Cambridge International General Certificate of Secondary Education
Cambridge International General Certificate of Secondary Education
Cambridge International General Certificate of Secondary Education
Write your Centre number, candidate number and name in the spaces at the top of this page and any additional
pages you use.
Write in dark blue or black pen.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.
No marks will be awarded for using brand names of software packages or hardware.
Answer all questions.
At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.
This syllabus is approved for use in England, Wales and Northern Ireland as a Cambridge International Level 1/Level 2 Certificate.
06_0417_13_2018_1.15
© UCLES 2018 [Turn over
2
Write down the item of internal hardware from the list to match the descriptions.
........................................................................................................................................... [1]
(b) A magnetic medium that stores applications when they are not in use.
........................................................................................................................................... [1]
(c) Memory where data is lost when the computer is turned off.
........................................................................................................................................... [1]
........................................................................................................................................... [1]
2 For each application tick the most appropriate type of computer to match the description.
[4]
[4]
[2]
5 A fish farm has a computer system that constantly monitors the quality of the water in its fish ponds.
The system uses sensors to carry out the monitoring.
(a) Name two sensors that could be used to monitor the quality of the water in the fish ponds.
1 ........................................................................................................................................
2 ........................................................................................................................................
[2]
(b) Name the device that is used to convert the data from the sensor into a form that could be
read by the computer.
........................................................................................................................................... [1]
(c) Describe the role of the computer in monitoring the quality of the water in the fish ponds.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [3]
(a) Phishing
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [2]
(b) Pharming
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [2]
(c) Smishing
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [2]
7 Peta is designing a new logo for his computer club. It must fit into a space 15 mm square on the
club’s headed note paper. The logo must look like this:
He is using a graphics package and has started by producing a white 10 mm square with a black
border like this:
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
.................................................................................................................................................. [6]
8 A large farm uses a robotic system to milk and feed animals. Until recently this would have been
carried out by farm workers.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
.................................................................................................................................................. [6]
All colour codes must be in hexadecimal. It has the following style sheet attached:
h1 {color: #ff0000;
font-family: Times, serif;
font-size: 30pt;
text-align: center;}
h2 {color: #0000ff;
font-family: Times, Helvetica, serif;
font-size: 24pt;
text-align: center;}
h3 {color: #00ff00;
font-family: Times, Helvetica, serif;
font-size: 14pt;
text-align: justify;}
Having tested the web page the teacher needs to make some changes to the style sheet.
(a) edit style h1 so that the font is Comic Sans or, if not available, Arial or, if this is not available,
the browser’s default sans-serif font.
font-family: ........................................................................................................................
........................................................................................................................................... [3]
(b) add markup to the table style to set a 3 pixel wide, dashed external border.
........................................................................................................................................ } [4]
h3 {color: ...........................................................................................................................
........................................................................................................................................... [1]
(d) add markup to the start of style h2 to display the text as bold.
h2 {....................................................................................................................................
........................................................................................................................................... [2]
10 Magnetic tapes are traditionally used for backing up data on large computer systems. Liu works
from home and is considering either backing up her data on to magnetic tape or a pen drive.
Give three reasons why she may prefer to use a pen drive.
1 ...............................................................................................................................................
..................................................................................................................................................
2 ...............................................................................................................................................
..................................................................................................................................................
3 ...............................................................................................................................................
..................................................................................................................................................
[3]
11 When a system has been developed, two types of documentation are produced, technical and user
documentation.
...........................................................................................................................................
........................................................................................................................................... [2]
...........................................................................................................................................
........................................................................................................................................... [2]
(c) Identify four components that are only found in user documentation but not found in technical
documentation.
1 ........................................................................................................................................
2 ........................................................................................................................................
3 ........................................................................................................................................
4 ........................................................................................................................................
[4]
(d) Tick three evaluation strategies that need to be carried out following implementation of the
new system.
Tick
(✓)
[3]
12 There are two types of verification, visual and double data entry.
Explain the differences between visual verification and double data entry.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
.................................................................................................................................................. [2]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [3]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [3]
In the table there are some recommended ways to minimise specific health issues. For each way,
identify the most appropriate health issue it is trying to minimise.
[4]
15 Drones are unmanned flying vehicles that are used for commercial and leisure activities. Drones
are fitted with cameras to monitor situations.
A river has burst its banks following prolonged heavy rainfall. Explain why drones are used to help
monitor the situation.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
.................................................................................................................................................. [4]
16 The manager of a large company wants to replace the company’s cabled LAN with a WLAN.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
.................................................................................................................................................. [6]
Throughout the day orders are received by the company from its customers. The office workers in
the finance department create and store an invoice for each order. They are too busy to be disturbed
from their work.
Delivery drivers receive copies of the invoices which they will pass on to their customers. The
drivers make a large number of deliveries per day and do not return to the office.
A systems analyst will research the current system and suggest improvements to be made.
(a) For each type of employee identified above, describe the most suitable method of collecting
information from them, giving a reason for your choice.
Office workers....................................................................................................................
...........................................................................................................................................
Reason..............................................................................................................................
...........................................................................................................................................
Delivery drivers..................................................................................................................
...........................................................................................................................................
Reason..............................................................................................................................
...........................................................................................................................................
[4]
(b) The factory is based on one site and only has space for one production line. The company
has decided to computerise its production line. It will use direct changeover as the method of
implementing the new system.
Explain why the company would use this method rather than other methods of implementation.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [4]
18 As more and more people use the internet at home to carry out transactions they are at risk of
downloading software that could corrupt files or copy credit card details.
Discuss the effectiveness, or otherwise, of using different methods of increasing the security of a
home computer.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
.................................................................................................................................................. [8]
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable
effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will
be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.
Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge