task rather than using
humans.

(a) Give three advantages of using robots to carry out the task.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................

3 ................................................................................................................................................

...................................................................................................................................................
[3]

(b) Give three disadvantages of using robots to carry out the task.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................

3 ................................................................................................................................................

...................................................................................................................................................
[3]

© UCLES 2019 0417/12/O/N/19 [Turn over


14

14 The internet is not controlled by any one single country. The internet is a very good communication
system, but it can also be seen as a security problem.

Discuss the benefits and drawbacks of policing the internet.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

.................................................................................................................................................... [8]

© UCLES 2019 0417/12/O/N/19


15

BLANK PAGE

© UCLES 2019 0417/12/O/N/19


16

BLANK PAGE

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.

Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of
Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge.

© UCLES 2019 0417/12/O/N/19


Cambridge Assessment International Education
Cambridge International General Certificate of Secondary Education

INFORMATION AND COMMUNICATION TECHNOLOGY 0417/12


Paper 1 Written October/November 2019
MARK SCHEME
Maximum Mark: 100

Published

This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.

Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.

Cambridge International will not enter into discussions about these mark schemes.

Cambridge International is publishing the mark schemes for the October/November 2019 series for most
Cambridge IGCSE™, Cambridge International A and AS Level components and some Cambridge O Level
components.

This syllabus is regulated for use in England, Wales and Northern Ireland as a Cambridge International Level 1/Level 2 Certificate.

This document consists of 10 printed pages.

© UCLES 2019 [Turn over


0417/12 Cambridge IGCSE – Mark Scheme October/November
PUBLISHED 2019

Generic Marking Principles

These general marking principles must be applied by all examiners when marking candidate answers.
They should be applied alongside the specific content of the mark scheme or generic level descriptors
for a question. Each question paper and mark scheme will also comply with these marking principles.

GENERIC MARKING PRINCIPLE 1:

Marks must be awarded in line with:

• the specific content of the mark scheme or the generic level descriptors for the question
• the specific skills defined in the mark scheme or in the generic level descriptors for the question
• the standard of response required by a candidate as exemplified by the standardisation scripts.

GENERIC MARKING PRINCIPLE 2:

Marks awarded are always whole marks (not half marks, or other fractions).

GENERIC MARKING PRINCIPLE 3:

Marks must be awarded positively:

• marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit is
given for valid answers which go beyond the scope of the syllabus and mark scheme, referring to
your Team Leader as appropriate
• marks are awarded when candidates clearly demonstrate what they know and can do
• marks are not deducted for errors
• marks are not deducted for omissions
• answers should only be judged on the quality of spelling, punctuation and grammar when these
features are specifically assessed by the question as indicated by the mark scheme. The
meaning, however, should be unambiguous.

GENERIC MARKING PRINCIPLE 4:

Rules must be applied consistently e.g. in situations where candidates have not followed instructions
or in the application of generic level descriptors.

GENERIC MARKING PRINCIPLE 5:

Marks should be awarded using the full range of marks defined in the mark scheme for the question
(however; the use of the full mark range may be limited according to the quality of the candidate
responses seen).

GENERIC MARKING PRINCIPLE 6:

Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should
not be awarded with grade thresholds or grade descriptors in mind.

© UCLES 2019 Page 2 of 10


0417/12 Cambridge IGCSE – Mark Scheme October/November
PUBLISHED 2019

Question Answer Marks

1 4
normal abnormal extreme
(3) (3) (3)

one 3

4 3

10 3

3.2 3

Question Answer Marks

2 2
CLI GUI
(3) (3)

This interface does not need a pointing device 3

This is an example of a WIMP interface 3

The user has to type in instructions 3

This interface takes up more memory in the computer 3

Two marks for 4 correct ticks


One mark for 2 or 3 correct ticks
Zero marks for 0 or 1 tick

Question Answer Marks

3(a) A linker 1

3(b) A touch screen 1

3(c) Vision enhancement 1

3(d) Quantum cryptography 1

© UCLES 2019 Page 3 of 10


0417/12 Cambridge IGCSE – Mark Scheme October/November
PUBLISHED 2019

Question Answer Marks

4(a) Three from: 3


Buttons
Touch screen
Microphone
Camera

4(b) Flash memory card reader 1

4(c) Two from: 2


Speaker/headphone
Touch screen
LED bulb
Buzzer

Question Answer Marks

5 Four from: 4
A laptop is more portable
A laptop is made in one unit whereas a desktop has several items of hardware
therefore fewer items to lose
The footprint of the laptop tends to be smaller
Lower power consumption
Uses battery power so can be used in more places

Question Answer Marks

6(a) Four from: 4


Purchase the hardware
Purchase/download the software
Set up the hardware
Configure all the hardware
Load the software onto the computers
Purchase network licences
Set up staff privileges
Purchase a hub/switch
Allocate/set IP addresses
Install network cards
Set up file/printer sharing
Set up the users

6(b) Three from: 3


A router receives/sends data packets
Routers inspect the data packets received
Checks the destination IP address
Checks the IP address using the stored routing table
It uses a routing table which lists all the different routes to other networks
Data packet is sent to the appropriate/next switch/router
Uses the MAC address to send to correct computer/device
Uses the IP address to work out the best/quickest route

© UCLES 2019 Page 4 of 10


0417/12 Cambridge IGCSE – Mark Scheme October/November
PUBLISHED 2019

Question Answer Marks

6(c) Four from: 4


Laptops transmit data by radio waves «
« to a wireless transmitter/Wireless Access Point
The Wireless Access Point converts these radio waves into data «
« and passes it to the switch«
« data transmitted to the destination computer
Explanation of handshaking
Explanation of authentication using Wireless security key
Explanation of obtaining an IP address from the network

Question Answer Marks

7(a) Two from: 2


Rotate the shape 90 degrees anti-clockwise/left
Resize the shape/reduced the size of the shape
Keeping the aspect ratio

7(b) Two from: 2


Crop the image
Invert/fill the image black

Question Answer Marks

8(a) Two from 2


Allows files to be opened in other software
Allows files to be opened on other systems/platforms/manufacturers
To create a standard so that other software can understand

8(b)(i) .css 1

8(b)(ii) .rar 1

8(b)(iii) .gif 1

8(b)(iv) .csv 1

© UCLES 2019 Page 5 of 10


0417/12 Cambridge IGCSE – Mark Scheme October/November
PUBLISHED 2019

Question Answer Marks

9(a) IF(C11>0,"L","OT") 3

IF() – One mark


C11>0, – One mark
"L","OT" – One mark

9(b) VLOOKUP(D11,A$2:B$8,2,FALSE) 6

VLOOKUP() – One mark


(D11, – One mark
,A2:B8, – One mark
$ – One mark for correct use
,2, – One mark
,FALSE) – One mark

9(c) COUNTIF(F11:F17,"L") 3

COUNTIF() – One mark


(F11:F17, – One mark
,"L") – One mark

9(d) Pie chart 1

Question Answer Marks

10 Disadvantages: 6
Maximum five from:
A dot matrix printer is noisier when it prints therefore would not be used in an
office
Printing is slower using a dot matrix
Dot matrix prints line by line, whereas a laser is a page printer
Dot matrix printers cannot easily handle large print jobs, whereas laser printers
can
Printer ribbon is more expensive that toner
A dot matrix has more limited colour facilities as it uses a ribbon
Print quality is lower than a laser printer

Advantages:
A dot matrix printer can be used is harsh conditions
A dot matrix uses a ribbon and ink which is far safer than toner which gives off
ozone
A dot matrix uses multipart stationery therefore carbon copies can be made as
it prints
Can use continuous stationery therefore less chance of the paper running out
during a print job

© UCLES 2019 Page 6 of 10


0417/12 Cambridge IGCSE – Mark Scheme October/November
PUBLISHED 2019

Question Answer Marks

11(a) Six from: 6


People no longer have to do manual tasks at home
No need to stay at home whilst washing is carried out/people can go out
shopping/to work and come home to washed clothes
People have more time to spend on leisure activities/shopping/socialising
Increased sense of security
Smart fridges can be used to improve healthy lifestyle/order fresh food/cuts
waste
Heating/air conditioning can be set remotely/the user can arrive home to a
warm/cool house
Saves fuel as the heating/air conditioning is not on all day
Reduces injuries by using microprocessor-controlled lights outside

11(b) Six from: 6


Security problem of others gaining access to devices like burglar
alarms/security cameras/people can view your house/switch off the alarm
More expensive than manual systems to repair/purchase
Problem of disconnection stopping the device/if the internet/electricity goes
down then the device may not operate
If the controller is out of range, then the device cannot be operated
Interference with the signal can stop the device/walls/weather can interfere with
the signal
The lack of privacy of the data being sent to and from the device/hackers can
find your details by hacking devices
If you lose the controller/then this can cause problems in the home and cannot
operate the system
In a smart fridge online shopping lists are created automatically these may
have to be overwritten/as it will order anything removed from the fridge whether
it is needed or not
Devices can be taken over and malware installed/hacked
If the controller is not powered up, then system may not operate

Question Answer Marks

12(a) Two from: 2


Software is specially designed for the sports club so that if meets their needs
The software only has the features needed by the sports club therefore uses
less memory
Less functions in the software making it easier to use/less help needed
Customised support from the systems analyst
Can be changed when the sports club needs it changing

12(b) Six from: 6


Faster to search for a record
Faster to retrieve records
Data can easily be used in other applications
Example mail merge to send out reminders
Faster/easier to add/edit/delete records
Saves physical space in the office as there are no paper records stored
Cheaper to store data as there is less paper used
There would be fewer errors as there is no manual checking of paper records
Safeguards to reduce errors can be built into the software
Several people can use the data at the same time

© UCLES 2019 Page 7 of 10


0417/12 Cambridge IGCSE – Mark Scheme October/November
PUBLISHED 2019

Question Answer Marks

12(c) Direct changeover: 6


The old system is stopped overnight and the new system is started
immediately

Benefit one from:


The benefits are immediate
Costs are reduced as there is only one set of staff
Less likely to fail as it has been thoroughly tested

Drawback:
If the new system fails there is no system to fall back onto/no backup

Parallel running:
The old and new systems run side by side until the new system takes over

Benefit one from:


The old system can be used as a back up
Staff can be trained gradually/get used to the new system

Drawback one from:


More time consuming as the data needs to be entered into two systems
More chance of error on data entry
More costly as there are two sets of staff

Question Answer Marks

13(a) Three from: 3


Robots can work in environments where humans would have difficulty
Robots can work 24/7
Robots are not paid/cheaper in the long run
Productivity is higher
Fewer mistakes are made/greater accuracy
More consistent
Allow humans to do more skilled work/other tasks

13(b) Three from: 3


Expensive to maintain/repair
Expensive to purchase
Replace labour, leads to unemployment
Description of de-skilling

© UCLES 2019 Page 8 of 10


0417/12 Cambridge IGCSE – Mark Scheme October/November
PUBLISHED 2019

Question Answer Marks

14 To be marked as a level of response: 8

The candidate must complete L1 to get into L2 and L2 to get into L3

Level 3 (7–8 marks):


Candidates will address both aspects of the question and discuss/consider
different benefits/drawbacks. The issues raised will be justified. There will be
a reasoned conclusion. The information will be relevant, clear, organised and
presented in a structured and coherent format.

Level 2 (4–6 marks):


Candidates will address both aspects of the question and discuss/consider
different benefits/drawbacks although development of some of the points will
be limited to one side of the argument. There will be a conclusion. For the most
part the information will be relevant and presented in a structured and coherent
format.

Level 1 (1–3 marks):


Candidates may only address one side of the argument, and give basic
benefits and drawbacks. Answers may be simplistic with little or no relevance.

Level 0 (0 marks):
Response with no valid content

Answers may make reference to, e.g.:

Benefits:
Prevents illegal material being posted/shown
Examples racist/prejudice, pornographic
Dark net would be banned
Information that states how to make bombs. how to hack would be banned
Help to prevent children from gaining access to undesirable/pornography
websites
Help to stop incorrect information being found on the net/fake news
Help to stop people that send messages in riots
Helps to prevent discussion groups that incite hatred, racism, etc.
Ensure copyright laws are enforced
Safeguards the vulnerable

© UCLES 2019 Page 9 of 10


0417/12 Cambridge IGCSE – Mark Scheme October/November
PUBLISHED 2019

Question Answer Marks

14 Drawbacks:
Information on illegal material/how to make bombs, etc. can be found in other
resources
It would be very expensive to police/set up a police group
It would be very difficult to police data being sent from one country to another
It would be very difficult to set standard rules as many countries/states have
different rules
Laws already exist in different parts of the world to police internet data in that
country, would these laws need to still exist.
Freedom of speech/human rights is restricted
Material found on the internet can be found elsewhere
The internet is international therefore there could be problems liaising with
other police forces
A new police force would need to be set up costing a lot of money
Individual police forces/multi-country police internet locally
What is classed as illegal; may be different in other countries therefore difficult
to police
Some medical websites could be classed as illegal but could be legal
elsewhere/could be classed as pornography
The mass of information increases daily therefore difficult to check
People tend to be anonymous therefore difficult to find the culprits

© UCLES 2019 Page 10 of 10



Cambridge IGCSE

INFORMATION AND COMMUNICATION TECHNOLOGY 0417/12


*7108723569*

Paper 1 Theory May/June 2021


2 hours

You must answer on the question paper.

No additional materials are needed.

INSTRUCTIONS
• Answer all questions.
• Use a black or dark blue pen.
• Write your name, centre number and candidate number in the boxes at the top of the page.
• Write your answer to each question in the space provided.
• Do not use an erasable pen or correction fluid.
• Do not write on any bar codes.
• You may use an HB pencil for any diagrams, graphs or rough working.

INFORMATION
• The total mark for this paper is 100.
• The number of marks for each question or part question is shown in brackets [ ].
• No marks will be awarded for using brand names of software packages or hardware.

This document has 16 pages. Any blank pages are indicated.

06_0417_12_2021_1.2
© UCLES 2021 [Turn over
2

1 Tick (✓) whether the following are examples of control, measurement or modelling applications.

control measurement modelling


(✓) (✓) (✓)

Personal finance

Weather forecasting

Burglar alarms

Weather stations

[4]

2 (a) Circle two items that could be used to output data directly from a smartphone.

Blu-ray disc microphone mouse screen


SD card sensor speaker webcam

[2]

(b) One of the uses of a smartphone is the sending and receiving of emails.

Describe four other uses of a smartphone.

1.........................................................................................................................................

...........................................................................................................................................

2.........................................................................................................................................

...........................................................................................................................................

3.........................................................................................................................................

...........................................................................................................................................

4.........................................................................................................................................

...........................................................................................................................................

[4]

© UCLES 2021 06_0417_12_2021_1.2


3

3 Tick (✓) the most appropriate storage medium that should be used in each scenario.

Magnetic tape RAM ROM


Scenario
(✓) (✓) (✓)

To store the current instructions in use by a


computer

To back up data from a school network server

To store data temporarily

To store the start-up instructions of a


computer

[4]

4 Complete the sentences below using the most appropriate word from the list.

cookies hacking pharming phishing


smishing spam spyware virus

(a) The act of gaining unauthorised access to a computer system is called

........................................................................................................................................... [1]

(b) The software that gathers data by monitoring key presses on a user’s keyboard is called

........................................................................................................................................... [1]

(c) A fake text message, that could contain a link, sent to a mobile phone is called

........................................................................................................................................... [1]

© UCLES 2021 06_0417_12_2021_1.2 [Turn over


4

5 Petr has set up a database for a science project on planets in the solar system. Part of the database
is shown.

ID Name_of_planet Number_of_moons Orbital_period Rings Gravity Type_of_planet First_observed

4 Mars 2 1.88 N 0.38 Regular 1610

5 Ceres 0 4.61 N 0.27 Dwarf 1801

7 Saturn 62 29 Y 1.16 Gas Giant 1610

9 Neptune 14 165 Y 1.21 Gas Giant 1846

10 Pluto 5 248 N 0.62 Dwarf 1930

11 Haumea 1 309 N 0.401 Dwarf 2004

(a) When Petr was designing his database, he had to set the data types for each field.
Complete the design table below by filling in the data types for each named field. Use the most
appropriate data type. Each data type must be different. For any numeric field, specify the type
of number.

Field name Data type

Number_of_moons

Orbital_period

Rings

Name_of_planet

[4]

© UCLES 2021 06_0417_12_2021_1.2


5

(b) Operators such as AND, OR, NOT, LIKE, >, >=, <, <=, =, <> can be used to search Petr’s
planet database. The search criteria for all the gas giant planets with more than 20 moons
would look like this:

Type_of_planet = ''Gas Giant'' AND Number_of_moons > 20

Write down the search criteria that will produce a list of planets that are not gas giants but
have at least one moon and were first observed after 1800.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [7]

(c) Write down the names of the planets that are not gas giants but have at least one moon and
were first observed after 1800.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [2]

(d) Petr has copied the data from the Orbital_period field into a spreadsheet. The data for the
orbital period for Mars, 1.88, is stored in cell A2. In cell B2 he has entered a function of:

ROUND(A2,0)

Explain in detail the function used in cell B2.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [2]

© UCLES 2021 06_0417_12_2021_1.2 [Turn over


6

6 Humans can send unmanned aircraft into storms to collect wind speeds and temperature data. The
unmanned aircraft have sensors attached to them which send the data back to computers at the
weather station. The computers analyse the data.

Previously the aircraft was manned and all the data was collected and flown back to the weather
station.

Discuss the advantages and disadvantages of using the unmanned aircraft rather than using the
manned aircraft.

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

.................................................................................................................................................. [8]

© UCLES 2021 06_0417_12_2021_1.2


7

7 The owner of Tawara Hotels is planning a new computerised booking system. There are ten Tawara
Hotels throughout the world. The current booking system allows people to book rooms in any of
the Tawara Hotels. He has employed a systems analyst to research the current system and then
install the new system.

(a) When analysing the current booking system, the systems analyst must identify the user
requirements.

Explain why it is important for the systems analyst to do this.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [3]

(b) Tick (✓) the relevant stage of the systems life cycle for each of the following activities.

Development
Activity Analysis and testing Evaluation
(✓) (✓) (✓)

Identifying the problems with the current


system

Comparing the solution with the original


task requirements

Create the file structure

Identify limitations to the new system and


improvements to be made

[4]

© UCLES 2021 06_0417_12_2021_1.2 [Turn over


8

(c) Before the new booking system is installed, the systems analyst has to decide on a method
of implementation. One method of implementation is pilot running.

Name two other methods of implementation and describe two benefits of each.

Name.................................................................................................................................

Benefit 1............................................................................................................................

...........................................................................................................................................

Benefit 2............................................................................................................................

...........................................................................................................................................

Name.................................................................................................................................

Benefit 1............................................................................................................................

...........................................................................................................................................

Benefit 2............................................................................................................................

...........................................................................................................................................

[6]

© UCLES 2021 06_0417_12_2021_1.2


9

8 Students often use IT equipment; therefore it is important to have a good physical safety strategy.

Evaluate your own use of IT equipment, in terms of physical safety, and describe the strategies
you will need to minimise the potential physical safety risks.

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

.................................................................................................................................................. [6]

9 (a) Describe two uses of a company intranet.

1.........................................................................................................................................

...........................................................................................................................................

2.........................................................................................................................................

...........................................................................................................................................

[2]

© UCLES 2021 06_0417_12_2021_1.2 [Turn over


10

(b) Social networking is used to communicate with friends; this is one use of the internet.

Describe four other uses of the internet.

1.........................................................................................................................................

...........................................................................................................................................

2.........................................................................................................................................

...........................................................................................................................................

3.........................................................................................................................................

...........................................................................................................................................

4.........................................................................................................................................

...........................................................................................................................................

[4]

© UCLES 2021 06_0417_12_2021_1.2


11

(c) A major part of the everyday use of the internet is social networking. Currently some social
networks are not policed. The owners of a website have full discretion on what material is
removed and what is allowed to be kept.

Discuss the benefits and drawbacks of policing social networking sites.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [8]

© UCLES 2021 06_0417_12_2021_1.2 [Turn over


12

10 Describe the advantages, to both the company and employees, of changing work patterns due to
the introduction of computers.

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

.................................................................................................................................................. [6]

11 When an email is sent, it could have a digital certificate attached.

Explain why a digital certificate is required. Include in your answer items that could be found in a
digital certificate.

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

.................................................................................................................................................. [5]

© UCLES 2021 06_0417_12_2021_1.2


13

12 A search engine can be used to find information on the internet.

(a) Describe the disadvantages of using a search engine to find information rather than typing in
a web address.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [4]

(b) A student is writing a project on rare animals. He uses a search engine to find information
about the animals from the internet. He is concerned about the reliability of some of the
information he has found.

Explain how he would evaluate the reliability of this information.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [6]

© UCLES 2021 06_0417_12_2021_1.2 [Turn over


14

The student plans to create a table, using word processing software, to display the information he
has found out about the animal.

The completed table will look like this:

Name of animal Tiger quoll

Scientific name Dasyurus maculatus

Pouched No

Habitat Australia

Conservation status Threatened

(c) Explain how the student can create a table to enter this data.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [2]

(d) The student has saved a picture from the internet of a tiger quoll.

Explain how he could create a new row above the Pouched row and place the picture into the
right-hand cell of this new row.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [4]

© UCLES 2021 06_0417_12_2021_1.2


15

BLANK PAGE

© UCLES 2021 06_0417_12_2021_1.2


16

BLANK PAGE

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable
effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will
be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge Assessment
International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at
www.cambridgeinternational.org after the live examination series.

Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of
Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge.

© UCLES 2021 06_0417_12_2021_1.2


Cambridge IGCSE™

INFORMATION AND COMMUNICATION TECHNOLOGY 0417/12


Paper 1 Written May/June 2021
MARK SCHEME
Maximum Mark: 100

Published

This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.

Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.

Cambridge International will not enter into discussions about these mark schemes.

Cambridge International is publishing the mark schemes for the May/June 2021 series for most Cambridge
IGCSE™, Cambridge International A and AS Level components and some Cambridge O Level components.

This document consists of 10 printed pages.

© UCLES 2021 [Turn over


0417/12 Cambridge IGCSE – Mark Scheme May/June 2021
PUBLISHED

Generic Marking Principles

These general marking principles must be applied by all examiners when marking candidate answers.
They should be applied alongside the specific content of the mark scheme or generic level descriptors
for a question. Each question paper and mark scheme will also comply with these marking principles.

GENERIC MARKING PRINCIPLE 1:

Marks must be awarded in line with:

• the specific content of the mark scheme or the generic level descriptors for the question
• the specific skills defined in the mark scheme or in the generic level descriptors for the question
• the standard of response required by a candidate as exemplified by the standardisation scripts.

GENERIC MARKING PRINCIPLE 2:

Marks awarded are always whole marks (not half marks, or other fractions).

GENERIC MARKING PRINCIPLE 3:

Marks must be awarded positively:

• marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit
is given for valid answers which go beyond the scope of the syllabus and mark scheme,
referring to your Team Leader as appropriate
• marks are awarded when candidates clearly demonstrate what they know and can do
• marks are not deducted for errors
• marks are not deducted for omissions
• answers should only be judged on the quality of spelling, punctuation and grammar when these
features are specifically assessed by the question as indicated by the mark scheme. The
meaning, however, should be unambiguous.

GENERIC MARKING PRINCIPLE 4:

Rules must be applied consistently, e.g. in situations where candidates have not followed
instructions or in the application of generic level descriptors.

GENERIC MARKING PRINCIPLE 5:

Marks should be awarded using the full range of marks defined in the mark scheme for the question
(however; the use of the full mark range may be limited according to the quality of the candidate
responses seen).

GENERIC MARKING PRINCIPLE 6:

Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should
not be awarded with grade thresholds or grade descriptors in mind.

© UCLES 2021 Page 2 of 10


0417/12 Cambridge IGCSE – Mark Scheme May/June 2021
PUBLISHED

Question Answer Marks

1 4
control measurement modelling

Personal

finance

Weather

forecasting

Burglar alarms 

Weather

stations

Question Answer Marks

2(a) Speaker 2
Screen

2(b) Four from, for example: 4


Order goods from the internet
Use it to surf/search the internet
GPS
Telephone/internet banking
Make/receive phone calls
Instant message
Streaming of music
Streaming videos
Text messaging
Taking photos

Question Answer Marks

3 4
Scenario Magnetic RAM ROM
tape

To store the current instructions in



use by a computer

To back up data from a school



network server

To store data temporarily 

To store the start-up instructions of



a computer

© UCLES 2021 Page 3 of 10


0417/12 Cambridge IGCSE – Mark Scheme May/June 2021
PUBLISHED

Question Answer Marks

4(a) Hacking 1

4(b) Spyware 1

4(c) Smishing 1

Question Answer Marks

5(a) 4
Field name Data type

Number_of_moons Numeric: Integer

Orbital_period Numeric: Decimal

Rings Boolean

Name_of_planet Text

5(b) Type_of_planet<>"Gas Giant" AND Number_of_moons >=1 AND 7


First_observed >1800

Only two ANDs correctly placed – 1 mark

Type_of_planet – 1 mark
<> "Gas Giant" – 1 mark

Number_of _moons – 1 mark


>=1 – 1 mark

First_observed – 1 mark
>1800 – 1 mark

5(c) Pluto 2
Haumea

5(d) It would take the value of A2 – 1 mark 2


Changes the value into an integer/zero decimal places – 1 mark

© UCLES 2021 Page 4 of 10


0417/12 Cambridge IGCSE – Mark Scheme May/June 2021
PUBLISHED

Question Answer Marks

6 Eight from: 8
Advantages
Less expensive to fly the aircraft into the storm
Less risk to life as there is no flight crew
It can be flown closer to the storm
Time taken to receive the data is shorter as don’t have to land the aircraft
before sending data
Results are processed immediately
On board computers can analyse the data continuously
Readings can be taken more frequently

Disadvantages
The sensors could malfunction and there is no way of repairing them easily
You can lose the signal due to the electrical charges in the storm
Less responsive
Slower to react
May go out of range

To gain full marks there needs to be advantages and disadvantages

Question Answer Marks

7(a) Three from: 3


The systems analyst is creating a system that is just for the client
Important to meet the needs of the user; so it is customised
Reduces the costs if the new system matches the existing hardware and
software
More efficient system is produced that does what the users require

7(b) 4
Activity Analysis Development Evaluation
and testing

Identifying the problems



with the current system

Comparing the solution


with the original task 
requirements

Create the file structure 

Identify limitations to the


new system and

improvements to be
made

© UCLES 2021 Page 5 of 10


0417/12 Cambridge IGCSE – Mark Scheme May/June 2021
PUBLISHED

Question Answer Marks

7(c) Direct changeover – 1 mark 6


Two from:
Benefits are immediate
Costs less as fewer staff are needed
Costs less as only one system is required
Less likelihood of malfunction as system is fully tested

Parallel running – 1 mark


Two from:
If new system fails, old system can be used as a back up
Possible to gradually train staff

Phased changeover – 1 mark


Two from:
If the new system fails, only one part is affected
Easier to ensure that part of the system is fully operational before moving
onto the next part
Possible to train staff in one part of the system, therefore less costly than
parallel
Possible to gradually train staff

© UCLES 2021 Page 6 of 10


0417/12 Cambridge IGCSE – Mark Scheme May/June 2021
PUBLISHED

Question Answer Marks

8 Matched pairs from, for example: 6

I always check whether wires are damaged/lose when I plug in my computer


equipment
...This will reduce electrocution

I always check whether sockets are safe/not broken when I plug in


equipment...
...This will reduce electrocution

I only plug in one plug per socket


...This reduces the chance of fire

I make sure all wires are fastened to the wall/placed under carpets/in
ducts//Use wireless...
...This reduces tripping hazards

Check and install circuit breakers...


...This reduces electrocution/fire hazard

Make sure no drinks or food is brought near to computers...


...This reduces electrocution

I make sure computer vents are not covered...


...This reduces the chances of fire

I make sure all IT equipment is safely in the middle of desks//I make sure
strong tables are used to store IT equipment/I don’t store IT equipment on
high shelves...
...To stop them falling on me and causing an injury

Question Answer Marks

9(a) Two from: 2


Send/receiving emails
Send/receive attachments/files
Internal file transfer within the company
Allows the creation of extranets
Surf internal information/webpages
Sharing/use of applications/resources

9(b) Four from, with descriptions: 4


Email
Use of the web
Newsgroups
Online chat
Streaming
Internet telephone
Online conferencing
Gaming
File transfer

© UCLES 2021 Page 7 of 10


0417/12 Cambridge IGCSE – Mark Scheme May/June 2021
PUBLISHED

Question Answer Marks

9(c) Benefits 8
Max four:
Can reduce cyber bullying/hate speech/sexual harassment
Can reduce social media from being used for illegal activities
Can reduce the ability to incite violence/trolling
Could prevent people from being subjected to inappropriate messages
Can reduce illegal/inappropriate images

Drawbacks
Freedom of speech is reduced
Would be very difficult to police as there is a massive amount of information
Different rules in different countries and social media crosses borders
Very costly to create an effective deterrent
Could force individuals to use other un-policed methods of communication
Who decides what is acceptable and what is not acceptable
Privacy issues as people checking could read messages
Difficult to police as users can be anonymous

To gain full marks there needs to be benefits and drawbacks

Question Answer Marks

10 Six from: 6
Advantages to employees
Staff are more flexible when they work so they can carry out other activities
Staff are more contented as they can work hours which suit their home life
They can start later/earlier so they avoid rush hour in the morning, so they do
not arrive stressed
They can start earlier/work later to avoid rush hour in evening so cuts travel
time
Compressed hours can lead to longer holidays/weekends therefore staff
more refreshed
Part time working allows people with other commitments to work
Job sharing allows a piece of work to be completed using the skills set of
more than one worker therefore cutting stress
Working from home allows employees to balance their home life

Advantages to the company


Working from home allows the company to employ people from around the
world
Working from home allows the company to save costs by not needing large
offices
Helps employers retain their employees…
…therefore cutting training/recruitment costs
Flexi-time allows company offices to remain open longer
Job sharing reduces training costs

To gain full marks there needs to be advantages to both the employees


and the company

© UCLES 2021 Page 8 of 10


0417/12 Cambridge IGCSE – Mark Scheme May/June 2021
PUBLISHED

Question Answer Marks

11 Max four from: 5


Adds a level of security
Verifies the email comes from a known and trusted source
Provides the receiver with a means of reply/private key
Used for initialising secure SSL connections between web browsers and
web servers

Max three from:


Details of the owner of the digital certificate
Serial number
Public key
Digital signature
Subject name
Valid from
Valid to//Expiry date

Question Answer Marks

12(a) Four from: 4


Information overload
Web sites at the top of the list may not be relevant
May be more irrelevant information
Search engines may not include all web pages
If a website loads faster, it is given priority
Search engine company may be paid to display certain web pages

12(b) Six from: 6


Check the author of the website as anybody can publish their understanding
of a topic
Check if the website has excessive advertising
Check the content/advertising of its own products of a website to see if it
biased
Check the final part of the domain name of the URL
Example .ac, .gov, .org
Check if site is endorsed by reliable/reputable people/organisations
Check if it has links to other reliable sites
Check if it has testimonials/reviews
Check if the author’s credentials are good
Check if information is comparable to other information from reliable
authenticated experts
Check if the date of the last update was a long time ago
Check if website has excessive spelling and grammar mistakes
Can compare information from other sites to see if it is reliable

12(c) Two from: 2


Select the position for the table
Click on Insert then table
Select/type in 2 columns and 5 rows
Type in the data

© UCLES 2021 Page 9 of 10


0417/12 Cambridge IGCSE – Mark Scheme May/June 2021
PUBLISHED

Question Answer Marks

12(d) Max three from: 4


Highlight Scientific name row
Right click select insert
Click Insert new row below

Or

Highlight Pouched row


Right click select insert
Click Insert new row above

Max three from


Click on right hand cell in the row
Click insert…pictures
Locate/select picture
Insert the picture
Format the picture

© UCLES 2021 Page 10 of 10



Cambridge IGCSE

INFORMATION AND COMMUNICATION TECHNOLOGY 0417/13


*8050692282*

Paper 1 Theory May/June 2021


2 hours

You must answer on the question paper.

No additional materials are needed.

INSTRUCTIONS
• Answer all questions.
• Use a black or dark blue pen.
• Write your name, centre number and candidate number in the boxes at the top of the page.
• Write your answer to each question in the space provided.
• Do not use an erasable pen or correction fluid.
• Do not write on any bar codes.
• You may use an HB pencil for any diagrams, graphs or rough working.

INFORMATION
• The total mark for this paper is 100.
• The number of marks for each question or part question is shown in brackets [ ].
• No marks will be awarded for using brand names of software packages or hardware.

This document has 20 pages. Any blank pages are indicated.

06_0417_13_2021_1.7
© UCLES 2021 [Turn over
2

1 Tick (✓) whether the following statements refer to Backing storage, RAM or ROM.

Backing
storage RAM ROM
(✓) (✓) (✓)

This is temporary storage used for the application


being executed.

This is volatile memory.

An example of this storage is an SSD.

This stores the start-up instructions for the


computer.

[4]

2 Circle two jobs where there has been an increase in employment as a direct result of the introduction
of computers.
Delivery drivers for
Car production workers Cleaning staff Medical staff
retail stores
Payroll workers Secretaries Teachers Website designers

[2]

3 A mobile phone is used for communications, either for making phone calls or text messaging.

Chang is planning an expedition to the Southern Alps in New Zealand. There is often a limited
mobile phone signal in these areas. He has set his phone up so that if there is an emergency he
can communicate with the rescue teams using text messaging rather than making a phone call.

Give two advantages of using text messaging in this way.

1 ................................................................................................................................................

..................................................................................................................................................

2 ................................................................................................................................................

..................................................................................................................................................

[2]

© UCLES 2021 06_0417_13_2021_1.7


3

4 Tick (✓) whether the following descriptions of analysing a system refer to Interviews, Observation
or Questionnaires.

Interviews Observation Questionnaires


Description
(✓) (✓) (✓)

This method gives a more reliable overview


of the whole system.

This is more time-consuming than the other


methods.

Questions on this method cannot be


expanded upon when being asked.

With this method the worker cannot remain


anonymous.

[4]

5 Complete the sentences using the most appropriate item from the list.

blog cookie email fax


search engine social media web browser wiki

(a) A piece of software that allows a user to display a web page is called a

........................................................................................................................................... [1]

(b) A personal internet journal is called a

........................................................................................................................................... [1]

(c) A web application that allows a group of people to edit the content is called a

........................................................................................................................................... [1]

© UCLES 2021 06_0417_13_2021_1.7 [Turn over


4

6 Susan is creating a database about cars and needs to save it in the shared area (S:) on the school
network. It will be stored in the folder ICT which is contained in the IGCSE folder. She needs to
save the file with a file name that is different from file names used by other students in the group.

(a) Write down a suitable file name for the file so that the teacher can easily find Susan’s work
and identify its contents. The file name should not contain spaces.

...........................................................................................................................................

........................................................................................................................................... [1]

(b) Write down the file path which Susan would use to store the file in the correct folder.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [2]

(c) Susan plans to work on her database at home. However, the database is very large so her
teacher has told her that it needs to be reduced in size. She will then be able to attach it to an
email so she can send it home.

Explain why the file size would need to be reduced.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [2]

© UCLES 2021 06_0417_13_2021_1.7


5

7 A family has purchased a wireless router for use in their home to allow their devices to be connected
via WiFi to form a wireless local area network (WLAN).

(a) When the family purchased the wireless router they were advised to change the default
password.

Explain why they should change the default password.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [2]

(b) Describe the process of using WiFi to connect to a WLAN.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [4]

© UCLES 2021 06_0417_13_2021_1.7 [Turn over


6

(c) Their son produces large complex diagrams on his desktop computer at home. He needs to
be able to access the diagrams when he is at university. Even if reduced in file size, the
diagrams would be too large to send using email.

Describe in detail how he could transfer the diagrams from his home desktop computer to be
able to access them at university, without using additional hardware.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [4]

(d) One of the parents in the family works for a government department and sends sensitive data
from their home computer to the office.The data is encrypted before being sent to ensure it is
harder to understand if it is intercepted.

Describe four other preventative measures that could be taken to avoid network security
issues.

1.........................................................................................................................................

...........................................................................................................................................

2.........................................................................................................................................

...........................................................................................................................................

3.........................................................................................................................................

...........................................................................................................................................

4.........................................................................................................................................

...........................................................................................................................................

[4]

© UCLES 2021 06_0417_13_2021_1.7


7

8 Many teachers feel that monitoring student progress is an important part of the teaching and learning
process.

Describe how the features of a spreadsheet can be used by a teacher to help monitor student
progress.

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

.................................................................................................................................................. [6]

© UCLES 2021 06_0417_13_2021_1.7 [Turn over


8

9 One way of communicating with other people is to use emails. It is very important that when you
send and receive emails you are aware of esafety.

Evaluate your own use of email in terms of esafety and describe the strategies you will need to
minimise the potential esafety risks.

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

.................................................................................................................................................. [8]

© UCLES 2021 06_0417_13_2021_1.7


9

10 Aimi works for a shop that sells toys. She is setting up a relational database of the stock in the
shop. She has started designing the database. Aimi has written down the questions that are asked
about each toy and needs to produce appropriate field names from them. An example of the type
of data that is to be stored is shown.

What is the toy? Tawara Doll

Who manufactured the toy? Tinky

What year was it manufactured? 2020

What price was it bought for? $12.99

(a) Complete the design table below by filling in an appropriate field name for each question. Each
field name must be different. Field names must not include spaces.

Question Field name

What is the toy?

Who manufactured the toy?

What year was it manufactured?

What price was it bought for?

[4]

© UCLES 2021 06_0417_13_2021_1.7 [Turn over


10

(b) When Aimi created the whole database one of the fields was set as integer. However, as data
is entered Aimi realises that the field should have been set to two decimal places.

Describe the steps that need to be taken, by Aimi, to change the field from an integer to a
decimal. This field will be set to two decimal places.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [4]

(c) Aimi created a relational database but could have created a flat file database.

Discuss the advantages and disadvantages of using a relational database rather than a flat
file database.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [6]

© UCLES 2021 06_0417_13_2021_1.7


11

11 Tawara College is setting up a new website for its older students. The website will publicise the
events in the college, as well as revision and sporting activities. The headteacher wants the website
to be attractive to the older students and it must meet their needs.

Before the website can be produced the needs of the audience have to be taken into account.

Analyse the needs of this audience.

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

.................................................................................................................................................. [8]

© UCLES 2021 06_0417_13_2021_1.7 [Turn over


12

12 The director of a zoo is writing a document about wallabies. He has taken an image of some
wallabies (Fig. 12.1) and is planning the layout of the pages which will include part of the image.
The image he plans to use is shown in Fig. 12.2.

Fig. 12.1

Fig. 12.2

(a) Name the editing technique that was used to change Fig. 12.1 to Fig. 12.2.

........................................................................................................................................... [1]

© UCLES 2021 06_0417_13_2021_1.7


13

(b) The director will include images and information about the wallabies in the document. Each
page will be set out in 2 columns with a line between them.

(i) Describe the steps taken to create the columns. Assume the software has been loaded
and the text has been entered.

................................................................................................................................

................................................................................................................................

................................................................................................................................

................................................................................................................................

................................................................................................................................

................................................................................................................................ [3]

© UCLES 2021 06_0417_13_2021_1.7 [Turn over


14

(ii) Describe the steps taken to add the image as shown.

................................................................................................................................

................................................................................................................................

................................................................................................................................

................................................................................................................................

................................................................................................................................

................................................................................................................................

................................................................................................................................

................................................................................................................................ [4]

© UCLES 2021 06_0417_13_2021_1.7


15

(c) As the document is being written for the zoo it needs to conform to the corporate house style.

Explain what is meant by corporate house style.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [4]

© UCLES 2021 06_0417_13_2021_1.7 [Turn over


16

13 A student is looking for information on the internet for his school project. He has found a number
of web pages that are useful.

(a) Explain the following terms when referring to web pages:

(i) Bookmark

................................................................................................................................

................................................................................................................................

................................................................................................................................

................................................................................................................................ [2]

(ii) Anchor

................................................................................................................................

................................................................................................................................

................................................................................................................................

................................................................................................................................ [2]

(iii) Hyperlink

................................................................................................................................

................................................................................................................................

................................................................................................................................

................................................................................................................................ [2]

(b) The student has found a website that is very useful and is planning to bookmark it.

Describe the steps he will need to take to set up a bookmark for the website.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [2]

© UCLES 2021 06_0417_13_2021_1.7


17

14 Magnetic tapes are used in organisations for backing up data.

Describe the advantages and disadvantages of using magnetic tapes rather than flash memory for
backing up data.

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

.................................................................................................................................................. [6]

15 Streaming movies and music is replacing downloading or purchasing a physical copy of the files.

Describe the advantages and disadvantages of streaming files rather than using other methods.

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

.................................................................................................................................................. [4]

© UCLES 2021 06_0417_13_2021_1.7


18

BLANK PAGE

© UCLES 2021 06_0417_13_2021_1.7


19

BLANK PAGE

© UCLES 2021 06_0417_13_2021_1.7


20

BLANK PAGE

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable
effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will
be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge Assessment
International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at
www.cambridgeinternational.org after the live examination series.

Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of
Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge.

© UCLES 2021 06_0417_13_2021_1.7


Cambridge IGCSE™

INFORMATION AND COMMUNICATION TECHNOLOGY 0417/13


Paper 1 Written May/June 2021
MARK SCHEME
Maximum Mark: 100

Published

This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.

Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.

Cambridge International will not enter into discussions about these mark schemes.

Cambridge International is publishing the mark schemes for the May/June 2021 series for most Cambridge
IGCSE™, Cambridge International A and AS Level components and some Cambridge O Level components.

This document consists of 10 printed pages.

© UCLES 2021 [Turn over


0417/13 Cambridge IGCSE – Mark Scheme May/June 2021
PUBLISHED

Generic Marking Principles

These general marking principles must be applied by all examiners when marking candidate answers.
They should be applied alongside the specific content of the mark scheme or generic level descriptors
for a question. Each question paper and mark scheme will also comply with these marking principles.

GENERIC MARKING PRINCIPLE 1:

Marks must be awarded in line with:

• the specific content of the mark scheme or the generic level descriptors for the question
• the specific skills defined in the mark scheme or in the generic level descriptors for the question
• the standard of response required by a candidate as exemplified by the standardisation scripts.

GENERIC MARKING PRINCIPLE 2:

Marks awarded are always whole marks (not half marks, or other fractions).

GENERIC MARKING PRINCIPLE 3:

Marks must be awarded positively:

• marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit
is given for valid answers which go beyond the scope of the syllabus and mark scheme,
referring to your Team Leader as appropriate
• marks are awarded when candidates clearly demonstrate what they know and can do
• marks are not deducted for errors
• marks are not deducted for omissions
• answers should only be judged on the quality of spelling, punctuation and grammar when these
features are specifically assessed by the question as indicated by the mark scheme. The
meaning, however, should be unambiguous.

GENERIC MARKING PRINCIPLE 4:

Rules must be applied consistently, e.g. in situations where candidates have not followed
instructions or in the application of generic level descriptors.

GENERIC MARKING PRINCIPLE 5:

Marks should be awarded using the full range of marks defined in the mark scheme for the question
(however; the use of the full mark range may be limited according to the quality of the candidate
responses seen).

GENERIC MARKING PRINCIPLE 6:

Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should
not be awarded with grade thresholds or grade descriptors in mind.

© UCLES 2021 Page 2 of 10


0417/13 Cambridge IGCSE – Mark Scheme May/June 2021
PUBLISHED

Question Answer Marks

1 4
Backing RAM ROM
storage

This is temporary storage used for the



application being executed.

This is volatile memory. 

An example of this storage is an SSD. 

This stores the startup instructions for



the computer.

Question Answer Marks

2 Delivery drivers for retail stores 2


Website designers

Question Answer Marks

3 Two from: 2
He may be tired/injured therefore text messaging is easier than trying to talk
The text message is sent even though the sender’s phone is in limited signal
strength
Limited signal strength can result in a break of voice
A text message is quicker to send

Question Answer Marks

4 4
Interviews Observation Questionnaires

This method gives a more


reliable overview of the whole 
system.

This is more time consuming



than the other methods.

Questions on this method


cannot be expanded upon 
when being asked.

With this method the worker



cannot remain anonymous.

Question Answer Marks

5(a) Web browser 1

© UCLES 2021 Page 3 of 10


0417/13 Cambridge IGCSE – Mark Scheme May/June 2021
PUBLISHED

Question Answer Marks

5(b) Blog 1

5(c) Wiki 1

Question Answer Marks

6(a) Example: Susan_car_database 1

6(b) S:\IGCSE\ICT\ 2

\IGCSE – 1 mark
\ICT\ – 1 mark

The overall answer must be in this order

6(c) Two from: 2


The larger it is the longer to transmit the email
Some email companies set a limit on attachment file size
The time to upload/download would increase with a large file

Question Answer Marks

7(a) Two from: 2


So that other people cannot access the router using the known default
password
As it is wireless the password could be cracked from outside easily and then
used for free by others
So that people cannot make changes to/access personal data on the router
It would increase security of the data

7(b) Four from: 4


The computer/device sends data to its wireless adapter
The data is converted into radio waves
The radio waves are transmitted
A wireless adapter receives the radio waves
Radio waves are converted into data
The computer initiates a handshake with the wireless router
The wireless router responds
Establishes a session/pairing
Wireless router checks the password/key is correct
Data is transmitted
User has to enter a password/passkey/automatic entry of key for known
connections

7(c) Four from: 4


Create a cloud storage account
Ensure sufficient storage in the cloud account
Log into the cloud at home
Upload/transfer the diagrams from his home computer to the cloud
At university: access/login to his cloud storage account
At university: download/access the stored diagrams

© UCLES 2021 Page 4 of 10


0417/13 Cambridge IGCSE – Mark Scheme May/June 2021
PUBLISHED

Question Answer Marks

7(d) Four from: 4


Install security devices/firewalls
Use a VPN
Install security software/anti-virus/anti-spyware
Set up security settings in the router/operating system
Data backup in case of data loss/corruption
Restrict access to the network infrastructure
Train the family in the safe and secure use of the equipment
Not opening emails/attachments from unknowns/phishing emails
Not downloading files from unknowns/phishing emails
Use a dongle to restrict use of software

Question Answer Marks

8 Six from: 6
Student progress can be shown over time using graphs
Comparisons between students can be shown using graphs
Comparisons with archive data can be shown using graphs
Conditional formatting can be used to show how a student is performing
compare to other students or past performance
Data can be sorted to show the best performers in the class
Calculate average marks to enable comparisons
Automatic reporting results to parents
Filtering students to show those above/below a threshold

© UCLES 2021 Page 5 of 10


0417/13 Cambridge IGCSE – Mark Scheme May/June 2021
PUBLISHED

Question Answer Marks

9 Four matched pairs: 8


I never send personal data to people I do not know ...
... because people can use it against me
… as other people can access my personal details

I do not reply by using reply button unless I know the person ...
... because it may be a scam

I use a list of known email addresses ...


... so I don’t accidently send it to the wrong email address

I check before opening an email/email attachment ...


... because it might be a phishing attack

I scan both the email and attachment ...


... in order to avoid viruses

I never send images of myself to people I do not know ...


... so they cannot recognise me in the street

I do not set auto reply to my email system ...


... as this could alert a spammer that the email is active

I use email filtering ...


... this stops spam emails

I always report any phishing emails ...


... so the authorities can take action

I change my email password regularly ...


... so that others cannot access my email account

I use a strong password …


… so that others cannot access my email account

I logout of email after I have finished using it ...


... to stop others gaining access to my emails

I keep my password safe …


… so that others cannot access my account

To gain full marks at least three matched pairs are required

© UCLES 2021 Page 6 of 10


0417/13 Cambridge IGCSE – Mark Scheme May/June 2021
PUBLISHED

Question Answer Marks

10(a) 4
Question Field name (Examples)

What is the toy? Name_of_toy

Who manufactured the toy? Manufacturer

What year was it manufactured? Year

What price was it bought for? Buying_price

10(b) Four from: 4


Open the table
Select Design View
Select the field
Select field type
Select from the drop down list – double
Click decimal places
Type in 2

10(c) Six from 6


Advantages
Data does not need to be entered a second time as tables are used
Records cannot be duplicated but a flat file cannot stop this
Saves time when entering data
More efficient storage as data is only stored once
Simpler to delete/modify details
Complex queries can be carried out
Complex reports can be created
Better security as some tables can be made confidential
Avoids inconsistent records
More data independence
Less inconsistency of data
More ability to cater for future requirements

Disadvantages
More complex than a flat file database as more tables are required
Takes more time to set up
More of a reduction in performance if many tables are needed
Slower extraction of data
Less robust due to broken keys and records//Each table requires a key field
and relationships to other tables
Needs specialist personnel to setup the database
More processing power needed for complex queries
A relational database is more complex to understand that a flat file database

To gain full marks there needs to be advantages and disadvantages

© UCLES 2021 Page 7 of 10


0417/13 Cambridge IGCSE – Mark Scheme May/June 2021
PUBLISHED

Question Answer Marks

11 Eight from: 8
There needs to be emoticons/clipart to grab the attention
The content needs to be relevant to improve their knowledge
There must be a balance of information and pictures with more information
than pictures
The use of white space is less important
More hyperlinks to related web pages
Fonts must be clear and readable
The interface must be simple, clear and intuitive
Slideshows, videos and images providing more information
High contrast background
The students need to be constantly engaged
Needs to be interactive
The tone of the website needs to be casual
The website needs to be able to work on all platforms especially mobile ones
The content needs to be kept fresh and updated

Question Answer Marks

12(a) Cropping/crop/cut 1

12(b)(i) Three from: 3


Highlight the body text
Select layout/page set up
Select columns
Select more columns
Select two columns
Click line between
Save the document

12(b)(ii) Four from: 4


Click insert …
… select picture from file
Locate the image
Load the image
Right click and list menu …
… click format
Format the image
Position the image
Click wrap text
Save the document

© UCLES 2021 Page 8 of 10


0417/13 Cambridge IGCSE – Mark Scheme May/June 2021
PUBLISHED

Question Answer Marks

12(c) Two from: 4


Used to make sure that all documents and other materials from an
organisation have consistency
Set of rules which state how all documents and written communication from
an organisation should be formatted
Use of branding

Three from:
Use of corporate/same colours
Same font
Same style of font
Margins and white space look similar
Graphics are similar
Logos are the same
Language used is the same on all documents within the organisation
Position of the images are the same

Question Answer Marks

13(a)(i) Two from: 2


Saved shortcut
Directs the browser to a specific web page
It stores the title, URL, and favicon of the corresponding page
Allows the user to easily access favourite locations on the Web

13(a)(ii) Two from: 2


The anchor is a link/placeholder/reference point
The anchor links with another part of the web page

13(a)(iii) Two from: 2


Word/phrase/image
When the hyperlink is clicked
Links to another document/page/website/top/bottom of the page

13(b) Two from: 2


Open the website
Click on the address bar/URL
Select CTRL-D/click on the bookmark/favourite icon/star/add to
favourites//Drag URL to bookmarks bar
Type in/change the name
Add the bookmark

© UCLES 2021 Page 9 of 10


0417/13 Cambridge IGCSE – Mark Scheme May/June 2021
PUBLISHED

Question Answer Marks

14 Six from: 6
Advantages
Less expensive per GB/gigabyte of memory
Not as easily lost, as larger in size

Disadvantages
Data access time is slower
Data transfer rate is slower
Affected by magnetic fields
They have moving parts therefore less robust
Read and write is more noisy
Less compact that flash memory
Harder to transfer to other devices
Requires a special reader

To gain full marks there needs to be advantages and disadvantages

Question Answer Marks

15 Four from: 4
Advantages
Files can be larger therefore it can save physical storage space
More likely to get the music you need
More likely to get more up to date music
Can be accessed in more places as only need the internet
Don’t need physical storage space
Don’t need optical drives to view/listen to movie/audio
Can be viewed on mobile devices with internet connection
Copyright owners have more control over who can watch the movie/listen to
the audio as no physical copy exists to be copied/pirated
Don’t have to wait for the whole/large file to be downloaded before viewing
Physical copies can be lost/stolen/damaged rendering them useless/have to
buy again but steamed movies are always available

Disadvantages
Needs a connection to the internet
Never own a physical copy of the file
The playback is dependent on the internet connection therefore may not be as
good a quality
A subscription may be needed to be paid therefore may be more expensive

To gain full marks there needs to be advantages and disadvantages

© UCLES 2021 Page 10 of 10



Cambridge IGCSE

INFORMATION AND COMMUNICATION TECHNOLOGY 0417/12


*8667658371*

Paper 1 Theory May/June 2022


2 hours

You must answer on the question paper.

No additional materials are needed.

INSTRUCTIONS
• Answer all questions.
• Use a black or dark blue pen.
• Write your name, centre number and candidate number in the boxes at the top of the page.
• Write your answer to each question in the space provided.
• Do not use an erasable pen or correction fluid.
• Do not write on any bar codes.
• You may use an HB pencil for any diagrams, graphs or rough working.

INFORMATION
• The total mark for this paper is 100.
• The number of marks for each question or part question is shown in brackets [ ].
• No marks will be awarded for using brand names of software packages or hardware.

This document has 16 pages.

06_0417_12_2022_1.15
© UCLES 2022 [Turn over
2

1 Circle two input devices.


Digital
3D printer Actuator CD ROM
camera

Keyboard Linker Monitor Speaker

[2]

2 A computer-controlled glasshouse is used to grow plants.

Identify two output devices used in this glasshouse.

1 ...............................................................................................................................................

2 ...............................................................................................................................................

[2]

3 Network devices are used in computer systems.

Complete each sentence by identifying the most appropriate network device.

(a) The network device that is used to transmit the data along an analogue telephone line is a

........................................................................................................................................... [1]

(b) The network device that connects a LAN to a WAN is a

........................................................................................................................................... [1]

(c) The network device that allows data to be directed to a specific computer on a LAN is a

........................................................................................................................................... [1]

(d) The internal network device that allows a computer to connect to a LAN is a

........................................................................................................................................... [1]

© UCLES 2022 06_0417_12_2022_1.15


3

4 Many word processing packages have a number of formatting features.

The paragraph below shows some of the formatting features that can be used.

(a) Write down four of the formatting features that have been used in the paragraph shown.

1 ........................................................................................................................................

2 ........................................................................................................................................

3 ........................................................................................................................................

4 ........................................................................................................................................

[4]

© UCLES 2022 06_0417_12_2022_1.15 [Turn over


4

(b) The logo for the Summer Steam Festival is shown and labelled A. The organisers of the event
are planning to create a second logo for all their correspondence. This is shown and labelled B.

Summer
Steam Festival Summer
2022 Steam Festival
2022

A B

Describe the steps that have been used to transform logo A into logo B.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [4]

© UCLES 2022 06_0417_12_2022_1.15


5

5 A library is considering the way it issues books. The librarians are planning to use RFID rather than
bar codes.

Describe the advantages of using RFID rather than bar codes.

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

.................................................................................................................................................. [4]

6 Laptop computers use Solid State Drives (SSD) rather than Hard Disc Drives (HDD).

Describe two disadvantages of using an SSD rather than an HDD in a laptop computer.

1 ...............................................................................................................................................

..................................................................................................................................................

2 ...............................................................................................................................................

..................................................................................................................................................

[2]

© UCLES 2022 06_0417_12_2022_1.15 [Turn over


6

7 A patient has an injury and the doctor treating him needs to find out information about the patient.
Most of the data he needs to collect is personal data.

The data collected is protected by data protection legislation. Most data protection acts include the
principle that data should be kept confidential and secure.

(a) List four other principles of a typical data protection act.

1 ........................................................................................................................................

...........................................................................................................................................

2 ........................................................................................................................................

...........................................................................................................................................

3 ........................................................................................................................................

...........................................................................................................................................

4 ........................................................................................................................................

...........................................................................................................................................

[4]

(b) Explain what is meant by personal data. Include two examples of personal data in your answer.

Explanation .......................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

Example 1 .........................................................................................................................

...........................................................................................................................................

Example 2 .........................................................................................................................

...........................................................................................................................................

[3]

© UCLES 2022 06_0417_12_2022_1.15


7

(c) Explain why personal data should be kept confidential and secure.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [4]

8 Uniform Resource Locators (URL) are used to locate websites and resources. A teacher needs to
find a teaching guide from Cambridge Assessment International Education. To download the
teaching guide she types in:

(a) Write down only the part of the URL which shows the file name of the teaching guide.

........................................................................................................................................... [1]

(b) Write down only the part of the URL which is the folder where the teaching guide is stored.

........................................................................................................................................... [1]

(c) Write down only the part of the URL which is the domain name.

........................................................................................................................................... [1]

(d) Explain what is meant by https.

...........................................................................................................................................

........................................................................................................................................... [1]

© UCLES 2022 06_0417_12_2022_1.15 [Turn over


8

9 A student is creating a spreadsheet of airports for a project.

The formula in G2 is:

=VLOOKUP(F2,A2:B9,2,0)

(a) Explain, in detail, what the formula in G2 does.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [4]

(b) Before the spreadsheet can be used, data needs to be entered to test the spreadsheet.

There are three types of test data: normal, abnormal and extreme.

Explain what is meant by these three types of test data.

Normal ..............................................................................................................................

...........................................................................................................................................

Abnormal ..........................................................................................................................

...........................................................................................................................................

Extreme ............................................................................................................................

...........................................................................................................................................

[3]

© UCLES 2022 06_0417_12_2022_1.15


9

(c) Explain, using examples, the differences between a function and a formula.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [6]

(d) The completed file could have been created using a database.

Describe two reasons why databases are used in certain applications rather than spreadsheets.

1 ........................................................................................................................................

...........................................................................................................................................

2 ........................................................................................................................................

...........................................................................................................................................

[2]

© UCLES 2022 06_0417_12_2022_1.15 [Turn over


10

10 The prolonged use of computers can cause several health problems particularly when sitting down
and using monitors.

Discuss the strategies that you have developed to minimise health risks which only relate to sitting
down and using a monitor.

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

.................................................................................................................................................. [8]

© UCLES 2022 06_0417_12_2022_1.15


11

11 A car manufacturing company uses computer-controlled robots to manufacture its cars.

Discuss the advantages and disadvantages to the company of using computer-controlled robots
rather than using humans to manufacture the cars.

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

.................................................................................................................................................. [6]

© UCLES 2022 06_0417_12_2022_1.15 [Turn over


12

12 Different methods can be used to analyse a system.

Discuss the benefits and drawbacks of analysing a system by observing staff rather than looking
at the current systems documentation.

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

.................................................................................................................................................. [6]

13 A librarian in a college department library is entering data into a student borrowers’ file. As the data
is entered it needs to be verified.

(a) Describe the two types of verification.

1 ........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

2 ........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

[4]

© UCLES 2022 06_0417_12_2022_1.15


13

(b) Explain, using examples, why it is necessary to carry out validation as well as verification for
this system.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [4]

© UCLES 2022 06_0417_12_2022_1.15 [Turn over


14

14 Spam is associated with ICT systems.

(a) Explain what is meant by the term spam.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [2]

(b) Describe the ways that a user can recognise spam and methods to help prevent it.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [6]

© UCLES 2022 06_0417_12_2022_1.15


15

15 (a) Explain what is meant by cloud storage and how it is used.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [6]

(b) Describe two issues related to the security of data in the cloud.

1 ........................................................................................................................................

...........................................................................................................................................

2 ........................................................................................................................................

...........................................................................................................................................

[2]

© UCLES 2022 06_0417_12_2022_1.15 [Turn over


16

16 A company uses corporate house style within the headers and footers in its documents.

(a) Explain what is meant by corporate house style.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [2]

(b) Explain why headers and footers are needed.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [2]

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable
effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will
be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge Assessment
International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at
www.cambridgeinternational.org after the live examination series.

Cambridge Assessment International Education is part of Cambridge Assessment. Cambridge Assessment is the brand name of the University of Cambridge Local
Examinations Syndicate (UCLES), which is a department of the University of Cambridge.

© UCLES 2022 06_0417_12_2022_1.15


Cambridge IGCSE™

INFORMATION AND COMMUNICATION TECHNOLOGY 0417/12


Paper 1 Theory May/June 2022
MARK SCHEME
Maximum Mark: 100

Published

This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.

Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.

Cambridge International will not enter into discussions about these mark schemes.

Cambridge International is publishing the mark schemes for the May/June 2022 series for most
Cambridge IGCSE, Cambridge International A and AS Level and Cambridge Pre-U components, and some
Cambridge O Level components.

This document consists of 15 printed pages.

© UCLES 2022 [Turn over


0417/12 Cambridge IGCSE – Mark Scheme May/June 2022
PUBLISHED
Generic Marking Principles

These general marking principles must be applied by all examiners when marking candidate answers. They should be applied alongside the
specific content of the mark scheme or generic level descriptors for a question. Each question paper and mark scheme will also comply with these
marking principles.

GENERIC MARKING PRINCIPLE 1:

Marks must be awarded in line with:

 the specific content of the mark scheme or the generic level descriptors for the question
 the specific skills defined in the mark scheme or in the generic level descriptors for the question
 the standard of response required by a candidate as exemplified by the standardisation scripts.

GENERIC MARKING PRINCIPLE 2:

Marks awarded are always whole marks (not half marks, or other fractions).

GENERIC MARKING PRINCIPLE 3:

Marks must be awarded positively:

 marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit is given for valid answers which go beyond the
scope of the syllabus and mark scheme, referring to your Team Leader as appropriate
 marks are awarded when candidates clearly demonstrate what they know and can do
 marks are not deducted for errors
 marks are not deducted for omissions
 answers should only be judged on the quality of spelling, punctuation and grammar when these features are specifically assessed by the
question as indicated by the mark scheme. The meaning, however, should be unambiguous.

GENERIC MARKING PRINCIPLE 4:

Rules must be applied consistently, e.g. in situations where candidates have not followed instructions or in the application of generic level
descriptors.

© UCLES 2022 Page 2 of 15


0417/12 Cambridge IGCSE – Mark Scheme May/June 2022
PUBLISHED
GENERIC MARKING PRINCIPLE 5:

Marks should be awarded using the full range of marks defined in the mark scheme for the question (however; the use of the full mark range may
be limited according to the quality of the candidate responses seen).

GENERIC MARKING PRINCIPLE 6:

Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should not be awarded with grade thresholds or
grade descriptors in mind.

© UCLES 2022 Page 3 of 15


0417/12 Cambridge IGCSE – Mark Scheme May/June 2022
PUBLISHED
Question Answer Marks

1 Keyboard 2
Digital camera

Question Answer Marks

2 Two from, for example: 2


Sprinkler
Lamp
Heater
Vents/Window openers/Motor
Actuator

Question Answer Marks

3(a) Modem 1

3(b) Router 1

3(c) Switch 1

3(d) Network interface Card/NIC 1

© UCLES 2022 Page 4 of 15


0417/12 Cambridge IGCSE – Mark Scheme May/June 2022
PUBLISHED
Question Answer Marks

4(a) Four from: 4


Bold
Full justification
Highlight
Underlined
Italic

4(b) Four from: 4


Click on the shape/logo A
Slide the corners in to reduce the size of the shape/logo
Keep the aspect ratio//type in the height and width
Fill the shape/logo with black
Highlight the text
Reduce the size of the text
Change the colour of the text to white
Click on the image/train
Reduce the height and width//reduce the size of the image/train

Question Answer Marks

5 Four from: 4
RFID are faster to read than bar codes
RFID scanning is more accurate than bar codes
RFID does not need line of sight to read but bar code does
RFID will read the data if the reader is further away
RFID can scan multiple items at the same time
RFID allows greater security
RFID can store more data than a bar code
RFID tags can be rewritten, so can be reused
RFID tags are more robust as bar codes will not scan if damaged

© UCLES 2022 Page 5 of 15


0417/12 Cambridge IGCSE – Mark Scheme May/June 2022
PUBLISHED
Question Answer Marks

6 They tend to have a more limited number of read and writes 2


More expensive per Gb than HDD

Question Answer Marks

7(a) Four from: 4


Data should be fairly and lawfully processed//Data should be processed in a transparent manner
Data should only be processed for the stated purpose
Data should be adequate, relevant and not excessive/limited
Data should not be kept longer than necessary
Data should be processed in accordance with the data subject’s rights
Data should be collected for specific purposes
Data should only be further processed for archive purposes which is compatible with the initial purposes
Data kept for archiving should safeguard the rights and freedoms of individuals
Explicit consent required for processing sensitive data
Data subjects are allowed access to their personal data
Data should be accurate and kept up to date
Data should not be transferred to another country unless they have adequate protection
Parental consent required for processing personal data of children including online services

7(b) One mark for the explanation 3


Personal data is data relating to an individual/person that can be identified

One mark per example


Name, address, date of birth, gender, biometrics, mobile/cell phone number, credit/debit card number, personnel ID
number, personal appearance, medical record, criminal record, ethnic origin, picture of yourself, political opinions, religious
or philosophical beliefs, trade-union membership record, genetic data, IP address, racial identity

7(c) Four from: 4


The person can be identified from the data
The data is confidential as it links directly to the person
If someone gets access to the data then they can use the information to attack the person
If not kept confidential and secure it could lead to home burglaries as people post holiday details on social media
If not kept confidential and secure it could lead to the chance of users suffering physical harm
Protects sensitive data

© UCLES 2022 Page 6 of 15


0417/12 Cambridge IGCSE – Mark Scheme May/June 2022
PUBLISHED
Question Answer Marks

8(a) 2193733.pdf 1

8(b) igcse-ICT-0417 1

8(c) www.cambridgeinternational.org 1

8(d) Secure internet protocol 1

Question Answer Marks

9(a) =VLOOKUP(F2,A2:B9,2,0) 4

Four from:
Looks up F2/Airport name
Looks up in the range A2:B9/Code and Name
Finds the corresponding value from the 2nd column
Displays the value in G2
Finds exact match

9(b) Normal 3
Data that is within the boundary of acceptability

Abnormal
Data that is outside the boundary/limit of acceptability/incorrect data

Extreme
Data on the edge of acceptability

© UCLES 2022 Page 7 of 15


0417/12 Cambridge IGCSE – Mark Scheme May/June 2022
PUBLISHED
Question Answer Marks

9(c) Max two from: 6


Formula
A formula is a statement written by the user
A formula is an equation
A formula can contain values/references to cells/defined names
A formula can contain functions

One mark
Examples =A1+B1, =SUM(A2:B2)

Max two from:


Function
A function is a named piece of code designed to calculate specific values
Functions are used inside formulas
A function is a built in/predefined operation

One mark
Examples SUM/AVERAGE etc

9(d) Two from: 2


A database can use queries
A database can use relationships
Referential integrity can be enforced in a database
Easier to create forms on a database
Easier to create reports on a database
Better user security
Data is easier to manage in a database
A database can reduce data duplication

© UCLES 2022 Page 8 of 15


0417/12 Cambridge IGCSE – Mark Scheme May/June 2022
PUBLISHED
Question Answer Marks

10 Eight from: 8
Use of the monitor
Using a flat screen monitor can reduce eye strain and headaches
I turn the monitor 90 deg to the window to reduce the glare on the screen
If I turn the monitor this can cause problems with the layout of the room
I need to buy a monitor that could tilt to reduce neck ache
I close the window blinds to avoid glare on monitor/headaches
I should not use rooms with more than one window but this could be difficult
I could use a matt screen to prevent glare/headaches
I use a flat screen monitor as there is less flicker therefore reduces the chance of an epileptic seizure/eye strain/headaches
I keep the screen clear of dust to reduce static and eye strain
I could have my eyesight tested regularly
Brightness of the room should equal the brightness of the screen to prevent eye strain
Enable blue light filter/blue light glasses to prevent eye strain
I could set night light on the computer to prevent eye strain
I sit at arms length from the screen to prevent eye strain

Sitting down
I use an ergonomic chair/standing desk to reduce back and neck pains
I sit with correct posture to help reduce back and neck pain
I use a footrest to reduce DVT/improve posture
If there are wheels on the chair for easy movement I should be careful to avoid injury problems with the chair moving
backwards

Maximum of six marks if candidate only mention strategies for either sitting down or using a monitor

© UCLES 2022 Page 9 of 15


0417/12 Cambridge IGCSE – Mark Scheme May/June 2022
PUBLISHED
Question Answer Marks

11 Six from: 6
Advantages
Robots can work in sterile/harmful areas which are dangerous for humans
Humans would need protective clothing which would cost the company more money
Robots can more easily be used for transferring large delicate items
Robots can work 24/7
Cheaper in the long run
Higher productivity
More accurate/precise engineering
More frequent checking of the equipment
Fewer workers are needed therefore lowering costs
Production of the cars is more consistent

Disadvantages
Expensive to buy robots
Maintenance is expensive
Requires backup systems, which are expensive
They replace skilled workers, leading to de-skilling
They need constant observation which increases the cost of maintenance crews

To gain full marks the discussion must have correct answers for both advantages and disadvantages

© UCLES 2022 Page 10 of 15


0417/12 Cambridge IGCSE – Mark Scheme May/June 2022
PUBLISHED
Question Answer Marks

12 Observation 6
The analyst sees it with their own eyes
Get a complete picture of the whole system
Cheaper as it does not take the worker away from work
Description of the Hawthorne effect
The quality and accuracy of information is highly dependent on the skill of the observer

Examining documents
Can see exact details of inputs, processing and outputs
Saves time as there could be copies of previous analysis
Allows the analyst to predict the size of the new system by analysing the amount of data
Very time consuming to look through all the documents
Very expensive to pay for an analyst to look through all the documents

To gain full marks the discussion must have correct answers for both observation and examining documents

Question Answer Marks

13(a) One mark for naming the verification and one mark for explanation 4
Visual verification
Person enters the data it is read through and corrected as needed using the original copy

Double data entry


One from:
Person types the data then retypes the data from the original copy/source
Person types the data and another types the data from the original copy/source

© UCLES 2022 Page 11 of 15


0417/12 Cambridge IGCSE – Mark Scheme May/June 2022
PUBLISHED
Question Answer Marks

13(b) Max three from: 4


Not all errors are found by validation and verification separately
Source document may contain errors
Verification only checks that data is copied correctly
Verification does not check if data is reasonable/sensible
Validation checks are carried out automatically by the computer

Max two examples:


Correct appropriate example of a verification check
e.g. data supplied by the borrower is incorrect on the source document and was copied
Correct appropriate explanation of an example of a validation check
e.g. (Number of books borrowed is 1 misread as a 7; in a range check of 1–10)

Question Answer Marks

14(a) Two from: 2


Spam is junk mail
Sent in large numbers to inboxes
Unwanted/unsolicited emails
Fills the inbox
Used for advertising
Used for phishing/spreading malware

© UCLES 2022 Page 12 of 15


0417/12 Cambridge IGCSE – Mark Scheme May/June 2022
PUBLISHED
Question Answer Marks

14(b) Max four from: 6


Multiple spelling/grammatical errors
Asked to carry out tasks immediately
Asking to click on a link
Does not ask for you by name
Stored in a SPAM folder
Email asks for personal information
Large amount of repeated emails from same user
Lots of other similar email addresses in the send to box

Max four from:


Use a spam filter
Not filling your details on online form
Not replying to spam emails
Not having an auto reply set
Not consenting to marketing when providing details to a company
Do not give email address

© UCLES 2022 Page 13 of 15


0417/12 Cambridge IGCSE – Mark Scheme May/June 2022
PUBLISHED
Question Answer Marks

15(a) Six from: 6


What it is:
Cloud storage involves storing data in a remote physical location
Online storage platform
Cloud storage systems use hundreds of interlinked data servers
Storage system that requires access to the internet

How is it used:
User accesses the cloud storage using the internet
Cloud data can be accessed from any device
Clients send files to a data server
The server is maintained by a cloud provider
Data can be shared with other users
Cloud storage automatically backs up data
If one server fails there are others used as backup
Users pay a monthly/annual fee for storage used

To gain full marks the explanation must have correct answers for both what it is and how it is used

15(b) Two from: 2


Easier to hack as data is always available
Lose control of your data
More than one copy available to access therefore security is reduced
More difficult to delete all copies of the data

Question Answer Marks

16(a) Two from: 2


A set of rules
House style states how all documents and written communication should be formatted
Consistency across all documents in the portfolio of the company
Used to promote the company
Controls how the colours/font style/font size/font type/position of logo/justification of text/position and style of address
details to be used – 1 mark for any two items

© UCLES 2022 Page 14 of 15


0417/12 Cambridge IGCSE – Mark Scheme May/June 2022
PUBLISHED
Question Answer Marks

16(b) Two from: 2


To display descriptive information on each page
Helps the user to navigate through the document
Used for repeatable items
Headers and footers can be on every page
Maintains consistency in the document
Saves time rather than writing the same things on each page

© UCLES 2022 Page 15 of 15



Cambridge IGCSE

INFORMATION AND COMMUNICATION TECHNOLOGY 0417/13


*2949337011*

Paper 1 Theory May/June 2022


2 hours

You must answer on the question paper.

No additional materials are needed.

INSTRUCTIONS
• Answer all questions.
• Use a black or dark blue pen.
• Write your name, centre number and candidate number in the boxes at the top of the page.
• Write your answer to each question in the space provided.
• Do not use an erasable pen or correction fluid.
• Do not write on any bar codes.
• You may use an HB pencil for any diagrams, graphs or rough working.

INFORMATION
• The total mark for this paper is 100.
• The number of marks for each question or part question is shown in brackets [ ].
• No marks will be awarded for using brand names of software packages or hardware.

This document has 16 pages. Any blank pages are indicated.

06_0417_13_2022_1.12
© UCLES 2022 [Turn over
2

1 Circle two storage devices.

Digital DVD RAM


Bridge Linker
camera Drive

Memory
Mouse Printer Spreadsheet
stick

[2]

2 Name an appropriate validation routine for each statement. Each answer must be different.

(a) The last digit in a code used to ensure the other digits have been entered correctly.

........................................................................................................................................... [1]

(b) This validation routine ensures a password is always 8 characters.

........................................................................................................................................... [1]

(c) This validation routine ensures data has been entered into a field.

........................................................................................................................................... [1]

(d) This validation routine ensures that a date is entered as DD/MM/YYYY.

........................................................................................................................................... [1]

3 Identify two input devices which are used in computer control systems.

1 ...............................................................................................................................................

2 ...............................................................................................................................................

[2]

© UCLES 2022 06_0417_13_2022_1.12


3

4 Computers can store data in the cloud rather than using storage devices in the computer.

(a) Describe three benefits of storing data in the cloud.

1 ........................................................................................................................................

...........................................................................................................................................

2 ........................................................................................................................................

...........................................................................................................................................

3 ........................................................................................................................................

...........................................................................................................................................

[3]

(b) Describe three drawbacks of storing data in the cloud.

1 ........................................................................................................................................

...........................................................................................................................................

2 ........................................................................................................................................

...........................................................................................................................................

3 ........................................................................................................................................

...........................................................................................................................................

[3]

5 The manager of a cinema has purchased a new booking system. There are 26 rows in the cinema
with 20 seats on a row. Each seat is identified by a unique ID. The seat ID consists of the row letter
followed by the position of the seat on the row. An example of the seat on row F position 12 would
be F12.

He is setting up a test plan to test the system.

(a) Write down one example of each of the following types of test data. The answers must be
different in each case.

Normal ..............................................................................................................................

Abnormal ..........................................................................................................................

[2]

© UCLES 2022 06_0417_13_2022_1.12 [Turn over


4

(b) When a ticket is produced for the new system it contains a QR code.

Here is an example of a QR code.

Describe the benefits of using a QR code.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [5]

© UCLES 2022 06_0417_13_2022_1.12


5

(c) Discuss the advantages and disadvantages of using manual booking systems rather than
online booking systems.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [8]

© UCLES 2022 06_0417_13_2022_1.12 [Turn over


6

6 Eye strain is one of the health issues associated with using computers.

(a) Explain three causes of eye strain when using computers.

1 ........................................................................................................................................

...........................................................................................................................................

2 ........................................................................................................................................

...........................................................................................................................................

3 ........................................................................................................................................

...........................................................................................................................................

[3]

(b) Identify four methods of reducing the effects of eye strain.

1 ........................................................................................................................................

...........................................................................................................................................

2 ........................................................................................................................................

...........................................................................................................................................

3 ........................................................................................................................................

...........................................................................................................................................

4 ........................................................................................................................................

...........................................................................................................................................

[4]

© UCLES 2022 06_0417_13_2022_1.12


7

7 Tawara Stores has realised that the number of people shopping for food online has increased over
the past few years.

(a) Discuss the advantages and disadvantages to the customer of shopping for food online.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [8]

© UCLES 2022 06_0417_13_2022_1.12 [Turn over


8

(b) Tawara Stores are also aware that many current websites do not cater for older people. They
intend to create a version of their website for this audience.

Describe the features of this website to meet the needs of an older audience, giving reasons
for your choice of features.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [4]

8 Tawara Hotel uses magnetic stripe cards to allow guests access to their bedrooms. The hotel is
changing the electronic lock it uses on its bedroom doors so the lock can work with RFID cards.

Compare the use of magnetic stripe cards and RFID cards for key entry. Your answer must include
similarities and differences.

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

.................................................................................................................................................. [6]

© UCLES 2022 06_0417_13_2022_1.12


9

9 The Internet of Things (IoT) allows devices as well as computers to connect to the internet using
a router. Each device uses an IP address.

(a) Explain what is meant by an IP address.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [3]

(b) Explain how a router sends data packets to another network.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [3]

(c) The network has a firewall.

Explain why a firewall is needed.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [4]

© UCLES 2022 06_0417_13_2022_1.12 [Turn over


10

10 Both the internet and the intranet are used for communication.

(a) Define the terms internet and intranet.

(i) Internet

................................................................................................................................

................................................................................................................................

................................................................................................................................

................................................................................................................................ [2]

(ii) Intranet

................................................................................................................................

................................................................................................................................

................................................................................................................................

................................................................................................................................ [2]

(b) The World Wide Web is part of the internet.

Explain why the World Wide Web has become so popular.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [6]

© UCLES 2022 06_0417_13_2022_1.12


11

11 An image has been taken of a bird watcher and a bird. The original image has been saved as a
jpg file type. You have been asked to remove parts of the image to just show the bird and to save
it as a png file type to become the new image.

Original image

New image

(a) Explain the steps needed to change the original image to the new image.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [4]

© UCLES 2022 06_0417_13_2022_1.12 [Turn over


12

(b) Explain the differences between a jpg and a png file type.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [4]

12 The protection of personal data is important as many transactions are carried out online.

(a) Explain how to avoid inappropriate disclosure of personal data.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [4]

© UCLES 2022 06_0417_13_2022_1.12


13

(b) Controlling the freedom of speech is part of policing the internet.

Discuss whether the internet should be policed or not.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [4]

13 In a college library if a book is not available students can reserve the book. When the book becomes
available the librarian needs to inform the student. He does this by typing a letter and printing it.
He has a database of students and has decided that in future he will use mail merge to produce
the letters.

Give four advantages of using mail merge instead of typing out the letter each time.

1 ...............................................................................................................................................

..................................................................................................................................................

2 ...............................................................................................................................................

..................................................................................................................................................

3 ...............................................................................................................................................

..................................................................................................................................................

4 ...............................................................................................................................................

..................................................................................................................................................

[4]

© UCLES 2022 06_0417_13_2022_1.12 [Turn over


14

14 People can manage their banking transactions using the internet. However, if the internet signal is
poor telephone banking can be used.

A person wishes to use telephone banking without speaking to an operator to transfer money from
one bank account to another.

Describe the steps needed to do this.

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

.................................................................................................................................................. [6]

© UCLES 2022 06_0417_13_2022_1.12


15

BLANK PAGE

© UCLES 2022 06_0417_13_2022_1.12


16

BLANK PAGE

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable
effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will
be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge Assessment
International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at
www.cambridgeinternational.org after the live examination series.

Cambridge Assessment International Education is part of Cambridge Assessment. Cambridge Assessment is the brand name of the University of Cambridge Local
Examinations Syndicate (UCLES), which is a department of the University of Cambridge.

© UCLES 2022 06_0417_13_2022_1.12


Cambridge IGCSE™

INFORMATION AND COMMUNICATION TECHNOLOGY 0417/13


Paper 1 Theory May/June 2022
MARK SCHEME
Maximum Mark: 100

Published

This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.

Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.

Cambridge International will not enter into discussions about these mark schemes.

Cambridge International is publishing the mark schemes for the May/June 2022 series for most
Cambridge IGCSE, Cambridge International A and AS Level and Cambridge Pre-U components, and some
Cambridge O Level components.

This document consists of 15 printed pages.

© UCLES 2022 [Turn over


0417/13 Cambridge IGCSE – Mark Scheme May/June 2022
PUBLISHED
Generic Marking Principles

These general marking principles must be applied by all examiners when marking candidate answers. They should be applied alongside the
specific content of the mark scheme or generic level descriptors for a question. Each question paper and mark scheme will also comply with these
marking principles.

GENERIC MARKING PRINCIPLE 1:

Marks must be awarded in line with:

 the specific content of the mark scheme or the generic level descriptors for the question
 the specific skills defined in the mark scheme or in the generic level descriptors for the question
 the standard of response required by a candidate as exemplified by the standardisation scripts.

GENERIC MARKING PRINCIPLE 2:

Marks awarded are always whole marks (not half marks, or other fractions).

GENERIC MARKING PRINCIPLE 3:

Marks must be awarded positively:

 marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit is given for valid answers which go beyond the
scope of the syllabus and mark scheme, referring to your Team Leader as appropriate
 marks are awarded when candidates clearly demonstrate what they know and can do
 marks are not deducted for errors
 marks are not deducted for omissions
 answers should only be judged on the quality of spelling, punctuation and grammar when these features are specifically assessed by the
question as indicated by the mark scheme. The meaning, however, should be unambiguous.

GENERIC MARKING PRINCIPLE 4:

Rules must be applied consistently, e.g. in situations where candidates have not followed instructions or in the application of generic level
descriptors.

© UCLES 2022 Page 2 of 15


0417/13 Cambridge IGCSE – Mark Scheme May/June 2022
PUBLISHED
GENERIC MARKING PRINCIPLE 5:

Marks should be awarded using the full range of marks defined in the mark scheme for the question (however; the use of the full mark range may
be limited according to the quality of the candidate responses seen).

GENERIC MARKING PRINCIPLE 6:

Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should not be awarded with grade thresholds or
grade descriptors in mind.

© UCLES 2022 Page 3 of 15


0417/13 Cambridge IGCSE – Mark Scheme May/June 2022
PUBLISHED
Question Answer Marks

1 DVD RAM Drive 2


Memory stick

Question Answer Marks

2(a) Check digit 1

2(b) Length check 1

2(c) Presence check 1

2(d) Format check 1

Question Answer Marks

3 Two from: 2
Sensors
Keypad/Number pad
Touch screen
Microphone
Camera

Question Answer Marks

4(a) Three from: 3


Automatic backup
More storage
Difficult to lose the data as many copies are made of it
Many people can share access to the data
Can be accessed anywhere there is internet connection
Can be accessed from many devices

© UCLES 2022 Page 4 of 15


0417/13 Cambridge IGCSE – Mark Scheme May/June 2022
PUBLISHED
Question Answer Marks

4(b) Three from: 3


No control over data/security
Requires internet access
If the company goes out of business can lose data
If the internet crashes during sending or receiving then data could be lost
Many copies are made of the data which increases security issues
More expensive in the long run due to monthly charges

Question Answer Marks

5(a) Normal 2
Any seat from A1 to Z20//Any letter from A to Z inclusive followed by any number 1 to 20 inclusive
Abnormal
Any incorrect seat row or number/Any character other than A to Z and/or any number outside range 120 or anything that’s
incorrect

5(b) Five from: 5


Can be used for multiple elements
Fast access to additional information
Can be linked into a website
Can automatically link to email
The QR code is unique to the ticket
More robust than bar codes
Secure as the code cannot be swapped

© UCLES 2022 Page 5 of 15


0417/13 Cambridge IGCSE – Mark Scheme May/June 2022
PUBLISHED
Question Answer Marks

5(c) Eight from: 8


Advantages
The customer does not need an email address for the booking
The customer can pay by cash or electronic means whereas is an online system cards/apps are needed
Customers do not need an internet connection
More control of the booking therefore less errors for customers
Easier to cancel a booking once made
It is easier for the customer to gain information/help on the purchase

Disadvantages
Manual systems can result in double booking
Manual booking systems update the data less often than online systems
Difficult to see if a seat is taken as the seats are not updated when booked
Bookings can only be made when the booking office is open
Can only book at a booking office
People have to travel to the booking office to book, therefore wastes time
People have to travel to the booking office to book wastes cost
More difficult to change bookings
Physical tickets are issued which can be lost more easily

To gain full marks the discussion must have correct answers for both advantages and disadvantages

Question Answer Marks

6(a) Three from: 3


Staring at a computer screen for prolonged periods of time
Working in a room with poor lighting/Screen brightness too high/blue light of screen
Wrong setting on contrast
Glare from windows
Flickering screens
Dirty screens
Sitting too close to a screen
Text too small/font colour is contrasting with background/incorrect resolution/screen too small

© UCLES 2022 Page 6 of 15


0417/13 Cambridge IGCSE – Mark Scheme May/June 2022
PUBLISHED
Question Answer Marks

6(b) Four from: 4


Take regular breaks/look into the distance to relax the eyes/look at green objects
Use TFT/LCD/LED/flat screens to reduce the flicker
Use anti-glare screens/TFT/matt screens/window blinds to reduce the glare
Match the lighting in the room with the brightness of the computer screen
Turn the screens 90 degrees to the window to reduce the glare on the screen
Enable blue light filter/wear blue light glasses
Use night screen light on the computer
Have eyes tested regularly
Use a LED/LCD/flat screen monitor can reduce eye strain and headaches
Keep the screen clear of dust/dirt

© UCLES 2022 Page 7 of 15


0417/13 Cambridge IGCSE – Mark Scheme May/June 2022
PUBLISHED
Question Answer Marks

7(a) Eight from: 8


Advantages
No longer need to travel to the store so it saves the cost of travelling
No longer need to travel to the store so it saves the time of travelling
Saves time shopping as favourite lists can be produced
Saves time shopping around different stores
Wider range of shops
Customers can shop 24/7
Customers can compare the prices of different stores without travel
Shopping can take place using mobile devices anywhere there is an internet connection
Regular shopping schedules can be set up
Can see the physical objects in store and then have the advantages of shopping online

Disadvantages
Makes people lazy/lack of exercise
Over-reliance on computers
More security issues
Needs a reliable internet connection
Goods can take time to arrive
Goods could be damaged in transit
More chance of errors in the ordering
More difficult to amend an order after purchase
No way of checking the goods before buying
There may be delivery/packaging costs

To gain full marks the discussion must have correct answers for both advantages and disadvantages

7(b) Four from: 4


Bold colours/contrasting colours making it easier to read
Larger font sizes/clear font so it is easier for people reading the text
Simple navigation makes it easier to find the products
Larger buttons so they can be easily seen
Interactive screens/buttons/drop down menus to reduce typing
Larger bold heading to make it an easy to read layout

© UCLES 2022 Page 8 of 15


0417/13 Cambridge IGCSE – Mark Scheme May/June 2022
PUBLISHED
Question Answer Marks

8 Six from: 6
Similarities
Both have improved security by using encryption
Data cannot be read by eye so more secure
Data can be re-written
Direct data entry
Both allow fast access to the room
Both are read by a reader/scanner
Both can be easily damaged

Differences
RFID is contactless therefore has less wear and tear whereas magnetic is placed in reader
RFID reads the data faster
More data on RFID card
RFID cannot be left in the lock accidentally
RFID cards can be read by others from a distance using a device
Easier to clone a magnetic stripe card
Magnetic cards can only be read in one direction whereas RFID are only tapped
Magnetic stripe can be affected by magnets/mobile phones
RFID cards are more robust

To gain full marks the comparison must have correct answers for both similarities and differences

© UCLES 2022 Page 9 of 15


0417/13 Cambridge IGCSE – Mark Scheme May/June 2022
PUBLISHED
Question Answer Marks

9(a) Three from: 3


Internet protocol address
Assigned to your computer/NIC/device when it connects to a network
Uniquely identifies NIC/device on an IP network/unique number
Locates individual devices on a network/internet
Can show/indicate/track the physical location of the device

9(b) Three from: 3


The router creates data packets
The router receives the data packet
The data packet contains the destination/IP address
The router looks at the destination/IP address in the packet
The router uses its/has a routing table
Router compares the destination address in the packet with the addresses in its routing table
The router then determines the best route to the next router/network/destination

9(c) Four from: 4


It is needed for network security
It controls/checks the incoming and outgoing network traffic
A firewall is a barrier between a trusted secure internal network and the internet//network and the user
It can log incoming and outgoing traffic
It stops malicious traffic/cyber attacks/checks incoming data against criteria
It prevents computers connecting to unwanted sites
It prevents untrusted/un-recognised/un-authorised computers/users accessing data on the system
Protects data
Sends warnings/alerts the user

© UCLES 2022 Page 10 of 15


0417/13 Cambridge IGCSE – Mark Scheme May/June 2022
PUBLISHED
Question Answer Marks

10(a)(i) Two from: 2


Public access
Its world wide/International
Vast collection of computers and networks/network of networks/WAN/Wide Area Network

10(a)(ii) Two from: 2


Private network
Restricted access
Used in companies and organisations
Used to share internal documents, internal emails
Uses internet technology

10(b) Six from: 6


Vast amount of information
Faster to access information
Search engines allow the user to search quickly vast amounts of information
Information increases all the time
Its widely available
Allows users to meet other people/like minded people/communicate with friends over long distances
Easy for all people to use
Allows people to easily join specialist world wide groups
Allows social networking
Pages are hyperlinked so easier/quicker to find related pages
Allows online shopping/banking
Allows online up to date news, sports around the world/TV on demand
Allows interactivity, such as watching a video to see how to do a task/training aid
Helps vulnerable people to communicate with others
Allows people to be creative/make own websites

© UCLES 2022 Page 11 of 15


0417/13 Cambridge IGCSE – Mark Scheme May/June 2022
PUBLISHED
Question Answer Marks

11(a) Four from: 4


Load the image/photo editing software
Load/import the image
Click on image
Click on crop
Move arrows to select area to be cropped/Draw around the area to be cut out
Click on delete/Click outside the image
Select Save As/export and then select png format

11(b) Four from: 4


jpg is lossy format
Smaller file size
Joint photographic experts group
Loses quality when compressed

png is lossless format


Does not lose quality when compressed
Portable network graphics

© UCLES 2022 Page 12 of 15


0417/13 Cambridge IGCSE – Mark Scheme May/June 2022
PUBLISHED
Question Answer Marks

12(a) Four from: 6


Be careful of impersonators/people pretending to be officials
Safely dispose of personal information
Encrypt your data
Keep passwords private/Use a strong password
Don’t share personal data
Keep privacy settings high
Use security software/anti-spyware
Avoid phishing emails
Use a nickname/alias online

12(b) Four from: 4


For policed
Prevents illegal material being readily available
Prevents young children accessing unsuitable material
Ensures copyright laws are maintained
Stops extreme viewpoints from being seen
Prevents libelous text being added
Prevents hate comments/foul language/racial comments

Against policed
Governments block text/viewpoints/their own bias viewpoint
Unsuitable material is easily available in other ways
Control would cost money and users would have to pay
Control would be very difficult to enforce
Could cause less people to use it
Laws are different in each country but the internet is world wide
Creates a feeling of big brother/always being watched

To gain full marks the discussion must have correct answers for both for and against policed

© UCLES 2022 Page 13 of 15


0417/13 Cambridge IGCSE – Mark Scheme May/June 2022
PUBLISHED
Question Answer Marks

13 Four from: 4
Letters can be personalised for each student
The data is from the file therefore fewer errors
Saves time than typing in all the details each time
Letter can be saved and used again
Standard letter can be used each time/More consistency
Data in the database need only be checked
Easier to make changes to the letters

© UCLES 2022 Page 14 of 15


0417/13 Cambridge IGCSE – Mark Scheme May/June 2022
PUBLISHED
Question Answer Marks

14 Six from: 6
User telephones the bank telephone centre
System asks for the long number on the credit/debit card/sort code and account number/customer Access/ID number
The user taps out the number on the phone keypad and presses #/speaks the number
System asks for certain characters in a password/phone banking security number
The user taps out the characters asked for/security number and presses #
System checks the number is correct
System rejects the password/security number
The user re-enters the characters/security number
After three attempts the telephone connection drops
System asks other security answers
The user taps it in/speaks the answer
System asks which service you require/options given
Users tap in the number to select transfer from one account to another
System asks number of account transfer from
User taps in account number
System connects with the bank account
System asks for number of account transfer money to
User taps in account number
System asks amount to transfer
User taps in the amount
Checks the amount in the account/maximum not exceeded
Approves request
If amount exceeded the call is terminated/transaction declined/insufficient funds
System asks when the transfer should happen
The user taps in the date
System asks you to confirm it/sends a text message/send email
Customer hangs up to end the transaction

© UCLES 2022 Page 15 of 15



Cambridge IGCSE

INFORMATION AND COMMUNICATION TECHNOLOGY 0417/13


*0243543375*

Paper 1 Theory October/November 2022


2 hours

You must answer on the question paper.

No additional materials are needed.

INSTRUCTIONS
• Answer all questions.
• Use a black or dark blue pen.
• Write your name, centre number and candidate number in the boxes at the top of the page.
• Write your answer to each question in the space provided.
• Do not use an erasable pen or correction fluid.
• Do not write on any bar codes.
• You may use an HB pencil for any diagrams, graphs or rough working.

INFORMATION
• The total mark for this paper is 100.
• The number of marks for each question or part question is shown in brackets [ ].
• No marks will be awarded for using brand names of software packages or hardware.

This document has 16 pages. Any blank pages are indicated.

11_0417_13_2022_1.11
© UCLES 2022 [Turn over
2

1 Complete the following sentences using the most appropriate words from the list.

centred a footer a gutter a header indented


justified landscape an orphan portrait a widow

(a) The orientation of a page that is taller than it is wide is called

........................................................................................................................................... [1]

(b) An area at the bottom of a page is called

........................................................................................................................................... [1]

(c) The first line of a paragraph that appears as the last line of the previous page is called

........................................................................................................................................... [1]

(d) Text that is aligned horizontally in the middle of a line is called

........................................................................................................................................... [1]

2 A computer controlled glasshouse is used to grow plants.

State three sensors that could be used in the glasshouse.

1 ...............................................................................................................................................

2 ...............................................................................................................................................

3 ...............................................................................................................................................

[3]

3 Circle two features of multimedia presentations which would not be found in a word processed
document.

bullets images numbers photographs

sound tables text video

[2]

© UCLES 2022 11_0417_13_2022_1.11


3

4 A person contacts an online medical website that uses an expert system to allow users to
self-diagnose illnesses.

(a) Write down the component within the expert system that matches the definition given.

(i) This component contains a database of facts.

................................................................................................................................

................................................................................................................................ [1]

(ii) This component carries out the reasoning of the expert system.

................................................................................................................................

................................................................................................................................ [1]

(iii) This component allows the person to interact with the system.

................................................................................................................................

................................................................................................................................ [1]

(b) Describe how an expert system is used to diagnose an illness.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [6]

© UCLES 2022 11_0417_13_2022_1.11 [Turn over


4

5 A restaurant uses a number of different types of software. These include control, measurement,
spreadsheet and word processing software.

(a) Tick (✓) the most appropriate piece of software to carry out the tasks shown.

Word
Control Measurement Spreadsheet processing
(✓) (✓) (✓) (✓)

Producing menus for the restaurant

Calculating the cost of each of the


meals

Automatically turning on the fans


when the room gets too hot

Monitoring the temperature in the


restaurant

[4]

© UCLES 2022 11_0417_13_2022_1.11


5

The restaurant owner is planning to upgrade the software used to book reservations. He has
employed a systems analyst who is analysing the current system. The systems analyst can either
send out questionnaires for staff to answer or observe staff working with the current system.

(b) Discuss the advantages and disadvantages of using questionnaires that staff answer rather
than observing staff to gather information about the current system.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [6]

© UCLES 2022 11_0417_13_2022_1.11 [Turn over


6

6 A web page can contain images saved as png or gif file types.

(a) State what is meant by png and gif file types.

png ....................................................................................................................................

...........................................................................................................................................

gif ......................................................................................................................................

...........................................................................................................................................

[2]

(b) Explain the differences between the two file types.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [3]

© UCLES 2022 11_0417_13_2022_1.11


7

7 A school librarian is setting up a database of all the revision books he has in stock. The school
library sells revision books to students. The books range in value from $1 to $10 and are available
either in electronic book type (E) or physical book type (P).

(a) The librarian is planning to set up a number of different types of validation rule for the fields
to check data entry. Write down the most appropriate field name from the table that could be
used with each of the validation rules. Your answers must be different in each case.

Name_of_book Department ISBN Book_type Cost

Modern History HIS 0140621393432 P $5.20

GCSE ICT ICT 0006132237 E $1

A Level Calculus MAT 0006153516 E $1

Human Biology SCI 0006511376 E $2.30

Presence ..........................................................................................................................

Lookup ..............................................................................................................................

Range ...............................................................................................................................

Length ...............................................................................................................................

[4]

The librarian needs to set up a primary key field.

(b) Write down the most appropriate field name from the table that could be used as a primary
key field.

........................................................................................................................................... [1]

© UCLES 2022 11_0417_13_2022_1.11 [Turn over


8

Most of the revision books are available in electronic book type as digital versions of the printed
books. These are stored as interactive PDF files.

(c) Describe the benefits and drawbacks of using the digital versions.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [6]

© UCLES 2022 11_0417_13_2022_1.11


9

8 An organisation has changed the way in which members of staff can enter the building. Previously
they typed in a four-digit code on a key pad; now they use a device that reads a handprint.

(a) Discuss the effectiveness of using a handprint to enter the building rather than keying in a
code.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [8]

Handprint scans are an example of a biometric method to enter a building.

(b) Give two other examples of biometric methods that could be used in this scenario.

1 ........................................................................................................................................

2 ........................................................................................................................................

[2]

© UCLES 2022 11_0417_13_2022_1.11 [Turn over


10

9 The use of email has replaced many forms of communication.

Describe the constraints that you need to consider when writing and sending an email.

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

.................................................................................................................................................. [6]

10 (a) For each of the following types of backing storage give one example of its associated media.
Your answers must be different in each case.

Optical ..............................................................................................................................

...........................................................................................................................................

Magnetic ...........................................................................................................................

...........................................................................................................................................

Solid state .........................................................................................................................

...........................................................................................................................................

[3]

© UCLES 2022 11_0417_13_2022_1.11


11

(b) Describe three differences between optical and magnetic backing storage.

1 ........................................................................................................................................

...........................................................................................................................................

2 ........................................................................................................................................

...........................................................................................................................................

3 ........................................................................................................................................

...........................................................................................................................................

[3]

11 A student is carrying out some research for school.

(a) Explain two ways she could search for information on the World Wide Web (WWW).

1 ........................................................................................................................................

...........................................................................................................................................

2 ........................................................................................................................................

...........................................................................................................................................

[2]

(b) Explain the differences between the internet and the World Wide Web (WWW).

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [4]

© UCLES 2022 11_0417_13_2022_1.11 [Turn over


12

12 The internet contains three web development layers. One layer is the content layer. This layer is
used to enter the content of a web page structure.

(a) Name and describe the other two web development layers.

Layer .................................................................................................................................

Description ........................................................................................................................

...........................................................................................................................................

Layer .................................................................................................................................

Description ........................................................................................................................

...........................................................................................................................................

[4]

(b) Explain why tables can be used to structure elements within a web page.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [3]

© UCLES 2022 11_0417_13_2022_1.11


13

13 A teacher is concerned that students are playing online computer games at home without considering
eSafety. The teacher is going to create a set of rules that he feels they should be following.

Write down a list of eSafety rules that he could include.

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

.................................................................................................................................................. [6]

14 Explain why page, section and column breaks are used in documents.

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

.................................................................................................................................................. [3]

© UCLES 2022 11_0417_13_2022_1.11 [Turn over


14

15 An employee is carrying out work for her company at home. The work she is doing is confidential.
She has been advised by her company to use encryption. She wishes to transfer some of this work
to the office.

(a) Discuss two different methods she could use to transfer this work to the office. Include in your
answer the advantages and disadvantages of each method.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [6]

(b) Describe what is meant by the term encryption and why it is used.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [3]

© UCLES 2022 11_0417_13_2022_1.11


15

(c) Tick (✓) the most appropriate working pattern to match the following statements.

Compressed Flexible Job Part-time


hours hours sharing working
(✓) (✓) (✓) (✓)

An employee works a full day but


negotiates with the employer the start
and end times

An employee works the same number


of hours as a full week but in fewer
days

An employee works for fewer hours


than a full-time employee

[3]

© UCLES 2022 11_0417_13_2022_1.11


16

BLANK PAGE

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable
effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will
be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge Assessment
International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at
www.cambridgeinternational.org after the live examination series.

Cambridge Assessment International Education is part of Cambridge Assessment. Cambridge Assessment is the brand name of the University of Cambridge Local
Examinations Syndicate (UCLES), which is a department of the University of Cambridge.

© UCLES 2022 11_0417_13_2022_1.11


Cambridge IGCSE™

INFORMATION & COMMUNICATION TECHNOLOGY 0417/13


Paper 1 Theory October/November 2022
MARK SCHEME
Maximum Mark: 100

Published

This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.

Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.

Cambridge International will not enter into discussions about these mark schemes.

Cambridge International is publishing the mark schemes for the October/November 2022 series for most
Cambridge IGCSE™, Cambridge International A and AS Level components and some Cambridge O Level
components.

This document consists of 9 printed pages.

© UCLES 2022 [Turn over


0417/13 Cambridge IGCSE – Mark Scheme October/November
PUBLISHED 2022

Generic Marking Principles

These general marking principles must be applied by all examiners when marking candidate answers.
They should be applied alongside the specific content of the mark scheme or generic level descriptors
for a question. Each question paper and mark scheme will also comply with these marking principles.

GENERIC MARKING PRINCIPLE 1:

Marks must be awarded in line with:

• the specific content of the mark scheme or the generic level descriptors for the question
• the specific skills defined in the mark scheme or in the generic level descriptors for the question
• the standard of response required by a candidate as exemplified by the standardisation scripts.

GENERIC MARKING PRINCIPLE 2:

Marks awarded are always whole marks (not half marks, or other fractions).

GENERIC MARKING PRINCIPLE 3:

Marks must be awarded positively:

• marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit
is given for valid answers which go beyond the scope of the syllabus and mark scheme,
referring to your Team Leader as appropriate
• marks are awarded when candidates clearly demonstrate what they know and can do
• marks are not deducted for errors
• marks are not deducted for omissions
• answers should only be judged on the quality of spelling, punctuation and grammar when these
features are specifically assessed by the question as indicated by the mark scheme. The
meaning, however, should be unambiguous.

GENERIC MARKING PRINCIPLE 4:

Rules must be applied consistently, e.g. in situations where candidates have not followed
instructions or in the application of generic level descriptors.

GENERIC MARKING PRINCIPLE 5:

Marks should be awarded using the full range of marks defined in the mark scheme for the question
(however; the use of the full mark range may be limited according to the quality of the candidate
responses seen).

GENERIC MARKING PRINCIPLE 6:

Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should
not be awarded with grade thresholds or grade descriptors in mind.

© UCLES 2022 Page 2 of 9


0417/13 Cambridge IGCSE – Mark Scheme October/November
PUBLISHED 2022

Question Answer Marks

1(a) portrait 1

1(b) a footer 1

1(c) an orphan 1

1(d) centred 1

Question Answer Marks

2 Three from: 3
Light
Temperature
Humidity/moisture
pH
CO2

Question Answer Marks

3 Sound 2
Video

Question Answer Marks

4(a)(i) Knowledge base 1

4(a)(ii) Inference engine 1

4(a)(iii) Interactive user interface 1

4(b) Six from: 6


An Interactive user interface appears
The expert system asks questions about the illness
Yes and No type answers to the questions
Answers lead to other questions
The inference engine searches…
…the knowledge base…
…uses the rules base
Probabilities/possibilities of diagnoses and treatments are displayed
Displays the ways it achieved the solutions/conclusions

© UCLES 2022 Page 3 of 9


0417/13 Cambridge IGCSE – Mark Scheme October/November
PUBLISHED 2022

Question Answer Marks

5(a) 4
Control Measure Spread Wordproc
(✓) ment sheet essing
(✓) (✓) (✓)

Producing menus for the



restaurant

Calculating the cost of



each of the meals

Automatically turning on
the fans when the room ✓
gets too hot

Monitoring the
temperature in the ✓
restaurant

5(b) Six from: 6


Advantages
Answers are more honest as they are anonymous
Staff can remain anonymous whereas the observation cannot be
anonymous
Can be sent to all the staff at the same time whereas the observer may only
see one part of the operation
Questionnaires can be filled in at any time whereas observations can only
be carried out when the restaurant is working
Analysis of questionnaire can be carried out automatically whereas
observations the observer must produce notes
Observer may miss elements whereas questionnaires are filled in by the
users

Disadvantages
Users do not always complete the questionnaire and hand it back but
observation watches users working
Work rate can be influenced by being observed but this does not apply to
questionnaires
More chances of incorrect data if question not understood
The observer can see exactly how the system works well and not so well
whereas a questionnaire takes the users viewpoint

To gain full marks the discussion must have correct answers for both
advantages and disadvantages

© UCLES 2022 Page 4 of 9


0417/13 Cambridge IGCSE – Mark Scheme October/November
PUBLISHED 2022

Question Answer Marks

6(a) png 2
One from:
Raster/full colour digital photos
Images with a transparent background

gif
Moving/animated image

6(b) Three from: 3


Same images saved as a GIF loads/reads faster than PNG
GIF uses limited colours (256) whereas PNG uses a bitmap of colours
GIF can have moving and static images whereas PNG only have static
images
PNG can have transparent background
PNG is compressed
PNG is lossless

Question Answer Marks

7(a) Presence ISBN 4


Lookup Book_type
Range Cost
Length Department

7(b) ISBN 1

7(c) Six from: 6


Benefits
Digital therefore can easily be used in other documents/software
Instant access on many devices
More accessible for disabled
Quicker to search digital books

Drawbacks
Health issues with using a computer to read the book
Cannot be written in braille
May require extra software/reader
Never own the book as it is only data
Need to purchase a device to read them
Needs the internet to download the book

To gain full marks the description must have correct answers for both
benefits and drawbacks

© UCLES 2022 Page 5 of 9


0417/13 Cambridge IGCSE – Mark Scheme October/November
PUBLISHED 2022

Question Answer Marks

8(a) Eight from: 8


Positives
Data can be read/identified faster
Data can be read/identified by electronic comparison therefore relative higher
level of accuracy
Increases security as the hand is unique whereas a four-digit code easier to
guess
Can’t forget your handprint, unlike a code
The person must be present to enter the building

Negatives
If the hand is damaged, then may not work
More difficult to change biometric data
Only works with one hand therefore difficult for right-handed people
Recognition could be slower as system is more complex
Harder to set up the biometric system
Takes longer to add new people/change biometric data to the system
Biometrics can use a lot of memory to store the data
Intrusive as personal details must be stored in biometrics
More likely to be affected by the environment

To gain full marks the discussion must have correct answers for both
positives and negatives

8(b) Two from: 2


Fingerprint
Vein geometry
Retina
Iris
Face

Question Answer Marks

9 Six from: 6
Abide by the laws within the country that affect the general use of emails
Use acceptable language
Abide by copyright
Follow local guidelines set by an employer/schools
Use appropriate security
Follow netiquette
Respect other people/s/own privacy
Be aware of the need for password protection
Be aware that email accounts can be Illegally accessed

© UCLES 2022 Page 6 of 9


0417/13 Cambridge IGCSE – Mark Scheme October/November
PUBLISHED 2022

Question Answer Marks

10(a) Optical 3
CD ROM/DVD ROM, CD R/DVD R, CD RW/DVD RW, DVD RAM, Blu-ray
discs/CD/DVD

Magnetic
Fixed/portable/removable hard disks/magnetic tape.

Solid state
Memory stick/flash card

10(b) Three from: 3


Optical data is stored using laser whereas Magnetic data is stored using
magnetic fields
Optical disc storage is serial whereas Magnetic disk storage is direct/sectors
and tracks
Magnetic storage is affected by magnetic fields whereas Optical storage is
not
Magnetic media tends to store more data than optical media
Optical storage is more robust
Optical has a faster data access/transfer speed

Question Answer Marks

11(a) Two from: 2


Type in a web address
Use a search engine
Type what you need on the search bar

11(b) Four from: 4


The internet
Network of Networks//WAN
It is the infrastructure
Contains email, FTP

The World Wide Web


Collection of websites
Accessed from the internet
Service of the internet

To gain full marks the explanation must have correct answers for both
the internet and World Wide Web

© UCLES 2022 Page 7 of 9


0417/13 Cambridge IGCSE – Mark Scheme October/November
PUBLISHED 2022

Question Answer Marks

12(a) Presentation 4
Defines the format of a web page/individual elements through styling

Behaviour
To enter scripting language to a web page/individual element

12(b) Three from: 3


Allows greater control over page layout
Positions elements/data on the page
Conveys relationships between items
Displays data

Question Answer Marks

13 Six from: 6
Examples
Do not give away personal information
Do not use your real name as your username
Do not use your face image as your avatar
If you receive messages from unwanted users block and report them
Do not meet unknown users in real life//use a chaperone
Do not give financial information to other users
If you receive unwanted and abusive messages report the sender of the
messages
When sending messages always us appropriate language
Think before you reply to a message

Question Answer Marks

14 Three from: 3
To adjust pagination
To avoid orphans/widows
To improve layout on the page
To allow for the change of orientation of pages in the document
To enable to start a new chapter on a new page

© UCLES 2022 Page 8 of 9


0417/13 Cambridge IGCSE – Mark Scheme October/November
PUBLISHED 2022

Question Answer Marks

15(a) Use of the Cloud 6


The cloud does not require a physical device
Storage size is not an issue with the cloud

Cloud is operated by a third party therefore security could be an issue


Require a stable internet to access to upload and download the data

Portable device: pen drive/Hard drive


The device uses USB port therefore it is easy to plug in
Does not require access to the internet to access the data

May be lost/damaged in transit


Magnetic drives can be affected by strong magnets/x rays
Limited number of read/writes

Email as an attachment
Do not require physical device

Require access to the email account both at home and in the office
The memory size could be an issue
Requires the use of the internet

15(b) Max two from: 3


Scrambling data
Changing plain text into cipher
Encryption converts text into a meaningless form

Max two from:


To prevent data/information from being understandable to people who
access/intercept the data
Protects data

15(c) 3
Part-
Compressed Flexible Job
time
hours hours sharing
working
(✓) (✓) (✓)
(✓)

An employee works a
full day but negotiates

with the employer the
start and end times

An employee works the


same time as a full ✓
week but in fewer days

An employee works for


fewer hours than a full- ✓
time employee

© UCLES 2022 Page 9 of 9



Cambridge IGCSE

INFORMATION AND COMMUNICATION TECHNOLOGY 0417/13


*0243543375*

Paper 1 Theory October/November 2022


2 hours

You must answer on the question paper.

No additional materials are needed.

INSTRUCTIONS
• Answer all questions.
• Use a black or dark blue pen.
• Write your name, centre number and candidate number in the boxes at the top of the page.
• Write your answer to each question in the space provided.
• Do not use an erasable pen or correction fluid.
• Do not write on any bar codes.
• You may use an HB pencil for any diagrams, graphs or rough working.

INFORMATION
• The total mark for this paper is 100.
• The number of marks for each question or part question is shown in brackets [ ].
• No marks will be awarded for using brand names of software packages or hardware.

This document has 16 pages. Any blank pages are indicated.

11_0417_13_2022_1.11
© UCLES 2022 [Turn over
2

1 Complete the following sentences using the most appropriate words from the list.

centred a footer a gutter a header indented


justified landscape an orphan portrait a widow

(a) The orientation of a page that is taller than it is wide is called

........................................................................................................................................... [1]

(b) An area at the bottom of a page is called

........................................................................................................................................... [1]

(c) The first line of a paragraph that appears as the last line of the previous page is called

........................................................................................................................................... [1]

(d) Text that is aligned horizontally in the middle of a line is called

........................................................................................................................................... [1]

2 A computer controlled glasshouse is used to grow plants.

State three sensors that could be used in the glasshouse.

1 ...............................................................................................................................................

2 ...............................................................................................................................................

3 ...............................................................................................................................................

[3]

3 Circle two features of multimedia presentations which would not be found in a word processed
document.

bullets images numbers photographs

sound tables text video

[2]

© UCLES 2022 11_0417_13_2022_1.11


3

4 A person contacts an online medical website that uses an expert system to allow users to
self-diagnose illnesses.

(a) Write down the component within the expert system that matches the definition given.

(i) This component contains a database of facts.

................................................................................................................................

................................................................................................................................ [1]

(ii) This component carries out the reasoning of the expert system.

................................................................................................................................

................................................................................................................................ [1]

(iii) This component allows the person to interact with the system.

................................................................................................................................

................................................................................................................................ [1]

(b) Describe how an expert system is used to diagnose an illness.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [6]

© UCLES 2022 11_0417_13_2022_1.11 [Turn over


4

5 A restaurant uses a number of different types of software. These include control, measurement,
spreadsheet and word processing software.

(a) Tick (✓) the most appropriate piece of software to carry out the tasks shown.

Word
Control Measurement Spreadsheet processing
(✓) (✓) (✓) (✓)

Producing menus for the restaurant

Calculating the cost of each of the


meals

Automatically turning on the fans


when the room gets too hot

Monitoring the temperature in the


restaurant

[4]

© UCLES 2022 11_0417_13_2022_1.11


5

The restaurant owner is planning to upgrade the software used to book reservations. He has
employed a systems analyst who is analysing the current system. The systems analyst can either
send out questionnaires for staff to answer or observe staff working with the current system.

(b) Discuss the advantages and disadvantages of using questionnaires that staff answer rather
than observing staff to gather information about the current system.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [6]

© UCLES 2022 11_0417_13_2022_1.11 [Turn over


6

6 A web page can contain images saved as png or gif file types.

(a) State what is meant by png and gif file types.

png ....................................................................................................................................

...........................................................................................................................................

gif ......................................................................................................................................

...........................................................................................................................................

[2]

(b) Explain the differences between the two file types.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [3]

© UCLES 2022 11_0417_13_2022_1.11


7

7 A school librarian is setting up a database of all the revision books he has in stock. The school
library sells revision books to students. The books range in value from $1 to $10 and are available
either in electronic book type (E) or physical book type (P).

(a) The librarian is planning to set up a number of different types of validation rule for the fields
to check data entry. Write down the most appropriate field name from the table that could be
used with each of the validation rules. Your answers must be different in each case.

Name_of_book Department ISBN Book_type Cost

Modern History HIS 0140621393432 P $5.20

GCSE ICT ICT 0006132237 E $1

A Level Calculus MAT 0006153516 E $1

Human Biology SCI 0006511376 E $2.30

Presence ..........................................................................................................................

Lookup ..............................................................................................................................

Range ...............................................................................................................................

Length ...............................................................................................................................

[4]

The librarian needs to set up a primary key field.

(b) Write down the most appropriate field name from the table that could be used as a primary
key field.

........................................................................................................................................... [1]

© UCLES 2022 11_0417_13_2022_1.11 [Turn over


8

Most of the revision books are available in electronic book type as digital versions of the printed
books. These are stored as interactive PDF files.

(c) Describe the benefits and drawbacks of using the digital versions.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [6]

© UCLES 2022 11_0417_13_2022_1.11


9

8 An organisation has changed the way in which members of staff can enter the building. Previously
they typed in a four-digit code on a key pad; now they use a device that reads a handprint.

(a) Discuss the effectiveness of using a handprint to enter the building rather than keying in a
code.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [8]

Handprint scans are an example of a biometric method to enter a building.

(b) Give two other examples of biometric methods that could be used in this scenario.

1 ........................................................................................................................................

2 ........................................................................................................................................

[2]

© UCLES 2022 11_0417_13_2022_1.11 [Turn over


10

9 The use of email has replaced many forms of communication.

Describe the constraints that you need to consider when writing and sending an email.

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

.................................................................................................................................................. [6]

10 (a) For each of the following types of backing storage give one example of its associated media.
Your answers must be different in each case.

Optical ..............................................................................................................................

...........................................................................................................................................

Magnetic ...........................................................................................................................

...........................................................................................................................................

Solid state .........................................................................................................................

...........................................................................................................................................

[3]

© UCLES 2022 11_0417_13_2022_1.11


11

(b) Describe three differences between optical and magnetic backing storage.

1 ........................................................................................................................................

...........................................................................................................................................

2 ........................................................................................................................................

...........................................................................................................................................

3 ........................................................................................................................................

...........................................................................................................................................

[3]

11 A student is carrying out some research for school.

(a) Explain two ways she could search for information on the World Wide Web (WWW).

1 ........................................................................................................................................

...........................................................................................................................................

2 ........................................................................................................................................

...........................................................................................................................................

[2]

(b) Explain the differences between the internet and the World Wide Web (WWW).

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [4]

© UCLES 2022 11_0417_13_2022_1.11 [Turn over


12

12 The internet contains three web development layers. One layer is the content layer. This layer is
used to enter the content of a web page structure.

(a) Name and describe the other two web development layers.

Layer .................................................................................................................................

Description ........................................................................................................................

...........................................................................................................................................

Layer .................................................................................................................................

Description ........................................................................................................................

...........................................................................................................................................

[4]

(b) Explain why tables can be used to structure elements within a web page.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [3]

© UCLES 2022 11_0417_13_2022_1.11


13

13 A teacher is concerned that students are playing online computer games at home without considering
eSafety. The teacher is going to create a set of rules that he feels they should be following.

Write down a list of eSafety rules that he could include.

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

.................................................................................................................................................. [6]

14 Explain why page, section and column breaks are used in documents.

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

.................................................................................................................................................. [3]

© UCLES 2022 11_0417_13_2022_1.11 [Turn over


14

15 An employee is carrying out work for her company at home. The work she is doing is confidential.
She has been advised by her company to use encryption. She wishes to transfer some of this work
to the office.

(a) Discuss two different methods she could use to transfer this work to the office. Include in your
answer the advantages and disadvantages of each method.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [6]

(b) Describe what is meant by the term encryption and why it is used.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [3]

© UCLES 2022 11_0417_13_2022_1.11


15

(c) Tick (✓) the most appropriate working pattern to match the following statements.

Compressed Flexible Job Part-time


hours hours sharing working
(✓) (✓) (✓) (✓)

An employee works a full day but


negotiates with the employer the start
and end times

An employee works the same number


of hours as a full week but in fewer
days

An employee works for fewer hours


than a full-time employee

[3]

© UCLES 2022 11_0417_13_2022_1.11


16

BLANK PAGE

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable
effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will
be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge Assessment
International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at
www.cambridgeinternational.org after the live examination series.

Cambridge Assessment International Education is part of Cambridge Assessment. Cambridge Assessment is the brand name of the University of Cambridge Local
Examinations Syndicate (UCLES), which is a department of the University of Cambridge.

© UCLES 2022 11_0417_13_2022_1.11


Cambridge IGCSE™

INFORMATION & COMMUNICATION TECHNOLOGY 0417/13


Paper 1 Theory October/November 2022
MARK SCHEME
Maximum Mark: 100

Published

This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.

Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.

Cambridge International will not enter into discussions about these mark schemes.

Cambridge International is publishing the mark schemes for the October/November 2022 series for most
Cambridge IGCSE™, Cambridge International A and AS Level components and some Cambridge O Level
components.

This document consists of 9 printed pages.

© UCLES 2022 [Turn over


0417/13 Cambridge IGCSE – Mark Scheme October/November
PUBLISHED 2022

Generic Marking Principles

These general marking principles must be applied by all examiners when marking candidate answers.
They should be applied alongside the specific content of the mark scheme or generic level descriptors
for a question. Each question paper and mark scheme will also comply with these marking principles.

GENERIC MARKING PRINCIPLE 1:

Marks must be awarded in line with:

• the specific content of the mark scheme or the generic level descriptors for the question
• the specific skills defined in the mark scheme or in the generic level descriptors for the question
• the standard of response required by a candidate as exemplified by the standardisation scripts.

GENERIC MARKING PRINCIPLE 2:

Marks awarded are always whole marks (not half marks, or other fractions).

GENERIC MARKING PRINCIPLE 3:

Marks must be awarded positively:

• marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit
is given for valid answers which go beyond the scope of the syllabus and mark scheme,
referring to your Team Leader as appropriate
• marks are awarded when candidates clearly demonstrate what they know and can do
• marks are not deducted for errors
• marks are not deducted for omissions
• answers should only be judged on the quality of spelling, punctuation and grammar when these
features are specifically assessed by the question as indicated by the mark scheme. The
meaning, however, should be unambiguous.

GENERIC MARKING PRINCIPLE 4:

Rules must be applied consistently, e.g. in situations where candidates have not followed
instructions or in the application of generic level descriptors.

GENERIC MARKING PRINCIPLE 5:

Marks should be awarded using the full range of marks defined in the mark scheme for the question
(however; the use of the full mark range may be limited according to the quality of the candidate
responses seen).

GENERIC MARKING PRINCIPLE 6:

Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should
not be awarded with grade thresholds or grade descriptors in mind.

© UCLES 2022 Page 2 of 9


0417/13 Cambridge IGCSE – Mark Scheme October/November
PUBLISHED 2022

Question Answer Marks

1(a) portrait 1

1(b) a footer 1

1(c) an orphan 1

1(d) centred 1

Question Answer Marks

2 Three from: 3
Light
Temperature
Humidity/moisture
pH
CO2

Question Answer Marks

3 Sound 2
Video

Question Answer Marks

4(a)(i) Knowledge base 1

4(a)(ii) Inference engine 1

4(a)(iii) Interactive user interface 1

4(b) Six from: 6


An Interactive user interface appears
The expert system asks questions about the illness
Yes and No type answers to the questions
Answers lead to other questions
The inference engine searches…
…the knowledge base…
…uses the rules base
Probabilities/possibilities of diagnoses and treatments are displayed
Displays the ways it achieved the solutions/conclusions

© UCLES 2022 Page 3 of 9


0417/13 Cambridge IGCSE – Mark Scheme October/November
PUBLISHED 2022

Question Answer Marks

5(a) 4
Control Measure Spread Wordproc
(✓) ment sheet essing
(✓) (✓) (✓)

Producing menus for the



restaurant

Calculating the cost of



each of the meals

Automatically turning on
the fans when the room ✓
gets too hot

Monitoring the
temperature in the ✓
restaurant

5(b) Six from: 6


Advantages
Answers are more honest as they are anonymous
Staff can remain anonymous whereas the observation cannot be
anonymous
Can be sent to all the staff at the same time whereas the observer may only
see one part of the operation
Questionnaires can be filled in at any time whereas observations can only
be carried out when the restaurant is working
Analysis of questionnaire can be carried out automatically whereas
observations the observer must produce notes
Observer may miss elements whereas questionnaires are filled in by the
users

Disadvantages
Users do not always complete the questionnaire and hand it back but
observation watches users working
Work rate can be influenced by being observed but this does not apply to
questionnaires
More chances of incorrect data if question not understood
The observer can see exactly how the system works well and not so well
whereas a questionnaire takes the users viewpoint

To gain full marks the discussion must have correct answers for both
advantages and disadvantages

© UCLES 2022 Page 4 of 9


0417/13 Cambridge IGCSE – Mark Scheme October/November
PUBLISHED 2022

Question Answer Marks

6(a) png 2
One from:
Raster/full colour digital photos
Images with a transparent background

gif
Moving/animated image

6(b) Three from: 3


Same images saved as a GIF loads/reads faster than PNG
GIF uses limited colours (256) whereas PNG uses a bitmap of colours
GIF can have moving and static images whereas PNG only have static
images
PNG can have transparent background
PNG is compressed
PNG is lossless

Question Answer Marks

7(a) Presence ISBN 4


Lookup Book_type
Range Cost
Length Department

7(b) ISBN 1

7(c) Six from: 6


Benefits
Digital therefore can easily be used in other documents/software
Instant access on many devices
More accessible for disabled
Quicker to search digital books

Drawbacks
Health issues with using a computer to read the book
Cannot be written in braille
May require extra software/reader
Never own the book as it is only data
Need to purchase a device to read them
Needs the internet to download the book

To gain full marks the description must have correct answers for both
benefits and drawbacks

© UCLES 2022 Page 5 of 9


0417/13 Cambridge IGCSE – Mark Scheme October/November
PUBLISHED 2022

Question Answer Marks

8(a) Eight from: 8


Positives
Data can be read/identified faster
Data can be read/identified by electronic comparison therefore relative higher
level of accuracy
Increases security as the hand is unique whereas a four-digit code easier to
guess
Can’t forget your handprint, unlike a code
The person must be present to enter the building

Negatives
If the hand is damaged, then may not work
More difficult to change biometric data
Only works with one hand therefore difficult for right-handed people
Recognition could be slower as system is more complex
Harder to set up the biometric system
Takes longer to add new people/change biometric data to the system
Biometrics can use a lot of memory to store the data
Intrusive as personal details must be stored in biometrics
More likely to be affected by the environment

To gain full marks the discussion must have correct answers for both
positives and negatives

8(b) Two from: 2


Fingerprint
Vein geometry
Retina
Iris
Face

Question Answer Marks

9 Six from: 6
Abide by the laws within the country that affect the general use of emails
Use acceptable language
Abide by copyright
Follow local guidelines set by an employer/schools
Use appropriate security
Follow netiquette
Respect other people/s/own privacy
Be aware of the need for password protection
Be aware that email accounts can be Illegally accessed

© UCLES 2022 Page 6 of 9


0417/13 Cambridge IGCSE – Mark Scheme October/November
PUBLISHED 2022

Question Answer Marks

10(a) Optical 3
CD ROM/DVD ROM, CD R/DVD R, CD RW/DVD RW, DVD RAM, Blu-ray
discs/CD/DVD

Magnetic
Fixed/portable/removable hard disks/magnetic tape.

Solid state
Memory stick/flash card

10(b) Three from: 3


Optical data is stored using laser whereas Magnetic data is stored using
magnetic fields
Optical disc storage is serial whereas Magnetic disk storage is direct/sectors
and tracks
Magnetic storage is affected by magnetic fields whereas Optical storage is
not
Magnetic media tends to store more data than optical media
Optical storage is more robust
Optical has a faster data access/transfer speed

Question Answer Marks

11(a) Two from: 2


Type in a web address
Use a search engine
Type what you need on the search bar

11(b) Four from: 4


The internet
Network of Networks//WAN
It is the infrastructure
Contains email, FTP

The World Wide Web


Collection of websites
Accessed from the internet
Service of the internet

To gain full marks the explanation must have correct answers for both
the internet and World Wide Web

© UCLES 2022 Page 7 of 9


0417/13 Cambridge IGCSE – Mark Scheme October/November
PUBLISHED 2022

Question Answer Marks

12(a) Presentation 4
Defines the format of a web page/individual elements through styling

Behaviour
To enter scripting language to a web page/individual element

12(b) Three from: 3


Allows greater control over page layout
Positions elements/data on the page
Conveys relationships between items
Displays data

Question Answer Marks

13 Six from: 6
Examples
Do not give away personal information
Do not use your real name as your username
Do not use your face image as your avatar
If you receive messages from unwanted users block and report them
Do not meet unknown users in real life//use a chaperone
Do not give financial information to other users
If you receive unwanted and abusive messages report the sender of the
messages
When sending messages always us appropriate language
Think before you reply to a message

Question Answer Marks

14 Three from: 3
To adjust pagination
To avoid orphans/widows
To improve layout on the page
To allow for the change of orientation of pages in the document
To enable to start a new chapter on a new page

© UCLES 2022 Page 8 of 9


0417/13 Cambridge IGCSE – Mark Scheme October/November
PUBLISHED 2022

Question Answer Marks

15(a) Use of the Cloud 6


The cloud does not require a physical device
Storage size is not an issue with the cloud

Cloud is operated by a third party therefore security could be an issue


Require a stable internet to access to upload and download the data

Portable device: pen drive/Hard drive


The device uses USB port therefore it is easy to plug in
Does not require access to the internet to access the data

May be lost/damaged in transit


Magnetic drives can be affected by strong magnets/x rays
Limited number of read/writes

Email as an attachment
Do not require physical device

Require access to the email account both at home and in the office
The memory size could be an issue
Requires the use of the internet

15(b) Max two from: 3


Scrambling data
Changing plain text into cipher
Encryption converts text into a meaningless form

Max two from:


To prevent data/information from being understandable to people who
access/intercept the data
Protects data

15(c) 3
Part-
Compressed Flexible Job
time
hours hours sharing
working
(✓) (✓) (✓)
(✓)

An employee works a
full day but negotiates

with the employer the
start and end times

An employee works the


same time as a full ✓
week but in fewer days

An employee works for


fewer hours than a full- ✓
time employee

© UCLES 2022 Page 9 of 9



Cambridge IGCSE

INFORMATION AND COMMUNICATION TECHNOLOGY 0417/13


*1803529937*

Paper 1 Theory May/June 2023


1 hour 30 minutes

You must answer on the question paper.

No additional materials are needed.

INSTRUCTIONS
• Answer all questions.
• Use a black or dark blue pen.
• Write your name, centre number and candidate number in the boxes at the top of the page.
• Write your answer to each question in the space provided.
• Do not use an erasable pen or correction fluid.
• Do not write on any bar codes.
• You may use an HB pencil for any diagrams, graphs or rough working.
INFORMATION
• The total mark for this paper is 80.
• The number of marks for each question or part question is shown in brackets [ ].
• No marks will be awarded for using brand names of software packages or hardware.

This document has 16 pages. Any blank pages are indicated.

06_0417_13_2023_1.12
© UCLES 2023 [Turn over
2

1 A book has an ISBN which is 0 330 24720 4

Tick (✓) the most appropriate validation check to test the validity of the ISBN.

A character check

B format check

C length check

D range check
[1]

2 Identify the most appropriate hardware from the descriptions given.

(a) An internal hardware component that connects a computer to a Local Area Network.

........................................................................................................................................... [1]

(b) An external device that retains a computer’s data even after the computer is turned off.

........................................................................................................................................... [1]

(c) An input device that is attached to a monitor.

........................................................................................................................................... [1]

© UCLES 2023 06_0417_13_2023_1.12


3

3 A group of students are producing a class newsletter which they will email to parents of
students in the class. They are deciding whether to use a laptop computer or a smartphone
to type the newsletter.

(a) Discuss the advantages and disadvantages of using a laptop computer rather than a
smartphone for this purpose.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [6]

© UCLES 2023 06_0417_13_2023_1.12 [Turn over


4

(b) The students have decided to use a smartphone. Data for the newsletter will be input,
stored and output by the smartphone.

(i) Identify two devices that are part of the smartphone that could be used to input
the data for the newsletter.

1 ............................................................................................................................

2 ............................................................................................................................

[2]

(ii) Identify two devices that are part of the smartphone that could be used to output
data from the newsletter.

1 ............................................................................................................................

2 ............................................................................................................................

[2]

(iii) Identify two appropriate devices that could be used to store data for the
newsletter.

1 ............................................................................................................................

2 ............................................................................................................................

[2]

(c) The newsletter is to be saved as a PDF and sent as an email attachment to parents.

Describe two benefits of saving the newsletter as a PDF.

1 ........................................................................................................................................

...........................................................................................................................................

2 ........................................................................................................................................

...........................................................................................................................................

[2]

© UCLES 2023 06_0417_13_2023_1.12


5

(d) Describe the features that the students must include to make the newsletter appeal to
the parents.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [4]

© UCLES 2023 06_0417_13_2023_1.12 [Turn over


6

4 A company uses an intranet. They are considering using an extranet.

Compare an intranet with an extranet. Your answer must include similarities and differences.

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

.................................................................................................................................................. [6]

5 Identify two appropriate IT-related causes for each of the health issues. Your answers
must be different in each case.

(a) repetitive strain injury (RSI)

1 ........................................................................................................................................

2 ........................................................................................................................................

[2]

(b) eye strain

1 ........................................................................................................................................

2 ........................................................................................................................................

[2]

© UCLES 2023 06_0417_13_2023_1.12


7

6 Two-factor authentication can use a number of different forms of identification.

(a) One form of identification is to use ‘where the user is’.


An example of this would be the user’s GPS location.

State two other forms of identification. Give an appropriate example of each.

1 ........................................................................................................................................

...........................................................................................................................................

Example ............................................................................................................................

...........................................................................................................................................

2 ........................................................................................................................................

...........................................................................................................................................

Example ............................................................................................................................

...........................................................................................................................................

[4]

(b) Explain the purpose of two-factor authentication.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [2]

© UCLES 2023 06_0417_13_2023_1.12 [Turn over


8

7 The retail industry uses point of sale (POS) systems.

(a) Discuss the benefits of using POS in the retail industry.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [4]

(b) Describe the steps involved in automatic stock control when an item is sold at a POS
terminal.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [6]

© UCLES 2023 06_0417_13_2023_1.12


9

8 A teacher is creating a spreadsheet as an electronic mark book. Part of the electronic mark
book displays how well a student did on a piece of work. When a student completes a piece
of work the teacher will enter the mark into the electronic mark book and a message will be
displayed.

• If the student gains 60 or more marks then ‘Merit’ is displayed


• If the student gains 50 to 59 marks then ‘Pass’ is displayed
• If the student gains a mark below 50 marks then ‘Not Pass’ is displayed.

The formula the teacher has used is:

=IF(A1>=60,"Merit",IF(A1>50,"Pass","Not Pass"))

The formula will need to be tested. The teacher will do this by entering test data into cell A1.

(a) Explain the steps that need to be taken to test the formula. Include in your answer any
test data used and the reasons why these were chosen.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [5]

(b) When the teacher enters a mark of 50 he expects ‘Pass’ to be displayed.

State the changes he needs to make to the formula to ensure ‘Pass’ is displayed.

...........................................................................................................................................

........................................................................................................................................... [1]

© UCLES 2023 06_0417_13_2023_1.12 [Turn over


10

(c) When the electronic mark book is complete it needs to be tested with live data.

Explain what is meant by live data.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [2]

9 The manager of an organisation is planning a meeting of its directors. The manager plans
to use audio-conferencing for the meeting.

(a) Explain what is meant by audio-conferencing.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [3]

(b) The organisation could use video-conferencing for the meeting.

Describe three advantages of using audio-conferencing rather than video-conferencing


in this scenario.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [3]

© UCLES 2023 06_0417_13_2023_1.12


11

(c) Identify the hardware and software required to join the audio-conference.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [4]

10 A school secretary is composing an email. She will send the email to a teacher and will
copy the headteacher into the message. She can either copy the headteacher in as cc or
bcc.

Compose

To:
cc:
bcc:
Subject:

(a) Describe what is meant by cc and bcc.

cc ......................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

bcc ....................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

[4]

© UCLES 2023 06_0417_13_2023_1.12 [Turn over


12

(b) A teacher is considering setting up either a forum or a blog for his class to help his
students with their studies.

Describe the benefits of using a forum rather than a blog.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [5]

11 Many books contain a gutter margin.

Explain what is meant by a gutter margin.

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

.................................................................................................................................................. [3]

12 A web page has an attached stylesheet in the head section and also has an inline style
attribute in the body section.

Explain why the inline style attribute is used.

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

.................................................................................................................................................. [2]

© UCLES 2023 06_0417_13_2023_1.12


13

BLANK PAGE

© UCLES 2023 06_0417_13_2023_1.12


14

BLANK PAGE

© UCLES 2023 06_0417_13_2023_1.12


15

BLANK PAGE

© UCLES 2023 06_0417_13_2023_1.12


16

BLANK PAGE

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.

Cambridge Assessment International Education is part of Cambridge Assessment. Cambridge Assessment is the brand name of the University of Cambridge
Local Examinations Syndicate (UCLES), which is a department of the University of Cambridge.

© UCLES 2023 06_0417_13_2023_1.12


Cambridge IGCSE™

INFORMATION AND COMMUNICATION TECHNOLOGY 0417/13


Paper 1 Theory May/June 2023
MARK SCHEME
Maximum Mark: 80

Published

This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.

Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.

Cambridge International will not enter into discussions about these mark schemes.

Cambridge International is publishing the mark schemes for the May/June 2023 series for most
Cambridge IGCSE, Cambridge International A and AS Level and Cambridge Pre-U components, and some
Cambridge O Level components.

This document consists of 9 printed pages.

© UCLES 2023 [Turn over


0417/13 Cambridge IGCSE – Mark Scheme May/June 2023
PUBLISHED

Generic Marking Principles

These general marking principles must be applied by all examiners when marking candidate answers.
They should be applied alongside the specific content of the mark scheme or generic level descriptors
for a question. Each question paper and mark scheme will also comply with these marking principles.

GENERIC MARKING PRINCIPLE 1:

Marks must be awarded in line with:

 the specific content of the mark scheme or the generic level descriptors for the question
 the specific skills defined in the mark scheme or in the generic level descriptors for the question
 the standard of response required by a candidate as exemplified by the standardisation scripts.

GENERIC MARKING PRINCIPLE 2:

Marks awarded are always whole marks (not half marks, or other fractions).

GENERIC MARKING PRINCIPLE 3:

Marks must be awarded positively:

 marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit
is given for valid answers which go beyond the scope of the syllabus and mark scheme,
referring to your Team Leader as appropriate
 marks are awarded when candidates clearly demonstrate what they know and can do
 marks are not deducted for errors
 marks are not deducted for omissions
 answers should only be judged on the quality of spelling, punctuation and grammar when these
features are specifically assessed by the question as indicated by the mark scheme. The
meaning, however, should be unambiguous.

GENERIC MARKING PRINCIPLE 4:

Rules must be applied consistently, e.g. in situations where candidates have not followed
instructions or in the application of generic level descriptors.

GENERIC MARKING PRINCIPLE 5:

Marks should be awarded using the full range of marks defined in the mark scheme for the question
(however; the use of the full mark range may be limited according to the quality of the candidate
responses seen).

GENERIC MARKING PRINCIPLE 6:

Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should
not be awarded with grade thresholds or grade descriptors in mind.

© UCLES 2023 Page 2 of 9


0417/13 Cambridge IGCSE – Mark Scheme May/June 2023
PUBLISHED

Mark scheme Abbreviations and Rules

/ separates alternative words / phrases within a marking point


// separates alternative answers within a marking point
underline actual word given must be used by candidate (grammatical variants accepted)
max indicates the maximum number of marks that can be awarded
( ) the word / phrase in brackets is not required, but sets the context

Note: No marks are awarded for using brand names of software packages or hardware. These must
be created.

Examiners must ensure that annotations are placed to show that the whole answer has been
seen

Annotations MUST be placed in white space close to where the mark is awarded

Before submitting a script please check all ticks match marks

At the end of prose answers place a TV to show that the whole answer has been marked

Any blank pages place the SEEN annotation

If an answer is left blank then use SEEN and award NR, but if anything has been written for
example ‘Don’t know’, ‘?’ etc. then use NAQ and award 0. If an answer has been attempted
and crossed out then attempt to mark it.

© UCLES 2023 Page 3 of 9


0417/13 Cambridge IGCSE – Mark Scheme May/June 2023
PUBLISHED

Question Answer Marks

1 B Format check 1

Question Answer Marks

2(a) Network Interface Card / NIC 1

2(b) Backing storage 1

2(c) Touch screen 1

Question Answer Marks

3(a) Six from: 6

Advantages
Larger screen to read the typed data
Laptop uses a physical keyboard therefore easier to type
Larger keyboard to type in the data
Fewer data entry errors due to larger screen / keyboard
More suited for entering mass amounts of data
Laptop version of software will have more features than smartphone version
of software
More computer storage for typed text
Easier to add other devices to store the data

Disadvantages
Less portable / heavier than a smartphone as the smartphone can be
slipped into a pocket
Smartphones are smaller therefore easier to carry
More likely to have a smartphone with them

To gain full marks candidates must have correct answers from both
advantages and disadvantages.

3(b)(i) Two from: 2

Camera
Microphone
Touch screen

3(b)(ii) Two from: 2

Speaker
Screen

3(b)(iii) Two from: 2

SD card
Flash memory
Internal storage
SSD

© UCLES 2023 Page 4 of 9


0417/13 Cambridge IGCSE – Mark Scheme May/June 2023
PUBLISHED

Question Answer Marks

3(c) Two from: 2

Retains the format of the original newsletter


Takes up less storage space
Independent of hardware and software

3(d) Four from: 4


Interesting / engaging content
Use of longer sentences / not using slang / emoticons
Use of some technical language
More text than pictures
Balanced use of white space and content
Clear readable fonts
Formal layout
Balance of size between headings and text
Contrasting colours
Use suitable images
More real images than cartoons

Question Answer Marks

4 Six from: 6

Similarities
Both have shared content
Both use internet technologies / TCP-IP
Both have restricted access
Both sit behind a firewall

Differences
Intranet shares data within an organisation whereas extranet shares content
with external users and employees
Extranet is part of a company’s intranet
Intranet allows communication within the organisation whereas extranet
allows communication with customers / suppliers
Extranet can lead to more security breaches
Intranet is owned is by a single organisation whereas extranet can be used
by several organisations

To gain full marks candidates must have correct answers from both
similarities and differences

© UCLES 2023 Page 5 of 9


0417/13 Cambridge IGCSE – Mark Scheme May/June 2023
PUBLISHED

Question Answer Marks

5(a) Two from: 2

Prolonged use of a keyboard


Prolonged use of a mouse
Using a keyboard with a bad posture
Working in a cramped workspace

5(b) Two from: 2

Staring at a computer screen for a long time


Glare / flicker on the computer screen
Dirt on the computer screen
Screen brightness does not match the room light brightness
Sitting too close to the screen
Top of monitor not in line with the eyes

Question Answer Marks

6(a) One mark for each form of identification and one mark for each 4
corresponding example given:

Form of identification: something the user owns:


Example: card reader / pen drive / dongle / mobile phone

Form of identification: something the user knows:


Example: password / PIN / TAN / email address / CVV on back of a credit
card / answers to security questions

Form of identification: something the user has:


Example: biometrics

6(b) Two from: 2

To protect user’s data / credentials


To reduce the possibility of unauthorised access
Combines two different forms of identification
Makes it more secure by adding an extra layer of security

© UCLES 2023 Page 6 of 9


0417/13 Cambridge IGCSE – Mark Scheme May/June 2023
PUBLISHED

Question Answer Marks

7(a) Four from: 4

By electronically tracking the sales of goods the industry could know when
to order items…
…so that the goods do not run out in the stores
The POS system allows a business to identify which products are selling
well / selling badly…
…so products do not run out / left of the shelves
Through this identification, a business can increase the order of profitable
products and reduce unmarketable inventory
Increases speed of transaction as the checkout staff do not need to enter
the price of each item
Itemised bills can be generated on screen and printed for customers
It allows self check out which means less staff are needed therefore
reducing staff costs

7(b) Six from: 6

The (bar codes on) goods are scanned at the checkout


The item code is searched in the stock database
When the item is found…
…the number sold of that item is read
The number in stock is reduced by this number
If the number in stock is lower than the reorder / preset value…
…then a message is sent to automatically re-order stock
When the new stock arrives database is updated with the new stock
Quantity available will be increased when new stock arrives
Generates a report on selling trends

Question Answer Marks

8(a) Five from: 5


Enter test data
Run the formula
If actual output does not match expected value…
…make corrections to formula
Re-test the formula

8(b) One from: 1

Change A1 > 50 to A1 > = 50


Change A1 > 50 to A1 > 49

8(c) Two from: 2

Real data relating to tests that have been carried out previously
To ensure that the electronic mark book should work with real data

© UCLES 2023 Page 7 of 9


0417/13 Cambridge IGCSE – Mark Scheme May/June 2023
PUBLISHED

Question Answer Marks

9(a) Three from: 3

Audio-conferencing is where two or more people…


…in different locations
…use technology to hold an audio call
All the participants dial into a central system that connects them
Removes the need to directly call each other

9(b) Three from: 3

Easier to set up
Does not need specialist equipment…
…therefore saves money
No issue with lip syncing
Less bandwidth is needed therefore reduces hanging / freeze
More privacy as they do not use cameras

9(c) Max three from: 4


Microphone
Speaker
Telephone handset

Max two from:


Audio-conferencing software / app
Internet / broadband connection

Question Answer Marks

10(a) Four from: 4

CC
Cc stands for carbon copy
The Headteacher would receive a copy of the message with the teacher
knowing
All recipients would know who is on the cc list and where it was from

BCC
Bcc stands for blind carbon copy
The Headteacher would receive a copy of the message without the teacher
knowing
All recipients on bcc would only know where it was from to and the cc list

To gain full marks candidates must have correct answers from both cc
and bcc.

© UCLES 2023 Page 8 of 9


0417/13 Cambridge IGCSE – Mark Scheme May/June 2023
PUBLISHED

Question Answer Marks

10(b) Five from: 5

In forum posts are in chronological order therefore it makes it easier to find


replies / data
In forums easier for students to start new topics / sub-topics / forums / ask
questions/give answers
Topics / sub-topics cannot be created in a blog by the student
Forums are moderated by an administrator
Forums are checked before they are published
In forums students generate the content rather than leaving messages on a
named topic
Many students develop the direction of the forum rather than one person
In forums everyone can contribute / / In blogs only the content creator writes
the blog whereas the readers / followers can comment on a blog
A forum would allow private messaging as well as to all the group

Question Answer Marks

11 Three from: 3

Used as an extra margin


Adds extra space to the inside / top margin
Helps to ensure the text is not obscured by the binding

Question Answer Marks

12 Two from: 2

Inline style attributes have a higher hierarchy than external stylesheets


If there is a conflict on an element then the inline style attribute will apply
It applies style attributes that do not appear in the external stylesheet
Inline style attributes apply to one single web page

© UCLES 2023 Page 9 of 9



Cambridge IGCSE

INFORMATION AND COMMUNICATION TECHNOLOGY 0417/12


*3882223209*

Paper 1 Theory May/June 2023


1 hour 30 minutes

You must answer on the question paper.

No additional materials are needed.

INSTRUCTIONS
• Answer all questions.
• Use a black or dark blue pen.
• Write your name, centre number and candidate number in the boxes at the top of the page.
• Write your answer to each question in the space provided.
• Do not use an erasable pen or correction fluid.
• Do not write on any bar codes.
• You may use an HB pencil for any diagrams, graphs or rough working.

INFORMATION
• The total mark for this paper is 80.
• The number of marks for each question or part question is shown in brackets [ ].
• No marks will be awarded for using brand names of software packages or hardware.

This document has 12 pages. Any blank pages are indicated.

06_0417_12_2023_1.13
© UCLES 2023 [Turn over
2

1 A book contains a bar code whose number is 503619309903

Tick (✓) the most appropriate validation check to test the validity of the bar code.

A check digit

B format check

C range check

D spell check
[1]

2 Identify the most appropriate hardware from the descriptions given:

(a) non-volatile internal memory used to store the start-up instructions

........................................................................................................................................... [1]

(b) an internal component that provides the input and output of audio signals

........................................................................................................................................... [1]

(c) an internal component that is composed of the main memory, the control unit and the arithmetic
logic unit.

........................................................................................................................................... [1]

3 A headteacher is producing a web page about the history of her school. She has been given some
old hard-copy photographs which she will include on the web page. She has a digital camera and
a scanner to use to convert the hard-copy photographs into a digital format.

Compare the use of a digital camera with a scanner in this scenario. Your answer must include
similarities and differences.

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

.................................................................................................................................................. [4]

© UCLES 2023 06_0417_12_2023_1.13


3

4 A company uses an extranet.

(a) Explain what is meant by an extranet.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [2]

(b) Describe the differences between the internet and an extranet.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [2]

5 State which health issue is most likely to occur from each description shown. Your answer must
be different in each case.

(a) typing on a keyboard for long periods of time

........................................................................................................................................... [1]

(b) looking at a computer screen for a long time

........................................................................................................................................... [1]

(c) sitting with poor posture

........................................................................................................................................... [1]

© UCLES 2023 06_0417_12_2023_1.13 [Turn over


4

6 A company requires its employees to regularly change their login passwords for the company’s
computer systems. Passwords must be strong and cannot be reused.

(a) Explain three problems that may occur when the employees change their passwords regularly.

1 ........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

2 ........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

3 ........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

[6]

(b) The company has a website which uses a digital certificate.

Explain the purpose of the digital certificate.

...........................................................................................................................................

........................................................................................................................................... [1]

(c) A digital certificate is attached to an email.

State three items contained in a digital certificate.

1 ........................................................................................................................................

2 ........................................................................................................................................

3 ........................................................................................................................................

[3]

© UCLES 2023 06_0417_12_2023_1.13


5

7 A student is creating a spreadsheet that includes a formula to check a number entered in a cell is
between two values.

• The number is entered in cell A10 as an integer.


• If the number is between the two values then a message ‘OK’ is displayed, otherwise ‘error’
is displayed.

The formula the student has created is:

=IF(AND(A10>1,A10<32),"OK","error")

Data will be used to test the formula.

(a) Identify two items of extreme test data the student should use and give the reason why this
data was chosen.

Extreme test data 1 ..........................................................................................................

Extreme test data 2 ..........................................................................................................

Reason .............................................................................................................................

...........................................................................................................................................

[3]

(b) The student has entered an item of abnormal test data.

Explain why abnormal test data is used.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [3]

© UCLES 2023 06_0417_12_2023_1.13 [Turn over


6

8 A teacher provides revision lessons during the holidays. The teacher plans to use web-conferencing
for the lessons.

(a) Explain what is meant by web-conferencing.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [3]

(b) Evaluate the use of web-conferencing in this scenario.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [6]

© UCLES 2023 06_0417_12_2023_1.13


7

9 (a) The products in a warehouse contain either a bar code or a Radio Frequency Identification
(RFID) tag.

The data about each product is read electronically.

Compare bar code readers and RFID readers. Your answer must include similarities and
differences.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [6]

(b) Identify two other uses of RFID.

1 ........................................................................................................................................

2 ........................................................................................................................................

[2]

© UCLES 2023 06_0417_12_2023_1.13 [Turn over


8

10 Metatags can be used in a web page.

(a) A metatag can be used to define the viewport settings.

Identify three other items that can be defined in metatags.

1 ........................................................................................................................................

2 ........................................................................................................................................

3 ........................................................................................................................................

[3]

(b) Metatags are used in the HTML of web pages.

State the section of the HTML which contains the metatags.

........................................................................................................................................... [1]

11 Some gaming systems use gesture based user interfaces to operate a game.

(a) Describe what is meant by a gesture based user interface.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [2]

(b) Describe the drawbacks of using gesture based user interfaces in this way.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [4]

© UCLES 2023 06_0417_12_2023_1.13


9

12 Movies can be stored on Blu-ray discs or an internal hard disk.

(a) Describe why Blu-ray discs are preferred to an internal hard disk for storing movies.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [4]

(b) Hard disks and Blu-ray discs are examples of backing storage.

(i) State two characteristics of backing storage.

1 ............................................................................................................................

................................................................................................................................

2 ............................................................................................................................

................................................................................................................................

[2]

(ii) Identify two other types of backing storage.

1 ............................................................................................................................

2 ............................................................................................................................

[2]

© UCLES 2023 06_0417_12_2023_1.13 [Turn over


10

13 Weather forecasters use computer modelling.

(a) Explain why computer modelling is used to forecast the weather.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [4]

(b) Data is collected by different types of sensor and then input to the computer model to be
processed.

Identify two sensors that could be used to collect weather data.

1 ........................................................................................................................................

2 ........................................................................................................................................

[2]

(c) The processed data is then output.

Identify two output devices that could be used.

1 ........................................................................................................................................

2 ........................................................................................................................................

[2]

© UCLES 2023 06_0417_12_2023_1.13


11

14 ePublishing software is used to create an ePublication to display a school’s yearly magazine.

(a) Describe the characteristics of an ePublication.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [4]

(b) The ePublishing software is subject to software copyright legislation.

Give two methods that could be used to prevent software copyright legislation being broken.

1 ........................................................................................................................................

...........................................................................................................................................

2 ........................................................................................................................................

...........................................................................................................................................

[2]

© UCLES 2023 06_0417_12_2023_1.13


12

BLANK PAGE

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.

Cambridge Assessment International Education is part of Cambridge Assessment. Cambridge Assessment is the brand name of the University of Cambridge
Local Examinations Syndicate (UCLES), which is a department of the University of Cambridge.

© UCLES 2023 06_0417_12_2023_1.13


Cambridge IGCSE™

INFORMATION AND COMMUNICATION TECHNOLOGY 0417/12


Paper 1 Theory May/June 2023
MARK SCHEME
Maximum Mark: 80

Published

This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.

Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.

Cambridge International will not enter into discussions about these mark schemes.

Cambridge International is publishing the mark schemes for the May/June 2023 series for most
Cambridge IGCSE, Cambridge International A and AS Level and Cambridge Pre-U components, and some
Cambridge O Level components.

This document consists of 9 printed pages.

© UCLES 2023 [Turn over


0417/12 Cambridge IGCSE – Mark Scheme May/June 2023
PUBLISHED

Generic Marking Principles

These general marking principles must be applied by all examiners when marking candidate answers.
They should be applied alongside the specific content of the mark scheme or generic level descriptors
for a question. Each question paper and mark scheme will also comply with these marking principles.

GENERIC MARKING PRINCIPLE 1:

Marks must be awarded in line with:

 the specific content of the mark scheme or the generic level descriptors for the question
 the specific skills defined in the mark scheme or in the generic level descriptors for the question
 the standard of response required by a candidate as exemplified by the standardisation scripts.

GENERIC MARKING PRINCIPLE 2:

Marks awarded are always whole marks (not half marks, or other fractions).

GENERIC MARKING PRINCIPLE 3:

Marks must be awarded positively:

 marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit
is given for valid answers which go beyond the scope of the syllabus and mark scheme,
referring to your Team Leader as appropriate
 marks are awarded when candidates clearly demonstrate what they know and can do
 marks are not deducted for errors
 marks are not deducted for omissions
 answers should only be judged on the quality of spelling, punctuation and grammar when these
features are specifically assessed by the question as indicated by the mark scheme. The
meaning, however, should be unambiguous.

GENERIC MARKING PRINCIPLE 4:

Rules must be applied consistently, e.g. in situations where candidates have not followed
instructions or in the application of generic level descriptors.

GENERIC MARKING PRINCIPLE 5:

Marks should be awarded using the full range of marks defined in the mark scheme for the question
(however; the use of the full mark range may be limited according to the quality of the candidate
responses seen).

GENERIC MARKING PRINCIPLE 6:

Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should
not be awarded with grade thresholds or grade descriptors in mind.

© UCLES 2023 Page 2 of 9


0417/12 Cambridge IGCSE – Mark Scheme May/June 2023
PUBLISHED

Mark scheme Abbreviations and Rules

/ separates alternative words / phrases within a marking point


// separates alternative answers within a marking point
underline actual word given must be used by candidate (grammatical variants accepted)
max indicates the maximum number of marks that can be awarded
( ) the word / phrase in brackets is not required, but sets the context

Note: No marks are awarded for using brand names of software packages or hardware. These must
be created

Examiners must ensure that annotations are placed to show that the whole answer has been
seen.

Annotations MUST be placed in white space close to where the mark is awarded.

Before submitting a script please check all ticks match marks.

At the end of prose answers place a TV to show that the whole answer has been marked.

Any blank pages place the SEEN annotation.

If an answer is left blank then use SEEN and award NR, but if anything has been written for
example ‘Don’t know’, ‘?’ etc. then use NAQ and award 0. If an answer has been attempted and
crossed out then attempt to mark it.

© UCLES 2023 Page 3 of 9


0417/12 Cambridge IGCSE – Mark Scheme May/June 2023
PUBLISHED

Question Answer Marks

1 Check digit 1

Question Answer Marks

2(a) Read Only Memory/ROM 1

2(b) Sound card 1

2(c) CPU/Processor 1

Question Answer Marks

3 Four from: 4

Similarities
Both capture images
Both store digital data
Both create digital images

Differences
Digital camera is more portable
Scanner captures the image in more detail
Scanners do not have a keystone effect
Digital camera may capture glare/shadow off the image
Digital camera has faster data capture

To gain full marks the comparison must have correct answers for both
similarities and differences.

Question Answer Marks

4(a) Two from: 2


An extranet is part of a company's intranet
The company gives permission for customers and suppliers to access it
Enables businesses to exchange information over the internet in a secure way
Requires credentials/username and password to access it

4(b) Two from: 2


Internet allows public access to information whereas Extranet allows limited
access
Extranet is more secure
The internet is not owned by anyone whereas the Extranet is owned by a
company
More information on the internet

© UCLES 2023 Page 4 of 9


0417/12 Cambridge IGCSE – Mark Scheme May/June 2023
PUBLISHED

Question Answer Marks

5(a) Repetitive strain injury/RSI/carpel syndrome 1

5(b) Eye strain/headache/neckache 1

5(c) Neck ache/back ache 1

Question Answer Marks

6(a) Three matched pairs from: 6

The passwords could become similar …


… security/passwords could be weakened

May be more difficult to find a different password …


… the passwords/security could be weakened

Users could easily forget the current password …


… leading to system lock out

It may be typed incorrectly as the password is like the previous one …


… could lead to login errors

Users may have to write the passwords down so they are not forgotten …
… this may lead to others seeing the passwords

6(b) One from: 1


To ensure a website is trusted/authentic/genuine
Verifies if the company owns the website
To share a public key for encryption when communicating with the website

6(c) Three from: 3


Company/owner's name
Owner's/company public key
Date issued
Expiry date
Company/owner's digital signature
Issuer's/Sender’s name
Serial number

Question Answer Marks

7(a) 2 – 1 mark 3
31 – 1 mark

One from:
To test the boundaries (of the formula)
To test the comparisons are correct

© UCLES 2023 Page 5 of 9


0417/12 Cambridge IGCSE – Mark Scheme May/June 2023
PUBLISHED

Question Answer Marks

7(b) Three from: 3


To test that data outside the range is not acceptable
To test that the correct data type is entered
To test that the error message works
To test that the errors are trapped correctly

Question Answer Marks

8(a) Three from: 3


Form of real-time/live/online communication
Multiple users/devices connect …
… using the internet
All users see the same screen.
Communication using video cameras/microphones

8(b) Six from: 6

Positives
The students save time as they do not need to travel to the school
The students save the cost of travelling to the school.
The school saves costs as it does not need to open in the holidays
Students and teachers can work from anywhere in the world
Can be recorded for students who miss the lesson

Negatives
Hardware/software could be expensive
Requires a good/reliable internet connection
There could be issues with child protection
More difficult to concentrate/motivate
If the hardware breaks/loss of connection/lack of hardware then the student
cannot participate
Only students with the correct specialist devices will be able to access

To gain full marks candidates must have correct answers for both
positives and negatives

© UCLES 2023 Page 6 of 9


0417/12 Cambridge IGCSE – Mark Scheme May/June 2023
PUBLISHED

Question Answer Marks

9(a) Six from: 6

Similarities
Both readers scan the product code
Both readers use direct data entry
Both readers allow tracking of products
Both readers are contactless

Differences
Bar code readers only scan one bar code at a time whereas RFID readers
read multiple tags at the same time
Bar code readers require a direct line-of-sight with the code
RFID readers use near-field technology
Bar code readers need to be close to the bar code
Bar code needs to be in the correct position for reader to be able to read it
Bar codes readers might not be able to read a damaged/scratched bar code
whereas RFID can read data as long as chip/tag is not severely damaged.
Bar code reader might have read errors if the bar code is damaged/scratched
whereas RFID readers are more likely to read damaged/scratched tags
Bar code readers emit/use light whereas RFID uses electromagnetic/radio
waves

To gain full marks the comparison must have correct answers for both
similarities and differences.

9(b) Two from for example: 2


Race timing Tracking
Event Attendee Tracking
Livestock Tracking
Library book Tracking
Contactless/credit/debit card payment
Passports/ID cards

Question Answer Marks

10(a) Three from: 3


Name attributes
Charset//Character set
Content attributes

10(b) The <head> element 1

© UCLES 2023 Page 7 of 9


0417/12 Cambridge IGCSE – Mark Scheme May/June 2023
PUBLISHED

Question Answer Marks

11(a) Two from: 2


Where the human body interacts with the device
Where a human gives a command ...
… without using a keyboard/mouse/pointing device

11(b) Four from: 4


Fatigue/gorilla arm
User can unintentionally activate the device …
… by moving their arms/fingers
Not as accurate as other interfaces
Issues with stopping the gesture …
… if user touches a button, interface knows the command is completed
Have to learn what the gestures do//Having to remember the gestures
Could cause damage if in restricted space
May have a limited number of gestures that can be used
Users with physical disabilities may not be able to make the gestures
Have to use/learn the gestures accurately otherwise they may not be
identified

Question Answer Marks

12(a) Four from: 4


Data cannot be erased/edited
Blu-ray discs are portable
As it is on an external device it does not take up internal storage
You can have large number of Blu-ray discs therefore more storage
Hard Disk is fixed in the computer

12(b)(i) Two from: 2


Non-volatile
Stores data permanently
Slower to access than internal memory

12(b)(ii) Two from: 2


Magnetic tape
CD
DVD
DVD RAM
Memory cards
Pen drives
SSD
Cloud storage
Flash memory

© UCLES 2023 Page 8 of 9


0417/12 Cambridge IGCSE – Mark Scheme May/June 2023
PUBLISHED

Question Answer Marks

13(a) Four from: 4


The large number of variables makes it more difficult for a human to forecast
correctly/accurately
Can predict long range weather trends/global warming
Faster way of producing weather patterns than using a human
Can deal with the more complex calculations quicker
More accurate results produced
Can give residents early warning of severe weather

13(b) Two from: 2


Pressure
Temperature
Moisture/Humidity
Wind speed

13(c) Two from: 2


Monitor
Printer
Plotter

Question Answer Marks

14(a) Four from: 4


Allows multimedia to be embedded in the pages
Allows auto change of pages
It is digital so can be used in other documents
Sections can be linked internally/externally
Readers can interact with the ePublication
Can be used by many users simultaneously
More up-to-date than physical magazines

14(b) Two from: 2


Users type in a unique licence key/serial number/authorisation key
Users install DRM (parts of the code which stop you from copying it)
Use of licence agreements
Running the software with a dongle/CD/Pendrive attached
Getting permission from the owner

© UCLES 2023 Page 9 of 9

You might also like