Theory Pastpapers
Theory Pastpapers
Theory Pastpapers
*0123456789*
INSTRUCTIONS
● Answer all questions.
● Use a black or dark blue pen.
● Write your name, centre number and candidate number in the boxes at the top of the page.
● Write your answer to each question in the space provided.
● Do not use an erasable pen or correction fluid.
● Do not write on any bar codes.
● You may use an HB pencil for any diagrams, graphs or rough working.
INFORMATION
● The total mark for this paper is 80.
● The number of marks for each question or part question is shown in brackets [ ].
● No marks will be awarded for using brand names of software packages or hardware.
2 One component of the internal memory of a computer is Random Access Memory (RAM).
1 ........................................................................................................................................................
...........................................................................................................................................................
2 ........................................................................................................................................................
...........................................................................................................................................................
[2]
A Inkjet printer
C Laser printer
D 3D printer
[1]
4 For each of the following uses of data capture, name one appropriate direct data entry device. The
devices must be different in each case.
............................................................................................................................................... [1]
............................................................................................................................................... [1]
............................................................................................................................................... [1]
1 .................................................................................................................................................
2 .................................................................................................................................................
3 .................................................................................................................................................
[3]
(b) Give two reasons why data from the sensors need to be converted for use by a computer.
1 .................................................................................................................................................
....................................................................................................................................................
2 .................................................................................................................................................
....................................................................................................................................................
[2]
6 A smartphone has many uses, for example making and receiving telephone calls.
1 ........................................................................................................................................................
...........................................................................................................................................................
2 ........................................................................................................................................................
...........................................................................................................................................................
3 ........................................................................................................................................................
...........................................................................................................................................................
4 ........................................................................................................................................................
...........................................................................................................................................................
[4]
There are three types of test data that can be used to test a system: normal, abnormal and
extreme.
Normal .......................................................................................................................................
....................................................................................................................................................
Abnormal ...................................................................................................................................
....................................................................................................................................................
Extreme .....................................................................................................................................
....................................................................................................................................................
[3]
(b) The program collects a large amount of data and this could be stored using either a fixed
solid-state drive (SSD) or cloud storage.
(i) Describe four advantages to the school of using cloud storage rather than using the
SSD.
1 .........................................................................................................................................
............................................................................................................................................
2 .........................................................................................................................................
............................................................................................................................................
3 .........................................................................................................................................
............................................................................................................................................
4 .........................................................................................................................................
............................................................................................................................................
[4]
(ii) Describe three disadvantages to the school of using cloud storage rather than using the
SSD.
1 .........................................................................................................................................
............................................................................................................................................
2 .........................................................................................................................................
............................................................................................................................................
3 .........................................................................................................................................
............................................................................................................................................
[3]
For each of the statements given, identify a health problem and describe a possible solution.
[4]
...........................................................................................................................................................
...........................................................................................................................................................
...........................................................................................................................................................
...........................................................................................................................................................
...........................................................................................................................................................
...................................................................................................................................................... [3]
9 A taxi company tracks the routes their cars have travelled and the current location of each one
using a Global Positioning System (GPS).
A map showing the route taken and current location of each car is displayed on the office monitor.
...........................................................................................................................................................
...........................................................................................................................................................
...........................................................................................................................................................
...........................................................................................................................................................
...........................................................................................................................................................
...........................................................................................................................................................
...........................................................................................................................................................
...................................................................................................................................................... [4]
The headteachers already have basic internet connected desktop computer systems including a
monitor, keyboard and mouse.
(a) Identify three pieces of additional hardware they need in order to participate in a video-
conference.
1 .................................................................................................................................................
2 .................................................................................................................................................
3 .................................................................................................................................................
[3]
State three tasks the technician would need to do to set up the hardware for the video-
conference.
You can assume that the hardware required has already been purchased.
1 .................................................................................................................................................
....................................................................................................................................................
2 .................................................................................................................................................
....................................................................................................................................................
3 .................................................................................................................................................
....................................................................................................................................................
[3]
11 Microprocessor-controlled devices in the home have had positive effects on people’s lifestyles.
One of the positive effects of using these devices is that we can now set a cooker to switch on
whilst we are out so that we arrive home to a cooked meal.
Describe the positive effects of using other microprocessor-controlled devices in the home.
...........................................................................................................................................................
...........................................................................................................................................................
...........................................................................................................................................................
...........................................................................................................................................................
...........................................................................................................................................................
...........................................................................................................................................................
...........................................................................................................................................................
...................................................................................................................................................... [4]
12 Tawara Retail is an online store. This online store does not have physical shops. Customers buy
products from this store using internet shopping.
...........................................................................................................................................................
...........................................................................................................................................................
...........................................................................................................................................................
...........................................................................................................................................................
...........................................................................................................................................................
...........................................................................................................................................................
...........................................................................................................................................................
...................................................................................................................................................... [4]
13 A media student is creating a movie, in school, for a project. He needs to take the movie home to
edit it.
The student intends to use a CFast solid-state memory card to transport the movie files.
Give two error messages that may appear when attempting to save the work.
1 ........................................................................................................................................................
...........................................................................................................................................................
2 ........................................................................................................................................................
...........................................................................................................................................................
[2]
...........................................................................................................................................................
...........................................................................................................................................................
...........................................................................................................................................................
...........................................................................................................................................................
...........................................................................................................................................................
...........................................................................................................................................................
...........................................................................................................................................................
...................................................................................................................................................... [4]
15 Discuss the advantages and disadvantages to customers of using internet banking rather than
visiting a bank.
...........................................................................................................................................................
...........................................................................................................................................................
...........................................................................................................................................................
...........................................................................................................................................................
...........................................................................................................................................................
...........................................................................................................................................................
...........................................................................................................................................................
...........................................................................................................................................................
...........................................................................................................................................................
...........................................................................................................................................................
...........................................................................................................................................................
...................................................................................................................................................... [6]
Name three items of personal data that could also be sensitive data.
1 ........................................................................................................................................................
2 ........................................................................................................................................................
3 ........................................................................................................................................................
[3]
Describe four strategies that the student could use to stay safe when using social media to
communicate with others.
1 ........................................................................................................................................................
...........................................................................................................................................................
2 ........................................................................................................................................................
...........................................................................................................................................................
3 ........................................................................................................................................................
...........................................................................................................................................................
4 ........................................................................................................................................................
...........................................................................................................................................................
[4]
18 A manager in a hospital has decided to ask a software company to develop a computer system.
The system should allow patients to book all their medical appointments online.
(a) Discuss the advantages and disadvantages to both the patients and the medical staff of this
type of system.
....................................................................................................................................................
....................................................................................................................................................
....................................................................................................................................................
....................................................................................................................................................
....................................................................................................................................................
....................................................................................................................................................
....................................................................................................................................................
....................................................................................................................................................
....................................................................................................................................................
....................................................................................................................................................
....................................................................................................................................................
............................................................................................................................................... [6]
(b) The manager of the hospital has purchased an expert system to help diagnose their patients’
illnesses.
1 .................................................................................................................................................
2 .................................................................................................................................................
3 .................................................................................................................................................
[3]
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of
Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge.
Specimen
These general marking principles must be applied by all examiners when marking candidate answers.
They should be applied alongside the specific content of the mark scheme or generic level descriptors
for a question. Each question paper and mark scheme will also comply with these marking principles.
• the specific content of the mark scheme or the generic level descriptors for the question
• the specific skills defined in the mark scheme or in the generic level descriptors for the
question
• the standard of response required by a candidate as exemplified by the standardisation
scripts.
GENERIC MARKING PRINCIPLE 2:
Marks awarded are always whole marks (not half marks, or other fractions).
GENERIC MARKING PRINCIPLE 3:
• marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit
is given for valid answers which go beyond the scope of the syllabus and mark scheme,
referring to your Team Leader as appropriate
• marks are awarded when candidates clearly demonstrate what they know and can do
• marks are not deducted for errors
• marks are not deducted for omissions
• answers should only be judged on the quality of spelling, punctuation and grammar when
these features are specifically assessed by the question as indicated by the mark scheme. The
meaning, however, should be unambiguous.
GENERIC MARKING PRINCIPLE 4:
Rules must be applied consistently e.g. in situations where candidates have not followed
instructions or in the application of generic level descriptors.
GENERIC MARKING PRINCIPLE 5:
Marks should be awarded using the full range of marks defined in the mark scheme for the
question (however; the use of the full mark range may be limited according to the quality of the
candidate responses seen).
GENERIC MARKING PRINCIPLE 6:
Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should
not be awarded with grade thresholds or grade descriptors in mind.
Note: No marks are awarded for using brand names of software packages or hardware.
Abnormal
One from:
Data outside the range of acceptability
Data that is of an incorrect type
Extreme
Data that is on the boundary/limit of acceptability
7(b)(i) Four from: 4
The cloud has greater storage capacity
The data could be sent directly to/from the cloud from any computer/device
Storage capacity can be increased without adding additional physical devices
Many people can share the data
The school would only pay for the storage used
There is an automatic backup of data
7(b)(ii) Three from: 3
More security issues as multiple copies of the data are stored
The school loses control over the storage of the data
Cloud storage has an ongoing cost
Users must have a reliable internet connection to store data
Users must have an internet connection to access data
7(c) 4
Health Possible solution
problem
Using a mouse for a Repetitive Use a wrist rest
long period of time strain injury Take regular breaks
Use a trackerball//an ergonomic
mouse
Hand exercises
Voice activated software
Sitting for too long in Back problems Use a foot rest
one position Take regular breaks
Walk around//stand up
Use an ergonomic/adjustable chair
Sit with correct posture//with
straight back
Similiarities
Both use wireless communications
Both use radio frequencies for communication
Both allow several devices to be connected
Both use security when sending data
Differences
wi-fi has a faster data transfer rate
wi-fi has a greater range of transmission
wi-fi uses key matching encryption
Bluetooth uses WEP and WPA security together
wi-fi can be broadcast
wi-fi connects more devices
Bluetooth has a lower frequency than wi-fi
Advantages
Reduces the number of journeys to and from the bank
Saves money as fewer journeys are made travelling to the bank
Reduces the time wasted travelling to the bank/waiting in queues
The interest rates may be better using internet banking
Easier to shop around for the better bank accounts
24/7 banking
No physical robberies of customers
Disadvantages
Security is an issue as transactions are carried out over the internet/
unsecured networks
The user needs a reliable internet connection
More risk of pharming/phishing/fraud
Easier to make errors whilst using internet banking e.g. incorrect input
If the internet connection drops during a transaction, then there may be issues
Device needed for two-factor authentication
Physical money/cash cannot be deposited or withdrawn using online banking
Advantages
Bookings can be made last minute
24/7 booking
The bookings can be easily checked on the internet
Faster to cancel/change a booking
The patient cancels/changes their own appointment which ensures it has
been done
Multiple bookings can be made for different medical units
Email/text reminders can be sent automatically
More convenient – can book from any device/on the move
Automatic confirmation of the booking
Less time spent on the phone therefore freeing up staff
The bookings can be planned easily in advance
Reminders can be sent via email/text therefore reducing cost of posting them
Repeat appointments can be made automatically therefore saving time
Frees up staff to do other things
Disadvantages
Concerns about the privacy/security of the data
If the system goes down the ability to book an appointment is lost
Some people prefer to talk to a medical person
Medical emergencies may be overlooked
Internet connected device required by patient
Computer skills required
Administration staff may lose their jobs
18(b) Three from: 3
Inference engine
Knowledge base
Rules base
User interface
Explanation system
BLANK PAGE
INSTRUCTIONS
• Answer all questions.
• Use a black or dark blue pen.
• Write your name, centre number and candidate number in the boxes at the top of the page.
• Write your answer to each question in the space provided.
• Do not use an erasable pen or correction fluid.
• Do not write on any bar codes.
• You may use an HB pencil for any diagrams, graphs or rough working.
INFORMATION
• The total mark for this paper is 100.
• The number of marks for each question or part question is shown in brackets [ ].
• No marks will be awarded for using brand names of software packages or hardware.
11_0417_11_2022_1.16
© UCLES 2022 [Turn over
2
1 Complete the following sentences using the most appropriate words from the list.
(a) A margin between the main content of the page and the fold of a book is called a
........................................................................................................................................... [1]
........................................................................................................................................... [1]
(c) Feature of word processing that causes text to flow around an image is called
........................................................................................................................................... [1]
(d) When text is aligned along both the left and right margins this is called
........................................................................................................................................... [1]
2 Smartphones and smartwatches can be used in everyday life. A smartwatch is a wearable computer
in the form of a wrist-watch.
(a) Apart from accessing the internet, give three other uses of a smartphone.
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
3 ........................................................................................................................................
...........................................................................................................................................
[3]
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
[2]
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
[2]
3 According to research carried out on passwords the top three most used passwords are 12345,
qwerty and sunshine.
Describe, using other examples, the difference between a weak password and a strong password.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
.................................................................................................................................................. [4]
4 A teacher is setting up a database which she will use to record her student’s exam marks.
(a) The teacher is planning to test the mark range using different types of test data. The range of
marks that the teacher can award is 0 to 100.
(i) Write down one example of extreme test data that the teacher can use to check the
range.
................................................................................................................................ [1]
(ii) Extreme test data is one type of test data. The teacher uses two other pieces of test
data.
Write down the type of test data for each of the examples.
TEN .......................................................................................................................
55 ..........................................................................................................................
[2]
Write down the field name which is the most appropriate for the data type, based on the data
shown in the table. Your answers must be different in each case.
Boolean ............................................................................................................................
Alphanumeric ....................................................................................................................
[4]
5 A student is carrying out a scientific experiment to measure the temperature of a liquid as it cools
down. The student uses a sensor connected to a computer to read the temperature.
(a) Give three advantages of using computers and sensors rather than the student taking the
temperature readings herself.
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
3 ........................................................................................................................................
...........................................................................................................................................
[3]
(b) Describe how the readings taken by the sensor are displayed on a graph using the computer.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [6]
(c) Explain the differences between measurement systems and control systems.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [4]
6 There have been major issues regarding the accuracy of facial recognition systems for identifying
suspects by the police.
Tawara Airport has installed biometric security including facial recognition systems to help the
police recognise known criminals entering and leaving the country. Previously video was taken of
all passengers and then checked manually.
(a) Discuss the effectiveness of using facial recognition systems rather than the manual video
system to increase security in this way.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [8]
1 ........................................................................................................................................
2 ........................................................................................................................................
3 ........................................................................................................................................
[3]
Evaluate how you would use eSafety strategies in your own use of instant messaging.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
.................................................................................................................................................. [6]
8 Discuss the moral implications which need to be considered when creating an ICT solution.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
.................................................................................................................................................. [4]
9 Use of smartphones to access the internet has increased by over 200% in the past five years.
Compare the use of smartphones to access the internet with the use of desktop computers to
access the internet. Your answer must include similarities and differences.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
.................................................................................................................................................. [6]
10 A group of students in a school are planning to publicise a school concert. They can either produce
a web page which will be sent to the company that runs the school website or create a multimedia
presentation and show this to students and visitors.
(a) Give two types of content which could be used in a multimedia presentation that cannot be
used in a printed leaflet.
1 ........................................................................................................................................
2 ........................................................................................................................................
[2]
(b) Describe the advantages and disadvantages of using a multimedia presentation rather than
a web page on the school website.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [6]
The students need to test their multimedia presentation before it can be used.
(c) Name two output devices they can use and for each one, write down a reason for its use.
Reason .............................................................................................................................
...........................................................................................................................................
Reason .............................................................................................................................
...........................................................................................................................................
[4]
11 A receptionist in a medical centre is going to send out emails to patients about medical results. The
receptionist will use the data from patients’ medical and personal records and mail merge these.
One of the disadvantages of this system is that the receptionist will have access to personal data.
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
3 ........................................................................................................................................
...........................................................................................................................................
4 ........................................................................................................................................
...........................................................................................................................................
[4]
Due to data protection laws, personal data should be kept confidential and secure.
(b) Explain why personal data should be kept confidential and secure.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [6]
12 Many students prefer to store data on external storage devices like pen drives or portable hard disk
drives.
Describe four advantages of using a pen drive rather than a portable hard disk drive.
1 ...............................................................................................................................................
..................................................................................................................................................
2 ...............................................................................................................................................
..................................................................................................................................................
3 ...............................................................................................................................................
..................................................................................................................................................
4 ...............................................................................................................................................
..................................................................................................................................................
[4]
13 Hyperlinks, bookmarks and anchors are software tools used in web pages and web browsers.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [2]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [2]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [2]
14 A research student is undertaking a study of endangered animals in the Amazon rainforest. She
is using a drone to replace surveys carried out on foot. A drone is a remote-controlled flying vehicle.
Describe the benefits and drawbacks of using a drone to monitor the animals in the rainforest.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
.................................................................................................................................................. [6]
BLANK PAGE
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable
effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will
be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge Assessment
International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at
www.cambridgeinternational.org after the live examination series.
Cambridge Assessment International Education is part of Cambridge Assessment. Cambridge Assessment is the brand name of the University of Cambridge Local
Examinations Syndicate (UCLES), which is a department of the University of Cambridge.
Published
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.
Cambridge International will not enter into discussions about these mark schemes.
Cambridge International is publishing the mark schemes for the October/November 2022 series for most
Cambridge IGCSE™, Cambridge International A and AS Level components and some Cambridge O Level
components.
These general marking principles must be applied by all examiners when marking candidate answers.
They should be applied alongside the specific content of the mark scheme or generic level descriptors
for a question. Each question paper and mark scheme will also comply with these marking principles.
• the specific content of the mark scheme or the generic level descriptors for the question
• the specific skills defined in the mark scheme or in the generic level descriptors for the question
• the standard of response required by a candidate as exemplified by the standardisation scripts.
Marks awarded are always whole marks (not half marks, or other fractions).
• marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit
is given for valid answers which go beyond the scope of the syllabus and mark scheme,
referring to your Team Leader as appropriate
• marks are awarded when candidates clearly demonstrate what they know and can do
• marks are not deducted for errors
• marks are not deducted for omissions
• answers should only be judged on the quality of spelling, punctuation and grammar when these
features are specifically assessed by the question as indicated by the mark scheme. The
meaning, however, should be unambiguous.
Rules must be applied consistently, e.g. in situations where candidates have not followed
instructions or in the application of generic level descriptors.
Marks should be awarded using the full range of marks defined in the mark scheme for the question
(however; the use of the full mark range may be limited according to the quality of the candidate
responses seen).
Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should
not be awarded with grade thresholds or grade descriptors in mind.
1(a) Gutter 1
1(b) Header 1
1(c) Wrapping 1
1(d) Justified 1
4(a)(ii) Abnormal 2
Normal
Control
Changes the environment
Compares against preset value
Action taken depending on comparison to preset value
To gain full marks the description must have correct answers for both
measurement and control
Against
Dark glasses/facial hair/face coverings may cause the facial recognition
systems to not work
More difficult to change biometric data
Recognising a person can be slower as more checking is carried out
Harder to set up the facial recognition system
Takes longer to add new people to the system
Biometrics can use a lot of memory to store the data
Intrusive as personal details have to be stored
More likely to be affected by the environment
With the video system each frame needs to be checked with known images
which can lead to errors
To gain full marks the discussion must have correct answers for both
for and against
7 Six from: 6
I block unwanted messages/suspicious users…
…and report the sender
Before using the messaging system, I check how to block and report
unwanted users…
…this stops predators
I never arrange to meet strangers alone
I always tell a responsible adult if I plan to meet someone
I always meet in a public place
I avoid giving away personal information
I report abusive messages from a sender of the messages
I report cyber-bullying
When sending messages I always use appropriate language
If someone messages me with private and personal information about
themselves I respect their confidentiality/privacy
I always read carefully the messages before I send
I avoid sarcasm
I am not offensive when replying
I carefully check that I am replying to the correct person
I do not enable my location when messaging
8 Four from: 4
What may be immoral in some cultures may be acceptable in others
Just because something is immoral doesn't mean that it is illegal
The ICT solution can cause distress to others/be offensive
Becomes immoral if the person gains from their actions
9 Six from: 6
Similarities
Both can use Wi-Fi to access the internet
Both can access the internet use hotspots
Both can use Bluetooth Tethering to allow access to the internet
Differences
Desktops
More websites will work with the desktop
Larger keyboards to type in a web address
Larger screens to see the whole webpage
More stable and reliable connections
Tends to be a clearer layout to make it easier to access the internet
More accessible information
A desktop can connect to the internet via an ethernet cable
Smartphones
Access the internet from more locations
Easier to look things up on the go
Screen/keyboard built into the device therefore easier to access websites
A smartphone can use mobile data/4G/3G to access the internet
A smartphone is more portable therefore you can access the internet while
travelling
To gain full marks the comparison must have correct answers for both
similarities and differences
Disadvantages
The multimedia presentation is only available in the school during school time
whereas a web page can be used in other places
The visitor may not see the whole presentation
The multimedia presentation may not include sound due to being shown in
the school
Multimedia presentations can require expensive hardware to produce and
view
Multimedia seen by less people
Multimedia more expensive software needed to produce the presentation
More specialist training needed to produce it
To gain full marks the description must have correct answers for both
advantages and disadvantages
Speaker – 1 mark
To listen if the sound matches the images – 1 mark
Printer – 1 mark
To check that handout format works – 1 mark
12 Four from: 4
Is more robust as no moving parts
Can be more easily carried
Use less power
Have faster data access
Have faster data transfer times
14 Six from: 6
Benefits
Safer to use drones than human life being risked in forest areas
Drones can gain a better overall view of the forest than the human
Drones can be used in areas that would not be accessible to humans
Drones can cover a greater area than a human in the time available
Data from the drone can be automatically uploaded to computer system
May change animal behaviour if humans are used//Less invasive for the
animals
Drawbacks
Damp conditions/environment/weather may cause issues with the electronics
Difficult to navigate in the tree areas
Noise/sight of the drone may affect the animals
More chance of collision/bird attack
If drone crashes it could be difficult to find/retrieve
Potential danger to other animals/birds
To gain full marks the description must have correct answers for both
benefits and drawbacks
INSTRUCTIONS
• Answer all questions.
• Use a black or dark blue pen.
• Write your name, centre number and candidate number in the boxes at the top of the page.
• Write your answer to each question in the space provided.
• Do not use an erasable pen or correction fluid.
• Do not write on any bar codes.
• You may use an HB pencil for any diagrams, graphs or rough working.
INFORMATION
• The total mark for this paper is 100.
• The number of marks for each question or part question is shown in brackets [ ].
• No marks will be awarded for using brand names of software packages or hardware.
11_0417_12_2022_1.13
© UCLES 2022 [Turn over
2
1 Complete the following sentences using the most appropriate words from this list of word processing
terms.
........................................................................................................................................... [1]
........................................................................................................................................... [1]
(c) The indentation of a paragraph where all the lines except the first are indented is called
........................................................................................................................................... [1]
(d) The last line of a paragraph that appears as the first line of the next page is called a
........................................................................................................................................... [1]
2 Database, presentation, spreadsheet and word processing software are used by a medical centre.
Tick (✓) the most appropriate piece of software to carry out the tasks shown.
[4]
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
3 ........................................................................................................................................
...........................................................................................................................................
[3]
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
3 ........................................................................................................................................
...........................................................................................................................................
[3]
4 Workers in an office log onto the office computer network using a password.
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
[2]
(b) One method that hackers use to find people’s passwords is to install key-logging spyware onto
computers.
Give two methods that could be used to safely enter passwords even if key-logging spyware
has been installed on a computer.
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
[2]
5 The secretary of a sports club is setting up a database of members to replace the current manual
system. He will need to create a database structure.
(a) Describe the steps involved in setting up and testing the database structure before it can be
used in the new system.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [4]
When the new system is completed it needs to be implemented. The secretary of the sports club
can implement it using direct changeover or parallel running.
(b) Describe the term parallel running, giving one benefit and one drawback of using this method
of implementation.
...........................................................................................................................................
Benefit ..............................................................................................................................
...........................................................................................................................................
Drawback ..........................................................................................................................
...........................................................................................................................................
[3]
6 In June 2000 the London Millennium Bridge opened to the public but closed shortly afterwards for
repairs. The bridge was swaying as people walked across it. Before bridges are built, computer
models are produced and the models are tested.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
.................................................................................................................................................. [4]
7 A club has many members. The secretary of the club wants to keep details of the club members
in a database.
(a) Describe the benefits and drawbacks of storing membership details on a computer database.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [6]
(b) The secretary collects data from the members on paper-based forms.
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
3 ........................................................................................................................................
...........................................................................................................................................
4 ........................................................................................................................................
...........................................................................................................................................
5 ........................................................................................................................................
...........................................................................................................................................
[5]
8 In 2019 Cambridge recorded the highest temperature for July in the UK. The data was collected
automatically using sensors by a weather station and sent to a computer.
Discuss the advantages and disadvantages of using sensors to collect data rather than humans
collecting the data.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
.................................................................................................................................................. [8]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [3]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [6]
As our use of the cloud increases, new ways of accessing it safely need to be developed.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [8]
10 High street banks now offer customers access to internet banking when they are in the physical
bank.
Discuss the advantages and disadvantages to the bank of using internet banking in this way.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
.................................................................................................................................................. [6]
11 A village is built next to a river. During heavy rain the river floods and endangers the people living
in the village. If the river is in danger of flooding, an email is sent to all members of the village.
(a) Explain why an email group is used when contacting the villagers.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [3]
Sensors are placed in the river to check the water level. If the water level in the river rises more
than 5m above normal river levels, a flood barrier is raised to safeguard the village. The flood barrier
remains raised until the water level drops to normal levels.
(b) Explain why the data from the sensors cannot be read directly by the computer and name the
device that needs to be used so that the computer can read the data.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [3]
(c) Describe how a microprocessor uses the data from the sensors to raise and lower the flood
barrier.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [6]
Write down two features of a GUI and for each give a reason why they are needed.
Feature 1 ..................................................................................................................................
Reason 1 ..................................................................................................................................
..................................................................................................................................................
Feature 2 ..................................................................................................................................
Reason 2 ..................................................................................................................................
..................................................................................................................................................
[4]
Describe how the use of computers has affected the work of employees and their working patterns.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
.................................................................................................................................................. [6]
rtf ......................................................................................................................................
...........................................................................................................................................
pdf .....................................................................................................................................
...........................................................................................................................................
[2]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [3]
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
.................................................................................................................................................. [2]
BLANK PAGE
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable
effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will
be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge Assessment
International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at
www.cambridgeinternational.org after the live examination series.
Cambridge Assessment International Education is part of Cambridge Assessment. Cambridge Assessment is the brand name of the University of Cambridge Local
Examinations Syndicate (UCLES), which is a department of the University of Cambridge.
Published
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.
Cambridge International will not enter into discussions about these mark schemes.
Cambridge International is publishing the mark schemes for the October/November 2022 series for most
Cambridge IGCSE™, Cambridge International A and AS Level components and some Cambridge O Level
components.
These general marking principles must be applied by all examiners when marking candidate answers.
They should be applied alongside the specific content of the mark scheme or generic level descriptors
for a question. Each question paper and mark scheme will also comply with these marking principles.
• the specific content of the mark scheme or the generic level descriptors for the question
• the specific skills defined in the mark scheme or in the generic level descriptors for the question
• the standard of response required by a candidate as exemplified by the standardisation scripts.
Marks awarded are always whole marks (not half marks, or other fractions).
• marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit
is given for valid answers which go beyond the scope of the syllabus and mark scheme,
referring to your Team Leader as appropriate
• marks are awarded when candidates clearly demonstrate what they know and can do
• marks are not deducted for errors
• marks are not deducted for omissions
• answers should only be judged on the quality of spelling, punctuation and grammar when these
features are specifically assessed by the question as indicated by the mark scheme. The
meaning, however, should be unambiguous.
Rules must be applied consistently, e.g. in situations where candidates have not followed
instructions or in the application of generic level descriptors.
Marks should be awarded using the full range of marks defined in the mark scheme for the question
(however; the use of the full mark range may be limited according to the quality of the candidate
responses seen).
Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should
not be awarded with grade thresholds or grade descriptors in mind.
1(a) Landscape 1
1(b) Bullet 1
1(c) Hanging 1
1(d) Widow 1
2 4
database presentation spreadsheet word
(✓) (✓) (✓) processing
(✓)
Producing a
letter to send
✓
out to
patients
Creating
graphs to
show
numbers of
✓
people
attending the
medical
centre
Creating
queries from
✓
patient’s
details
Creating an
interactive
display of ✓
services
offered
5(b) The old and new systems/both run side by side until the new system takes 3
over
Benefit
One from:
The old system can be used as a back up
Staff can be trained gradually
Drawback
One from:
More time consuming as the data needs to be entered into two systems
More chance of error on data entry as two systems are being used
More costly as there are two sets of staff
Uses more power running two systems
6 Four from: 4
Fewer errors in final version of real item as errors would have been resolved
in model
Saves money as it saves on resources
Safer to run a computer model rather than risking human life
Different scenarios/what ifs can be carried out which may happen in real life/to
experiment
To build the bridge and test it would be impracticable due to cost/time
Drawbacks
Need IT skills to use the software/computer
Need to have to additional equipment which is expensive
Can take up a lot of storage space/memory in the computer
Expensive to buy software
Expensive to secure the system as it contains personal data
Training staff on how to use the software will be time consuming
Training could be expensive for the club
To gain full marks the description must have correct answers for both
benefits and drawbacks
8 Eight from: 8
Advantages
Readings are taken at a more consistent time interval
The sensor reads the data more accurately
Safer as humans do not need to take the measurements
Computers can analyse the data continuously
Readings taken more frequently
Multiple variables can be monitored at the same time
Disadvantages
Sensors can malfunction due to the temperature
If sensors malfunction this could lead to incorrect readings
Sensors could be stolen
To gain full marks the discussion must have correct answers for both
advantages and disadvantages
Drawbacks
Invasion of privacy
User may not know they have logged off
Biometrics may change therefore data will need to be kept up to date
Expensive method/technology to set up
Environment can affect measurements
Over usage can affect the measurements
Difficult to reset once compromised
Difficult to set up
Time consuming to set up as measurements must be taken
Facial coverings/changes can prevent system from working
To gain full marks the discussion must have correct answers for both
benefits and drawbacks
10 Six from: 6
Advantages
Branches can stay open longer and offer other services
More bank staff are available to help customers
Less chance of hacking/fraud as system used in the banks
Fewer bank tellers so more profitable for the bank
As the service is quicker/more services more likely to remain
Disadvantages
Initial cost of hardware/software is expensive
Need to retrain staff which can be expensive
System maintenance costs will be expensive as more inexperienced people
are using the system
Staff numbers may increase as staff are needed to help internet banking
customers
To gain full marks the discussion must have correct answers for both
advantages and disadvantages
12 One mark for correct feature and one mark for correct associated reason 4
Feature: Windows
Reasons: See more than one task at a time
Each task can be in a separate window
To display the task
Feature: Icons
Reasons: Tasks can be recognised
Click on an icon and it opens (a task/app)
Easy/faster to open an app by clicking on it
Feature: Menus
Reasons: To choose all the available options
Feature: Pointers
Reasons: To select tasks/icons
14(a) rtf 2
Text file with formatting/generic text files
pdf
Standard/generic image file
15 Two from: 2
Visual verification refers to the original document whereas proofreading does
not need to refer to the original document
Proofreading is checking spelling and grammar errors whereas visual
verification does not check for errors
Visual verification checks that the data has been copied correctly
INSTRUCTIONS
• Answer all questions.
• Use a black or dark blue pen.
• Write your name, centre number and candidate number in the boxes at the top of the page.
• Write your answer to each question in the space provided.
• Do not use an erasable pen or correction fluid.
• Do not write on any bar codes.
• You may use an HB pencil for any diagrams, graphs or rough working.
INFORMATION
• The total mark for this paper is 100.
• The number of marks for each question or part question is shown in brackets [ ].
• No marks will be awarded for using brand names of software packages or hardware.
11_0417_13_2022_1.11
© UCLES 2022 [Turn over
2
1 Complete the following sentences using the most appropriate words from the list.
........................................................................................................................................... [1]
........................................................................................................................................... [1]
(c) The first line of a paragraph that appears as the last line of the previous page is called
........................................................................................................................................... [1]
........................................................................................................................................... [1]
1 ...............................................................................................................................................
2 ...............................................................................................................................................
3 ...............................................................................................................................................
[3]
3 Circle two features of multimedia presentations which would not be found in a word processed
document.
[2]
4 A person contacts an online medical website that uses an expert system to allow users to
self-diagnose illnesses.
(a) Write down the component within the expert system that matches the definition given.
................................................................................................................................
................................................................................................................................ [1]
(ii) This component carries out the reasoning of the expert system.
................................................................................................................................
................................................................................................................................ [1]
(iii) This component allows the person to interact with the system.
................................................................................................................................
................................................................................................................................ [1]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [6]
5 A restaurant uses a number of different types of software. These include control, measurement,
spreadsheet and word processing software.
(a) Tick (✓) the most appropriate piece of software to carry out the tasks shown.
Word
Control Measurement Spreadsheet processing
(✓) (✓) (✓) (✓)
[4]
The restaurant owner is planning to upgrade the software used to book reservations. He has
employed a systems analyst who is analysing the current system. The systems analyst can either
send out questionnaires for staff to answer or observe staff working with the current system.
(b) Discuss the advantages and disadvantages of using questionnaires that staff answer rather
than observing staff to gather information about the current system.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [6]
6 A web page can contain images saved as png or gif file types.
png ....................................................................................................................................
...........................................................................................................................................
gif ......................................................................................................................................
...........................................................................................................................................
[2]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [3]
7 A school librarian is setting up a database of all the revision books he has in stock. The school
library sells revision books to students. The books range in value from $1 to $10 and are available
either in electronic book type (E) or physical book type (P).
(a) The librarian is planning to set up a number of different types of validation rule for the fields
to check data entry. Write down the most appropriate field name from the table that could be
used with each of the validation rules. Your answers must be different in each case.
Presence ..........................................................................................................................
Lookup ..............................................................................................................................
Range ...............................................................................................................................
Length ...............................................................................................................................
[4]
(b) Write down the most appropriate field name from the table that could be used as a primary
key field.
........................................................................................................................................... [1]
Most of the revision books are available in electronic book type as digital versions of the printed
books. These are stored as interactive PDF files.
(c) Describe the benefits and drawbacks of using the digital versions.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [6]
8 An organisation has changed the way in which members of staff can enter the building. Previously
they typed in a four-digit code on a key pad; now they use a device that reads a handprint.
(a) Discuss the effectiveness of using a handprint to enter the building rather than keying in a
code.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [8]
(b) Give two other examples of biometric methods that could be used in this scenario.
1 ........................................................................................................................................
2 ........................................................................................................................................
[2]
Describe the constraints that you need to consider when writing and sending an email.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
.................................................................................................................................................. [6]
10 (a) For each of the following types of backing storage give one example of its associated media.
Your answers must be different in each case.
Optical ..............................................................................................................................
...........................................................................................................................................
Magnetic ...........................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[3]
(b) Describe three differences between optical and magnetic backing storage.
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
3 ........................................................................................................................................
...........................................................................................................................................
[3]
(a) Explain two ways she could search for information on the World Wide Web (WWW).
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
[2]
(b) Explain the differences between the internet and the World Wide Web (WWW).
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [4]
12 The internet contains three web development layers. One layer is the content layer. This layer is
used to enter the content of a web page structure.
(a) Name and describe the other two web development layers.
Layer .................................................................................................................................
Description ........................................................................................................................
...........................................................................................................................................
Layer .................................................................................................................................
Description ........................................................................................................................
...........................................................................................................................................
[4]
(b) Explain why tables can be used to structure elements within a web page.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [3]
13 A teacher is concerned that students are playing online computer games at home without considering
eSafety. The teacher is going to create a set of rules that he feels they should be following.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
.................................................................................................................................................. [6]
14 Explain why page, section and column breaks are used in documents.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
.................................................................................................................................................. [3]
15 An employee is carrying out work for her company at home. The work she is doing is confidential.
She has been advised by her company to use encryption. She wishes to transfer some of this work
to the office.
(a) Discuss two different methods she could use to transfer this work to the office. Include in your
answer the advantages and disadvantages of each method.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [6]
(b) Describe what is meant by the term encryption and why it is used.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [3]
(c) Tick (✓) the most appropriate working pattern to match the following statements.
[3]
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable
effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will
be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge Assessment
International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at
www.cambridgeinternational.org after the live examination series.
Cambridge Assessment International Education is part of Cambridge Assessment. Cambridge Assessment is the brand name of the University of Cambridge Local
Examinations Syndicate (UCLES), which is a department of the University of Cambridge.
Published
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.
Cambridge International will not enter into discussions about these mark schemes.
Cambridge International is publishing the mark schemes for the October/November 2022 series for most
Cambridge IGCSE™, Cambridge International A and AS Level components and some Cambridge O Level
components.
These general marking principles must be applied by all examiners when marking candidate answers.
They should be applied alongside the specific content of the mark scheme or generic level descriptors
for a question. Each question paper and mark scheme will also comply with these marking principles.
• the specific content of the mark scheme or the generic level descriptors for the question
• the specific skills defined in the mark scheme or in the generic level descriptors for the question
• the standard of response required by a candidate as exemplified by the standardisation scripts.
Marks awarded are always whole marks (not half marks, or other fractions).
• marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit
is given for valid answers which go beyond the scope of the syllabus and mark scheme,
referring to your Team Leader as appropriate
• marks are awarded when candidates clearly demonstrate what they know and can do
• marks are not deducted for errors
• marks are not deducted for omissions
• answers should only be judged on the quality of spelling, punctuation and grammar when these
features are specifically assessed by the question as indicated by the mark scheme. The
meaning, however, should be unambiguous.
Rules must be applied consistently, e.g. in situations where candidates have not followed
instructions or in the application of generic level descriptors.
Marks should be awarded using the full range of marks defined in the mark scheme for the question
(however; the use of the full mark range may be limited according to the quality of the candidate
responses seen).
Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should
not be awarded with grade thresholds or grade descriptors in mind.
1(a) portrait 1
1(b) a footer 1
1(c) an orphan 1
1(d) centred 1
2 Three from: 3
Light
Temperature
Humidity/moisture
pH
CO2
3 Sound 2
Video
5(a) 4
Control Measure Spread Wordproc
(✓) ment sheet essing
(✓) (✓) (✓)
Automatically turning on
the fans when the room ✓
gets too hot
Monitoring the
temperature in the ✓
restaurant
Disadvantages
Users do not always complete the questionnaire and hand it back but
observation watches users working
Work rate can be influenced by being observed but this does not apply to
questionnaires
More chances of incorrect data if question not understood
The observer can see exactly how the system works well and not so well
whereas a questionnaire takes the users viewpoint
To gain full marks the discussion must have correct answers for both
advantages and disadvantages
6(a) png 2
One from:
Raster/full colour digital photos
Images with a transparent background
gif
Moving/animated image
7(b) ISBN 1
Drawbacks
Health issues with using a computer to read the book
Cannot be written in braille
May require extra software/reader
Never own the book as it is only data
Need to purchase a device to read them
Needs the internet to download the book
To gain full marks the description must have correct answers for both
benefits and drawbacks
Negatives
If the hand is damaged, then may not work
More difficult to change biometric data
Only works with one hand therefore difficult for right-handed people
Recognition could be slower as system is more complex
Harder to set up the biometric system
Takes longer to add new people/change biometric data to the system
Biometrics can use a lot of memory to store the data
Intrusive as personal details must be stored in biometrics
More likely to be affected by the environment
To gain full marks the discussion must have correct answers for both
positives and negatives
9 Six from: 6
Abide by the laws within the country that affect the general use of emails
Use acceptable language
Abide by copyright
Follow local guidelines set by an employer/schools
Use appropriate security
Follow netiquette
Respect other people/s/own privacy
Be aware of the need for password protection
Be aware that email accounts can be Illegally accessed
10(a) Optical 3
CD ROM/DVD ROM, CD R/DVD R, CD RW/DVD RW, DVD RAM, Blu-ray
discs/CD/DVD
Magnetic
Fixed/portable/removable hard disks/magnetic tape.
Solid state
Memory stick/flash card
To gain full marks the explanation must have correct answers for both
the internet and World Wide Web
12(a) Presentation 4
Defines the format of a web page/individual elements through styling
Behaviour
To enter scripting language to a web page/individual element
13 Six from: 6
Examples
Do not give away personal information
Do not use your real name as your username
Do not use your face image as your avatar
If you receive messages from unwanted users block and report them
Do not meet unknown users in real life//use a chaperone
Do not give financial information to other users
If you receive unwanted and abusive messages report the sender of the
messages
When sending messages always us appropriate language
Think before you reply to a message
14 Three from: 3
To adjust pagination
To avoid orphans/widows
To improve layout on the page
To allow for the change of orientation of pages in the document
To enable to start a new chapter on a new page
Email as an attachment
Do not require physical device
Require access to the email account both at home and in the office
The memory size could be an issue
Requires the use of the internet
15(c) 3
Part-
Compressed Flexible Job
time
hours hours sharing
working
(✓) (✓) (✓)
(✓)
An employee works a
full day but negotiates
✓
with the employer the
start and end times
INSTRUCTIONS
• Answer all questions.
• Use a black or dark blue pen.
• Write your name, centre number and candidate number in the boxes at the top of the page.
• Write your answer to each question in the space provided.
• Do not use an erasable pen or correction fluid.
• Do not write on any bar codes.
• You may use an HB pencil for any diagrams, graphs or rough working.
INFORMATION
• The total mark for this paper is 80.
• The number of marks for each question or part question is shown in brackets [ ].
• No marks will be awarded for using brand names of software packages or hardware.
06_0417_11_2023_1.9
© UCLES 2023 [Turn over
2
Tick (✓) the most appropriate data type for the ISBN.
A Numeric: integer
B Text
C Boolean
D Date
[1]
........................................................................................................................................... [1]
(b) A printed circuit board containing the CPU and other components of a computer.
........................................................................................................................................... [1]
........................................................................................................................................... [1]
(d) A printed circuit board that is installed in a computer so that the computer can be connected
to a network.
........................................................................................................................................... [1]
3 A headteacher is setting up a newsletter to send to parents of pupils at a school. She has some
photographs saved on storage devices that she needs to place in the newsletter.
State two communication methods which the headteacher could use to upload the photographs
onto the school network.
1 ...............................................................................................................................................
2 ................................................................................................................................................
[2]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [2]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [2]
5 State the safety issue that is most likely to occur for each of these causes.
........................................................................................................................................... [1]
........................................................................................................................................... [1]
........................................................................................................................................... [1]
...........................................................................................................................................
........................................................................................................................................... [1]
6 A student has set up a password for his laptop computer. The password he has chosen is
Px2zY!Cg3?bd
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [6]
(b) The student could have protected his laptop computer by using two-factor authentication. This
could have combined his password with a biometric method.
1 ........................................................................................................................................
2 ........................................................................................................................................
[2]
7 A systems analyst has been asked to carry out an analysis of a company’s current computer system.
1 ........................................................................................................................................
2 ........................................................................................................................................
3 ........................................................................................................................................
[3]
(b) The systems analyst is working with a team to create some new software. The software
documentation will be stored on the cloud.
Describe how the team can use the cloud to share the documentation.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [4]
(c) Members of the team can use video-conferencing to join business meetings from different
locations around the world.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [6]
8 (a) Compare Optical Mark Readers (OMRs) with Optical Character Readers (OCRs). Your answer
must include similarities and differences.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [6]
1 ........................................................................................................................................
2 ........................................................................................................................................
[2]
9 (a) Absolute and relative file paths are used in the content layer when creating a web page.
(i) Explain the differences between an absolute file path and a relative file path.
................................................................................................................................
................................................................................................................................
................................................................................................................................
................................................................................................................................ [2]
(ii) Explain why absolute file paths should not be used for hyperlinks to locally-saved web
pages.
................................................................................................................................
................................................................................................................................ [1]
Compare an anchor with a hyperlink. Your answer must include similarities and differences.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [4]
10 Some people use dialogue-based user interfaces to operate their car audio system.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [2]
(b) Describe the benefits and drawbacks of using a dialogue-based user interface in this way.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [4]
11 Portable hard drives can be Solid State Drives (SSDs) or Hard Disk Drives (HDDs).
Explain why the SSD may be better to use than the HDD.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
.................................................................................................................................................. [4]
12 Many media companies now provide media streaming for users to watch their television programmes.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [2]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [4]
(a) Give one reason for using each of the file formats. Each of your reasons must be different.
gif ......................................................................................................................................
...........................................................................................................................................
jpg .....................................................................................................................................
...........................................................................................................................................
[2]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [6]
(c) The file size of an image can be reduced by changing the file format of the image.
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
[2]
14 Identify the most appropriate method for reducing data entry errors from the descriptions given.
(a) Manually checking the data without reference to the original copy.
........................................................................................................................................... [1]
........................................................................................................................................... [1]
(c) Preventing errors when data is copied from one medium to another.
........................................................................................................................................... [1]
BLANK PAGE
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.
Cambridge Assessment International Education is part of Cambridge Assessment. Cambridge Assessment is the brand name of the University of Cambridge
Local Examinations Syndicate (UCLES), which is a department of the University of Cambridge.
Published
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.
Cambridge International will not enter into discussions about these mark schemes.
Cambridge International is publishing the mark schemes for the May/June 2023 series for most
Cambridge IGCSE, Cambridge International A and AS Level and Cambridge Pre-U components, and some
Cambridge O Level components.
These general marking principles must be applied by all examiners when marking candidate answers.
They should be applied alongside the specific content of the mark scheme or generic level descriptors
for a question. Each question paper and mark scheme will also comply with these marking principles.
the specific content of the mark scheme or the generic level descriptors for the question
the specific skills defined in the mark scheme or in the generic level descriptors for the question
the standard of response required by a candidate as exemplified by the standardisation scripts.
Marks awarded are always whole marks (not half marks, or other fractions).
marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit
is given for valid answers which go beyond the scope of the syllabus and mark scheme,
referring to your Team Leader as appropriate
marks are awarded when candidates clearly demonstrate what they know and can do
marks are not deducted for errors
marks are not deducted for omissions
answers should only be judged on the quality of spelling, punctuation and grammar when these
features are specifically assessed by the question as indicated by the mark scheme. The
meaning, however, should be unambiguous.
Rules must be applied consistently, e.g. in situations where candidates have not followed
instructions or in the application of generic level descriptors.
Marks should be awarded using the full range of marks defined in the mark scheme for the question
(however; the use of the full mark range may be limited according to the quality of the candidate
responses seen).
Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should
not be awarded with grade thresholds or grade descriptors in mind.
1 Text 1
2(b) Motherboard 1
3 Two from: 2
Connecting a storage device to the computer by (USB) cable Connecting a
storage device by Bluetooth
Connecting a storage device/cloud by wi-fi
5(a) Electrocution 1
5(b) Fire 1
5(c) Tripping 1
Benefits
It is a strong password
Hard to crack
More secure
Password is long therefore shoulder surfing is reduced
Does not contain personal information so harder to crack
Drawbacks
Easy to forget as it has many different characters
Even though it is still strong it is easy for a computer to crack
The user would have to look at the keyboard when entering the password
The user may have to write it down to remember it
Letters and numbers could be confused…
…such as 1 and I, 2 and Z, 5 and S
As it is long/complex it could be mis-typed
To gain full marks candidates must have correct answers for both
benefits and drawbacks
Similarities
Both read/scan data using optical methods
Both use direct data entry
Both are input devices
Both read data from printed documents
Both input large amounts of data
Both read data very quickly
Differences
OMR does not need to read the characters written only the marks OMR is
unable to recognise machine or hand-printed characters For OMR to read,
marks need to be within a specified area
The OMR marks have to be in the correct location
To gain full marks candidates must have correct answers for both
similarities and differences
Similarities
Both are links (in a web page)
Both can be attached to icons/text/graphics
Both are html tags used on web pages
Both are used for navigation
Both are coded as html tags starting with <A...>
Differences
An anchor allows the user to move from one part of a web page to another
part.
An anchor is a label that identifies a specific position in a document//An
anchor is within a hyperlink
An anchor needs a point set in the document and a link//A hyperlink only
needs the link and a web address
The code within an anchor will either be "name.." or "id.."
An anchor determines a fixed point on a web page that is used as a bookmark
An anchor can be placed at any point on a web page
A hyperlink allows the user to move from one web page to another web
page/website
The code within a hyperlink can be "href..", "rel..”, “target..”
A hyperlink can be attached to a block of text or image
A hyperlink can be clicked on to cause another web page or part of the same
web page to be displayed
A hyperlink can redirect a user to an anchor by including its name
A hyperlink is clickable
To gain full marks candidates must have correct answers for both
similarities and differences
Benefits
Allows for hands free control
Safer than using a standard interface
More useful for physically disabled users
Drawbacks
Limited access due to the number of commands stored
More expensive to develop
May not operate reliably due to background noise/speech impediment/accents
Need to be ‘trained’ by the user
Can be distracting if the commands are not understood
11 Four from: 4
The SSD is more portable
The seek time in the SSD is smaller
The data transfer rate in the SSD is better/smaller
There is less chance of the data becoming corrupted as it can save whilst the
drive is being moved
The SSD is smaller/thinner
The SSD uses less energy
SSD is more robust as no moving parts
Benefits
Instant access to the media
Saves time rather than downloading/going to the shops
No need for storage space as there is no copy
Drawbacks
Requires an internet connection
Requires a good internet/bandwidth connection otherwise buffering
Don’t get to keep the product
Online security issue related to the subscription
Technology could fail in the middle of the stream
If media is downloaded it is time locked
To gain full marks candidates must have correct answers for both
benefits and drawbacks
13(a) gif 2
One from:
Used to store animated/moving images
Used to store icons/simple logos
jpg
One from:
Used to store photographic images
Used to store graphics with complex colours and gradients
gif
Graphics Interchange Format
Supported by all web browsers
Can be animated images
Supports 8-bit colours/256 colours/limited
Features background transparency
Image quality never degrades with resaves
jpg
Joint Photographic (Experts) Group
Supports 24-bit colours/16.7 million colours//More colours
Image quality degrades slightly when a JPG is resaved.
Uses lossy compression
No background transparency
Enlarging the image can cause pixelation
Image quality is better
To gain full marks candidates must have correct answers for both gif
and jpg
14(a) Proofreading 1
14(b) Validation 1
14(c) Verification 1
INSTRUCTIONS
• Answer all questions.
• Use a black or dark blue pen.
• Write your name, centre number and candidate number in the boxes at the top of the page.
• Write your answer to each question in the space provided.
• Do not use an erasable pen or correction fluid.
• Do not write on any bar codes.
• You may use an HB pencil for any diagrams, graphs or rough working.
INFORMATION
• The total mark for this paper is 80.
• The number of marks for each question or part question is shown in brackets [ ].
• No marks will be awarded for using brand names of software packages or hardware.
06_0417_12_2023_1.13
© UCLES 2023 [Turn over
2
Tick (✓) the most appropriate validation check to test the validity of the bar code.
A check digit
B format check
C range check
D spell check
[1]
........................................................................................................................................... [1]
(b) an internal component that provides the input and output of audio signals
........................................................................................................................................... [1]
(c) an internal component that is composed of the main memory, the control unit and the arithmetic
logic unit.
........................................................................................................................................... [1]
3 A headteacher is producing a web page about the history of her school. She has been given some
old hard-copy photographs which she will include on the web page. She has a digital camera and
a scanner to use to convert the hard-copy photographs into a digital format.
Compare the use of a digital camera with a scanner in this scenario. Your answer must include
similarities and differences.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
.................................................................................................................................................. [4]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [2]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [2]
5 State which health issue is most likely to occur from each description shown. Your answer must
be different in each case.
........................................................................................................................................... [1]
........................................................................................................................................... [1]
........................................................................................................................................... [1]
6 A company requires its employees to regularly change their login passwords for the company’s
computer systems. Passwords must be strong and cannot be reused.
(a) Explain three problems that may occur when the employees change their passwords regularly.
1 ........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
3 ........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[6]
...........................................................................................................................................
........................................................................................................................................... [1]
1 ........................................................................................................................................
2 ........................................................................................................................................
3 ........................................................................................................................................
[3]
7 A student is creating a spreadsheet that includes a formula to check a number entered in a cell is
between two values.
=IF(AND(A10>1,A10<32),"OK","error")
(a) Identify two items of extreme test data the student should use and give the reason why this
data was chosen.
Reason .............................................................................................................................
...........................................................................................................................................
[3]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [3]
8 A teacher provides revision lessons during the holidays. The teacher plans to use web-conferencing
for the lessons.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [3]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [6]
9 (a) The products in a warehouse contain either a bar code or a Radio Frequency Identification
(RFID) tag.
Compare bar code readers and RFID readers. Your answer must include similarities and
differences.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [6]
1 ........................................................................................................................................
2 ........................................................................................................................................
[2]
1 ........................................................................................................................................
2 ........................................................................................................................................
3 ........................................................................................................................................
[3]
........................................................................................................................................... [1]
11 Some gaming systems use gesture based user interfaces to operate a game.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [2]
(b) Describe the drawbacks of using gesture based user interfaces in this way.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [4]
(a) Describe why Blu-ray discs are preferred to an internal hard disk for storing movies.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [4]
(b) Hard disks and Blu-ray discs are examples of backing storage.
1 ............................................................................................................................
................................................................................................................................
2 ............................................................................................................................
................................................................................................................................
[2]
1 ............................................................................................................................
2 ............................................................................................................................
[2]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [4]
(b) Data is collected by different types of sensor and then input to the computer model to be
processed.
1 ........................................................................................................................................
2 ........................................................................................................................................
[2]
1 ........................................................................................................................................
2 ........................................................................................................................................
[2]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [4]
Give two methods that could be used to prevent software copyright legislation being broken.
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
[2]
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.
Cambridge Assessment International Education is part of Cambridge Assessment. Cambridge Assessment is the brand name of the University of Cambridge
Local Examinations Syndicate (UCLES), which is a department of the University of Cambridge.
Published
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.
Cambridge International will not enter into discussions about these mark schemes.
Cambridge International is publishing the mark schemes for the May/June 2023 series for most
Cambridge IGCSE, Cambridge International A and AS Level and Cambridge Pre-U components, and some
Cambridge O Level components.
These general marking principles must be applied by all examiners when marking candidate answers.
They should be applied alongside the specific content of the mark scheme or generic level descriptors
for a question. Each question paper and mark scheme will also comply with these marking principles.
the specific content of the mark scheme or the generic level descriptors for the question
the specific skills defined in the mark scheme or in the generic level descriptors for the question
the standard of response required by a candidate as exemplified by the standardisation scripts.
Marks awarded are always whole marks (not half marks, or other fractions).
marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit
is given for valid answers which go beyond the scope of the syllabus and mark scheme,
referring to your Team Leader as appropriate
marks are awarded when candidates clearly demonstrate what they know and can do
marks are not deducted for errors
marks are not deducted for omissions
answers should only be judged on the quality of spelling, punctuation and grammar when these
features are specifically assessed by the question as indicated by the mark scheme. The
meaning, however, should be unambiguous.
Rules must be applied consistently, e.g. in situations where candidates have not followed
instructions or in the application of generic level descriptors.
Marks should be awarded using the full range of marks defined in the mark scheme for the question
(however; the use of the full mark range may be limited according to the quality of the candidate
responses seen).
Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should
not be awarded with grade thresholds or grade descriptors in mind.
Note: No marks are awarded for using brand names of software packages or hardware. These must
be created
Examiners must ensure that annotations are placed to show that the whole answer has been
seen.
Annotations MUST be placed in white space close to where the mark is awarded.
At the end of prose answers place a TV to show that the whole answer has been marked.
If an answer is left blank then use SEEN and award NR, but if anything has been written for
example ‘Don’t know’, ‘?’ etc. then use NAQ and award 0. If an answer has been attempted and
crossed out then attempt to mark it.
1 Check digit 1
2(c) CPU/Processor 1
3 Four from: 4
Similarities
Both capture images
Both store digital data
Both create digital images
Differences
Digital camera is more portable
Scanner captures the image in more detail
Scanners do not have a keystone effect
Digital camera may capture glare/shadow off the image
Digital camera has faster data capture
To gain full marks the comparison must have correct answers for both
similarities and differences.
Users may have to write the passwords down so they are not forgotten …
… this may lead to others seeing the passwords
7(a) 2 – 1 mark 3
31 – 1 mark
One from:
To test the boundaries (of the formula)
To test the comparisons are correct
Positives
The students save time as they do not need to travel to the school
The students save the cost of travelling to the school.
The school saves costs as it does not need to open in the holidays
Students and teachers can work from anywhere in the world
Can be recorded for students who miss the lesson
Negatives
Hardware/software could be expensive
Requires a good/reliable internet connection
There could be issues with child protection
More difficult to concentrate/motivate
If the hardware breaks/loss of connection/lack of hardware then the student
cannot participate
Only students with the correct specialist devices will be able to access
To gain full marks candidates must have correct answers for both
positives and negatives
Similarities
Both readers scan the product code
Both readers use direct data entry
Both readers allow tracking of products
Both readers are contactless
Differences
Bar code readers only scan one bar code at a time whereas RFID readers
read multiple tags at the same time
Bar code readers require a direct line-of-sight with the code
RFID readers use near-field technology
Bar code readers need to be close to the bar code
Bar code needs to be in the correct position for reader to be able to read it
Bar codes readers might not be able to read a damaged/scratched bar code
whereas RFID can read data as long as chip/tag is not severely damaged.
Bar code reader might have read errors if the bar code is damaged/scratched
whereas RFID readers are more likely to read damaged/scratched tags
Bar code readers emit/use light whereas RFID uses electromagnetic/radio
waves
To gain full marks the comparison must have correct answers for both
similarities and differences.
INSTRUCTIONS
• Answer all questions.
• Use a black or dark blue pen.
• Write your name, centre number and candidate number in the boxes at the top of the page.
• Write your answer to each question in the space provided.
• Do not use an erasable pen or correction fluid.
• Do not write on any bar codes.
• You may use an HB pencil for any diagrams, graphs or rough working.
INFORMATION
• The total mark for this paper is 80.
• The number of marks for each question or part question is shown in brackets [ ].
• No marks will be awarded for using brand names of software packages or hardware.
06_0417_13_2023_1.12
© UCLES 2023 [Turn over
2
Tick (✓) the most appropriate validation check to test the validity of the ISBN.
A character check
B format check
C length check
D range check
[1]
(a) An internal hardware component that connects a computer to a Local Area Network.
........................................................................................................................................... [1]
(b) An external device that retains a computer’s data even after the computer is turned off.
........................................................................................................................................... [1]
........................................................................................................................................... [1]
3 A group of students are producing a class newsletter which they will email to parents of
students in the class. They are deciding whether to use a laptop computer or a smartphone
to type the newsletter.
(a) Discuss the advantages and disadvantages of using a laptop computer rather than a
smartphone for this purpose.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [6]
(b) The students have decided to use a smartphone. Data for the newsletter will be input,
stored and output by the smartphone.
(i) Identify two devices that are part of the smartphone that could be used to input
the data for the newsletter.
1 ............................................................................................................................
2 ............................................................................................................................
[2]
(ii) Identify two devices that are part of the smartphone that could be used to output
data from the newsletter.
1 ............................................................................................................................
2 ............................................................................................................................
[2]
(iii) Identify two appropriate devices that could be used to store data for the
newsletter.
1 ............................................................................................................................
2 ............................................................................................................................
[2]
(c) The newsletter is to be saved as a PDF and sent as an email attachment to parents.
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
[2]
(d) Describe the features that the students must include to make the newsletter appeal to
the parents.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [4]
Compare an intranet with an extranet. Your answer must include similarities and differences.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
.................................................................................................................................................. [6]
5 Identify two appropriate IT-related causes for each of the health issues. Your answers
must be different in each case.
1 ........................................................................................................................................
2 ........................................................................................................................................
[2]
1 ........................................................................................................................................
2 ........................................................................................................................................
[2]
1 ........................................................................................................................................
...........................................................................................................................................
Example ............................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
Example ............................................................................................................................
...........................................................................................................................................
[4]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [2]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [4]
(b) Describe the steps involved in automatic stock control when an item is sold at a POS
terminal.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [6]
8 A teacher is creating a spreadsheet as an electronic mark book. Part of the electronic mark
book displays how well a student did on a piece of work. When a student completes a piece
of work the teacher will enter the mark into the electronic mark book and a message will be
displayed.
=IF(A1>=60,"Merit",IF(A1>50,"Pass","Not Pass"))
The formula will need to be tested. The teacher will do this by entering test data into cell A1.
(a) Explain the steps that need to be taken to test the formula. Include in your answer any
test data used and the reasons why these were chosen.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [5]
State the changes he needs to make to the formula to ensure ‘Pass’ is displayed.
...........................................................................................................................................
........................................................................................................................................... [1]
(c) When the electronic mark book is complete it needs to be tested with live data.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [2]
9 The manager of an organisation is planning a meeting of its directors. The manager plans
to use audio-conferencing for the meeting.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [3]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [3]
(c) Identify the hardware and software required to join the audio-conference.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [4]
10 A school secretary is composing an email. She will send the email to a teacher and will
copy the headteacher into the message. She can either copy the headteacher in as cc or
bcc.
Compose
To:
cc:
bcc:
Subject:
cc ......................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
bcc ....................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[4]
(b) A teacher is considering setting up either a forum or a blog for his class to help his
students with their studies.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [5]
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
.................................................................................................................................................. [3]
12 A web page has an attached stylesheet in the head section and also has an inline style
attribute in the body section.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
.................................................................................................................................................. [2]
BLANK PAGE
BLANK PAGE
BLANK PAGE
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.
Cambridge Assessment International Education is part of Cambridge Assessment. Cambridge Assessment is the brand name of the University of Cambridge
Local Examinations Syndicate (UCLES), which is a department of the University of Cambridge.
Published
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.
Cambridge International will not enter into discussions about these mark schemes.
Cambridge International is publishing the mark schemes for the May/June 2023 series for most
Cambridge IGCSE, Cambridge International A and AS Level and Cambridge Pre-U components, and some
Cambridge O Level components.
These general marking principles must be applied by all examiners when marking candidate answers.
They should be applied alongside the specific content of the mark scheme or generic level descriptors
for a question. Each question paper and mark scheme will also comply with these marking principles.
the specific content of the mark scheme or the generic level descriptors for the question
the specific skills defined in the mark scheme or in the generic level descriptors for the question
the standard of response required by a candidate as exemplified by the standardisation scripts.
Marks awarded are always whole marks (not half marks, or other fractions).
marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit
is given for valid answers which go beyond the scope of the syllabus and mark scheme,
referring to your Team Leader as appropriate
marks are awarded when candidates clearly demonstrate what they know and can do
marks are not deducted for errors
marks are not deducted for omissions
answers should only be judged on the quality of spelling, punctuation and grammar when these
features are specifically assessed by the question as indicated by the mark scheme. The
meaning, however, should be unambiguous.
Rules must be applied consistently, e.g. in situations where candidates have not followed
instructions or in the application of generic level descriptors.
Marks should be awarded using the full range of marks defined in the mark scheme for the question
(however; the use of the full mark range may be limited according to the quality of the candidate
responses seen).
Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should
not be awarded with grade thresholds or grade descriptors in mind.
Note: No marks are awarded for using brand names of software packages or hardware. These must
be created.
Examiners must ensure that annotations are placed to show that the whole answer has been
seen
Annotations MUST be placed in white space close to where the mark is awarded
At the end of prose answers place a TV to show that the whole answer has been marked
If an answer is left blank then use SEEN and award NR, but if anything has been written for
example ‘Don’t know’, ‘?’ etc. then use NAQ and award 0. If an answer has been attempted
and crossed out then attempt to mark it.
1 B Format check 1
Advantages
Larger screen to read the typed data
Laptop uses a physical keyboard therefore easier to type
Larger keyboard to type in the data
Fewer data entry errors due to larger screen / keyboard
More suited for entering mass amounts of data
Laptop version of software will have more features than smartphone version
of software
More computer storage for typed text
Easier to add other devices to store the data
Disadvantages
Less portable / heavier than a smartphone as the smartphone can be
slipped into a pocket
Smartphones are smaller therefore easier to carry
More likely to have a smartphone with them
To gain full marks candidates must have correct answers from both
advantages and disadvantages.
Camera
Microphone
Touch screen
Speaker
Screen
SD card
Flash memory
Internal storage
SSD
4 Six from: 6
Similarities
Both have shared content
Both use internet technologies / TCP-IP
Both have restricted access
Both sit behind a firewall
Differences
Intranet shares data within an organisation whereas extranet shares content
with external users and employees
Extranet is part of a company’s intranet
Intranet allows communication within the organisation whereas extranet
allows communication with customers / suppliers
Extranet can lead to more security breaches
Intranet is owned is by a single organisation whereas extranet can be used
by several organisations
To gain full marks candidates must have correct answers from both
similarities and differences
6(a) One mark for each form of identification and one mark for each 4
corresponding example given:
By electronically tracking the sales of goods the industry could know when
to order items…
…so that the goods do not run out in the stores
The POS system allows a business to identify which products are selling
well / selling badly…
…so products do not run out / left of the shelves
Through this identification, a business can increase the order of profitable
products and reduce unmarketable inventory
Increases speed of transaction as the checkout staff do not need to enter
the price of each item
Itemised bills can be generated on screen and printed for customers
It allows self check out which means less staff are needed therefore
reducing staff costs
Real data relating to tests that have been carried out previously
To ensure that the electronic mark book should work with real data
Easier to set up
Does not need specialist equipment…
…therefore saves money
No issue with lip syncing
Less bandwidth is needed therefore reduces hanging / freeze
More privacy as they do not use cameras
CC
Cc stands for carbon copy
The Headteacher would receive a copy of the message with the teacher
knowing
All recipients would know who is on the cc list and where it was from
BCC
Bcc stands for blind carbon copy
The Headteacher would receive a copy of the message without the teacher
knowing
All recipients on bcc would only know where it was from to and the cc list
To gain full marks candidates must have correct answers from both cc
and bcc.
11 Three from: 3
12 Two from: 2
INSTRUCTIONS
• Answer all questions.
• Use a black or dark blue pen.
• Write your name, centre number and candidate number in the boxes at the top of the page.
• Write your answer to each question in the space provided.
• Do not use an erasable pen or correction fluid.
• Do not write on any bar codes.
• You may use an HB pencil for any diagrams, graphs or rough working.
INFORMATION
• The total mark for this paper is 100.
• The number of marks for each question or part question is shown in brackets [ ].
• No marks will be awarded for using brand names of software packages or hardware.
06_0417_11_2022_1.16
© UCLES 2022 [Turn over
2
[2]
2 Complete each sentence using the most appropriate item from the list. Your answers must be
different in each case.
........................................................................................................................................... [1]
........................................................................................................................................... [1]
........................................................................................................................................... [1]
........................................................................................................................................... [1]
1 ...............................................................................................................................................
2 ...............................................................................................................................................
[2]
4 Many laptop computers use the cloud to store data. A technician has produced a report on his
laptop computer but has stored the report on a memory stick rather than storing it on the cloud.
Describe two advantages of using a memory stick rather than the cloud to store data.
1 ...............................................................................................................................................
..................................................................................................................................................
2 ...............................................................................................................................................
..................................................................................................................................................
[2]
Describe the advantages and disadvantages of using these cards rather than cards that use chip
and PIN.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
.................................................................................................................................................. [4]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [2]
(b) Explain the differences between attached stylesheets and inline style attributes.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [4]
(a) Compare and contrast relational databases and flat file databases. Your answer must include
similarities and differences.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [8]
(b) Give, using an example, one reason why flat file databases are used in certain applications
rather than relational databases.
Reason .............................................................................................................................
...........................................................................................................................................
Example ............................................................................................................................
...........................................................................................................................................
[2]
8 When using computers people can suffer from Repetitive Strain Injury (RSI).
(a) Describe the term RSI. Include in your answer the causes of RSI.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [3]
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
3 ........................................................................................................................................
...........................................................................................................................................
[3]
9 Martin, who is a teacher, is creating a multimedia presentation to explain a topic to his students.
1 ........................................................................................................................................
2 ........................................................................................................................................
3 ........................................................................................................................................
4 ........................................................................................................................................
[4]
(b) Martin wants to record a message for his students. His voice will be added to the presentation.
He will also need to listen to his voice to make sure the sound is of good quality.
1 ........................................................................................................................................
2 ........................................................................................................................................
[2]
(c) Martin will need to use software to create different types of content before including them in
the presentation.
Name two types of software that he might use and for each one, write down what he would
use it for.
Software 1 ........................................................................................................................
...........................................................................................................................................
Use ...................................................................................................................................
...........................................................................................................................................
Software 2 ........................................................................................................................
...........................................................................................................................................
Use ...................................................................................................................................
...........................................................................................................................................
[4]
10 A river authority is concerned about levels of pollution in a major river. The quality of the water in
the river needs to be monitored using sensors.
(a) Name three sensors that could be used to measure the pollution in the river.
1 ........................................................................................................................................
2 ........................................................................................................................................
3 ........................................................................................................................................
[3]
(b) Discuss the advantages and disadvantages of using computers to measure the pollution in
the river rather than humans measuring the pollution.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [6]
Discuss the advantages and disadvantages of analysing a system by interviewing staff rather than
using questionnaires.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
.................................................................................................................................................. [6]
12 Many company computer network systems use WiFi as a communication system to help prevent
the issue of tripping over trailing cables.
(a) For each of the following physical safety issues describe two ways of helping to prevent them.
(i) Fire
Prevention 1 ..........................................................................................................
................................................................................................................................
Prevention 2 ..........................................................................................................
................................................................................................................................
[2]
(ii) Electrocution
Prevention 1 ..........................................................................................................
................................................................................................................................
Prevention 2 ..........................................................................................................
................................................................................................................................
[2]
(b) Describe three eSafety measures which should be taken when playing games on the internet.
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
3 ........................................................................................................................................
...........................................................................................................................................
[3]
(c) In order to log onto online gaming a user ID and password is needed.
Explain what is meant by a user ID and password and why they are needed.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [4]
13 (a) Explain the need for copyright legislation when data is published on the internet.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [4]
(b) Describe methods that software producers use to prevent software copyright being broken.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [4]
(c) Emails are used by people to communicate with each other. Copyright and using acceptable
language in the email are two of the constraints that affect the use of email.
(i) Describe four other constraints that may affect the use of email.
1 ............................................................................................................................
................................................................................................................................
2 ............................................................................................................................
................................................................................................................................
3 ............................................................................................................................
................................................................................................................................
4 ............................................................................................................................
................................................................................................................................
[4]
1 ............................................................................................................................
................................................................................................................................
2 ............................................................................................................................
................................................................................................................................
[2]
14 The manager of a medical centre keeps the doctor’s stock records in a database. The stock for
any item is not allowed to fall below 15 items and the manager keeps a maximum of 100 items in
stock.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [2]
(b) Write down the field name from the table that would be the most appropriate for each of these
validation checks. Each answer must be different.
Length ...............................................................................................................................
Type ..................................................................................................................................
[3]
(c) Name the most appropriate field from the table that could be used as a primary key in the
database.
........................................................................................................................................... [1]
15 A customer is booking a seat on a theatre’s online booking system. The customer reserves seats
using the theatre’s website and a debit card. The website displays the seats that are available and
a database stores the customer details, the payment details and the seat details.
When the customer enters their debit card details for a seat, the theatre’s computer communicates
with the bank’s computer.
(a) Describe four checks that the bank’s computer will make on the customer’s bank account.
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
3 ........................................................................................................................................
...........................................................................................................................................
4 ........................................................................................................................................
...........................................................................................................................................
[4]
(b) Describe the processing carried out by the theatre’s computer when making a booking.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [4]
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable
effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will
be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge Assessment
International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at
www.cambridgeinternational.org after the live examination series.
Cambridge Assessment International Education is part of Cambridge Assessment. Cambridge Assessment is the brand name of the University of Cambridge Local
Examinations Syndicate (UCLES), which is a department of the University of Cambridge.
Published
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.
Cambridge International will not enter into discussions about these mark schemes.
Cambridge International is publishing the mark schemes for the May/June 2022 series for most
Cambridge IGCSE, Cambridge International A and AS Level and Cambridge Pre-U components, and some
Cambridge O Level components.
These general marking principles must be applied by all examiners when marking candidate answers. They should be applied alongside the
specific content of the mark scheme or generic level descriptors for a question. Each question paper and mark scheme will also comply with these
marking principles.
the specific content of the mark scheme or the generic level descriptors for the question
the specific skills defined in the mark scheme or in the generic level descriptors for the question
the standard of response required by a candidate as exemplified by the standardisation scripts.
Marks awarded are always whole marks (not half marks, or other fractions).
marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit is given for valid answers which go beyond the
scope of the syllabus and mark scheme, referring to your Team Leader as appropriate
marks are awarded when candidates clearly demonstrate what they know and can do
marks are not deducted for errors
marks are not deducted for omissions
answers should only be judged on the quality of spelling, punctuation and grammar when these features are specifically assessed by the
question as indicated by the mark scheme. The meaning, however, should be unambiguous.
Rules must be applied consistently, e.g. in situations where candidates have not followed instructions or in the application of generic level
descriptors.
Marks should be awarded using the full range of marks defined in the mark scheme for the question (however; the use of the full mark range may
be limited according to the quality of the candidate responses seen).
Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should not be awarded with grade thresholds or
grade descriptors in mind.
1 Hub 2
Bridge
2(a) hardware 1
2(b) software 1
2(c) an applet 1
2(d) a sensor 1
3 Two from: 2
Computer
Analogue to digital convertor/ADC
Digital to Analogue convertor/DAC
Actuator
4 Two from: 2
Does not need access to the internet
Fewer issues storing the data as the connection could drop during storage if the cloud is used
More control over the stored data
5 Four from: 4
Advantages
Less wear on the card as it is not used in a device
Transaction is quicker
Can be read from a pocket
No shoulder surfing
Disadvantages
Transaction can be read by hacker’s device
Does not use a PIN therefore money can be taken if lost
Limit on spending on the card
If lost the card could be used by anyone so is less secure
To gain full marks the description must have correct answers for both advantages and disadvantages
Differences
Flat file database is a plain text file
Flat file is a simple structure
Flat file uses one table
Relational database has linked tables/relationships
Relational database allows searches/reports to be created over multiple tables
Relational database allows cross referencing between tables
Relational database records are easier to add
Relational databases are more powerful
Relational database reduces duplicate data
Relational database uses foreign keys
To gain full marks there must be correct answers for both similarities and differences
One mark:
Example of a list such as name, address/CSV files
Two from:
Caused by repetitive movements
Caused by holding a mouse and clicking the buttons repetitively
Caused by constant typing on a keyboard
Caused by sitting in a poor posture for a long period of time
Disadvantages
Computer responds less to unusual circumstances
Computer equipment can be more susceptible to atmospheric conditions
Computer equipment is more likely to be damaged or stolen by vandals
To gain full marks the discussion must have correct answers for both advantages and disadvantages
11 Interviews 6
Advantages
Questions can be explained if they are misunderstood this cannot happen withquestionnaires
Questions can be asked relating to the answers given previously
More detailed answers can be given
More complex questions can be asked
Questions can be changed to suit the person being interviewed
The person being interviewed tends to answer all the questions
Can see body language
Disadvantages
They are not anonymous whereas questionnaires are
Takes far longer to complete than a questionnaire
The interviewer and interviewee must be available at the same time
More expensive as the interviewer has to be hired and interviewee needs time off
Answers may not be honest//more honest with a questionnaire as the person isanonymous
Answers may be skewed by the interviewer
Answers in a questionnaire can be analysed quicker through OMR
Questionnaires tend to be sent to more people
To gain full marks the discussion must have correct answers for both interviews and questionnaires
12(a)(i) Fire 2
Two from:
CO2 fire extinguisher
Don’t overload sockets
Have fans/cooling system
Use Residual Circuit Breaker/RCB
12(a)(ii) Electrocution 2
Don’t bring drinks close to computers
Cover/insulate live/bare wires
Holograms
Holograms are often used on the packaging of software and they indicate that the copy is genuine
Software without a hologram on the packaging is usually an illegal copy as they are too difficult and costly for pirates to
implement
Licence agreements
Licence agreements are part of the software installation process and they inform the user exactly how they are legally
allowed to use the product
Users are required to 'agree to terms of use' before they can complete the installation Any breach of this can mean
prosecution and fines
One mark for naming the method then one mark for each reason
To gain full marks candidates must have at least one description in addition to naming the methods
14(c) Serial_number 1
INSTRUCTIONS
• Answer all questions.
• Use a black or dark blue pen.
• Write your name, centre number and candidate number in the boxes at the top of the page.
• Write your answer to each question in the space provided.
• Do not use an erasable pen or correction fluid.
• Do not write on any bar codes.
• You may use an HB pencil for any diagrams, graphs or rough working.
INFORMATION
• The total mark for this paper is 100.
• The number of marks for each question or part question is shown in brackets [ ].
• No marks will be awarded for using brand names of software packages or hardware.
06_0417_12_2022_1.15
© UCLES 2022 [Turn over
2
[2]
1 ...............................................................................................................................................
2 ...............................................................................................................................................
[2]
(a) The network device that is used to transmit the data along an analogue telephone line is a
........................................................................................................................................... [1]
........................................................................................................................................... [1]
(c) The network device that allows data to be directed to a specific computer on a LAN is a
........................................................................................................................................... [1]
(d) The internal network device that allows a computer to connect to a LAN is a
........................................................................................................................................... [1]
The paragraph below shows some of the formatting features that can be used.
(a) Write down four of the formatting features that have been used in the paragraph shown.
1 ........................................................................................................................................
2 ........................................................................................................................................
3 ........................................................................................................................................
4 ........................................................................................................................................
[4]
(b) The logo for the Summer Steam Festival is shown and labelled A. The organisers of the event
are planning to create a second logo for all their correspondence. This is shown and labelled B.
Summer
Steam Festival Summer
2022 Steam Festival
2022
A B
Describe the steps that have been used to transform logo A into logo B.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [4]
5 A library is considering the way it issues books. The librarians are planning to use RFID rather than
bar codes.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
.................................................................................................................................................. [4]
6 Laptop computers use Solid State Drives (SSD) rather than Hard Disc Drives (HDD).
Describe two disadvantages of using an SSD rather than an HDD in a laptop computer.
1 ...............................................................................................................................................
..................................................................................................................................................
2 ...............................................................................................................................................
..................................................................................................................................................
[2]
7 A patient has an injury and the doctor treating him needs to find out information about the patient.
Most of the data he needs to collect is personal data.
The data collected is protected by data protection legislation. Most data protection acts include the
principle that data should be kept confidential and secure.
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
3 ........................................................................................................................................
...........................................................................................................................................
4 ........................................................................................................................................
...........................................................................................................................................
[4]
(b) Explain what is meant by personal data. Include two examples of personal data in your answer.
Explanation .......................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
Example 1 .........................................................................................................................
...........................................................................................................................................
Example 2 .........................................................................................................................
...........................................................................................................................................
[3]
(c) Explain why personal data should be kept confidential and secure.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [4]
8 Uniform Resource Locators (URL) are used to locate websites and resources. A teacher needs to
find a teaching guide from Cambridge Assessment International Education. To download the
teaching guide she types in:
(a) Write down only the part of the URL which shows the file name of the teaching guide.
........................................................................................................................................... [1]
(b) Write down only the part of the URL which is the folder where the teaching guide is stored.
........................................................................................................................................... [1]
(c) Write down only the part of the URL which is the domain name.
........................................................................................................................................... [1]
...........................................................................................................................................
........................................................................................................................................... [1]
=VLOOKUP(F2,A2:B9,2,0)
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [4]
(b) Before the spreadsheet can be used, data needs to be entered to test the spreadsheet.
There are three types of test data: normal, abnormal and extreme.
Normal ..............................................................................................................................
...........................................................................................................................................
Abnormal ..........................................................................................................................
...........................................................................................................................................
Extreme ............................................................................................................................
...........................................................................................................................................
[3]
(c) Explain, using examples, the differences between a function and a formula.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [6]
(d) The completed file could have been created using a database.
Describe two reasons why databases are used in certain applications rather than spreadsheets.
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
[2]
10 The prolonged use of computers can cause several health problems particularly when sitting down
and using monitors.
Discuss the strategies that you have developed to minimise health risks which only relate to sitting
down and using a monitor.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
.................................................................................................................................................. [8]
Discuss the advantages and disadvantages to the company of using computer-controlled robots
rather than using humans to manufacture the cars.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
.................................................................................................................................................. [6]
Discuss the benefits and drawbacks of analysing a system by observing staff rather than looking
at the current systems documentation.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
.................................................................................................................................................. [6]
13 A librarian in a college department library is entering data into a student borrowers’ file. As the data
is entered it needs to be verified.
1 ........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[4]
(b) Explain, using examples, why it is necessary to carry out validation as well as verification for
this system.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [4]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [2]
(b) Describe the ways that a user can recognise spam and methods to help prevent it.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [6]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [6]
(b) Describe two issues related to the security of data in the cloud.
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
[2]
16 A company uses corporate house style within the headers and footers in its documents.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [2]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [2]
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable
effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will
be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge Assessment
International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at
www.cambridgeinternational.org after the live examination series.
Cambridge Assessment International Education is part of Cambridge Assessment. Cambridge Assessment is the brand name of the University of Cambridge Local
Examinations Syndicate (UCLES), which is a department of the University of Cambridge.
Published
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.
Cambridge International will not enter into discussions about these mark schemes.
Cambridge International is publishing the mark schemes for the May/June 2022 series for most
Cambridge IGCSE, Cambridge International A and AS Level and Cambridge Pre-U components, and some
Cambridge O Level components.
These general marking principles must be applied by all examiners when marking candidate answers. They should be applied alongside the
specific content of the mark scheme or generic level descriptors for a question. Each question paper and mark scheme will also comply with these
marking principles.
the specific content of the mark scheme or the generic level descriptors for the question
the specific skills defined in the mark scheme or in the generic level descriptors for the question
the standard of response required by a candidate as exemplified by the standardisation scripts.
Marks awarded are always whole marks (not half marks, or other fractions).
marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit is given for valid answers which go beyond the
scope of the syllabus and mark scheme, referring to your Team Leader as appropriate
marks are awarded when candidates clearly demonstrate what they know and can do
marks are not deducted for errors
marks are not deducted for omissions
answers should only be judged on the quality of spelling, punctuation and grammar when these features are specifically assessed by the
question as indicated by the mark scheme. The meaning, however, should be unambiguous.
Rules must be applied consistently, e.g. in situations where candidates have not followed instructions or in the application of generic level
descriptors.
Marks should be awarded using the full range of marks defined in the mark scheme for the question (however; the use of the full mark range may
be limited according to the quality of the candidate responses seen).
Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should not be awarded with grade thresholds or
grade descriptors in mind.
1 Keyboard 2
Digital camera
3(a) Modem 1
3(b) Router 1
3(c) Switch 1
5 Four from: 4
RFID are faster to read than bar codes
RFID scanning is more accurate than bar codes
RFID does not need line of sight to read but bar code does
RFID will read the data if the reader is further away
RFID can scan multiple items at the same time
RFID allows greater security
RFID can store more data than a bar code
RFID tags can be rewritten, so can be reused
RFID tags are more robust as bar codes will not scan if damaged
8(a) 2193733.pdf 1
8(b) igcse-ICT-0417 1
8(c) www.cambridgeinternational.org 1
9(a) =VLOOKUP(F2,A2:B9,2,0) 4
Four from:
Looks up F2/Airport name
Looks up in the range A2:B9/Code and Name
Finds the corresponding value from the 2nd column
Displays the value in G2
Finds exact match
9(b) Normal 3
Data that is within the boundary of acceptability
Abnormal
Data that is outside the boundary/limit of acceptability/incorrect data
Extreme
Data on the edge of acceptability
One mark
Examples =A1+B1, =SUM(A2:B2)
One mark
Examples SUM/AVERAGE etc
10 Eight from: 8
Use of the monitor
Using a flat screen monitor can reduce eye strain and headaches
I turn the monitor 90 deg to the window to reduce the glare on the screen
If I turn the monitor this can cause problems with the layout of the room
I need to buy a monitor that could tilt to reduce neck ache
I close the window blinds to avoid glare on monitor/headaches
I should not use rooms with more than one window but this could be difficult
I could use a matt screen to prevent glare/headaches
I use a flat screen monitor as there is less flicker therefore reduces the chance of an epileptic seizure/eye strain/headaches
I keep the screen clear of dust to reduce static and eye strain
I could have my eyesight tested regularly
Brightness of the room should equal the brightness of the screen to prevent eye strain
Enable blue light filter/blue light glasses to prevent eye strain
I could set night light on the computer to prevent eye strain
I sit at arms length from the screen to prevent eye strain
Sitting down
I use an ergonomic chair/standing desk to reduce back and neck pains
I sit with correct posture to help reduce back and neck pain
I use a footrest to reduce DVT/improve posture
If there are wheels on the chair for easy movement I should be careful to avoid injury problems with the chair moving
backwards
Maximum of six marks if candidate only mention strategies for either sitting down or using a monitor
11 Six from: 6
Advantages
Robots can work in sterile/harmful areas which are dangerous for humans
Humans would need protective clothing which would cost the company more money
Robots can more easily be used for transferring large delicate items
Robots can work 24/7
Cheaper in the long run
Higher productivity
More accurate/precise engineering
More frequent checking of the equipment
Fewer workers are needed therefore lowering costs
Production of the cars is more consistent
Disadvantages
Expensive to buy robots
Maintenance is expensive
Requires backup systems, which are expensive
They replace skilled workers, leading to de-skilling
They need constant observation which increases the cost of maintenance crews
To gain full marks the discussion must have correct answers for both advantages and disadvantages
12 Observation 6
The analyst sees it with their own eyes
Get a complete picture of the whole system
Cheaper as it does not take the worker away from work
Description of the Hawthorne effect
The quality and accuracy of information is highly dependent on the skill of the observer
Examining documents
Can see exact details of inputs, processing and outputs
Saves time as there could be copies of previous analysis
Allows the analyst to predict the size of the new system by analysing the amount of data
Very time consuming to look through all the documents
Very expensive to pay for an analyst to look through all the documents
To gain full marks the discussion must have correct answers for both observation and examining documents
13(a) One mark for naming the verification and one mark for explanation 4
Visual verification
Person enters the data it is read through and corrected as needed using the original copy
How is it used:
User accesses the cloud storage using the internet
Cloud data can be accessed from any device
Clients send files to a data server
The server is maintained by a cloud provider
Data can be shared with other users
Cloud storage automatically backs up data
If one server fails there are others used as backup
Users pay a monthly/annual fee for storage used
To gain full marks the explanation must have correct answers for both what it is and how it is used
INSTRUCTIONS
• Answer all questions.
• Use a black or dark blue pen.
• Write your name, centre number and candidate number in the boxes at the top of the page.
• Write your answer to each question in the space provided.
• Do not use an erasable pen or correction fluid.
• Do not write on any bar codes.
• You may use an HB pencil for any diagrams, graphs or rough working.
INFORMATION
• The total mark for this paper is 100.
• The number of marks for each question or part question is shown in brackets [ ].
• No marks will be awarded for using brand names of software packages or hardware.
06_0417_13_2022_1.12
© UCLES 2022 [Turn over
2
Memory
Mouse Printer Spreadsheet
stick
[2]
2 Name an appropriate validation routine for each statement. Each answer must be different.
(a) The last digit in a code used to ensure the other digits have been entered correctly.
........................................................................................................................................... [1]
........................................................................................................................................... [1]
(c) This validation routine ensures data has been entered into a field.
........................................................................................................................................... [1]
........................................................................................................................................... [1]
3 Identify two input devices which are used in computer control systems.
1 ...............................................................................................................................................
2 ...............................................................................................................................................
[2]
4 Computers can store data in the cloud rather than using storage devices in the computer.
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
3 ........................................................................................................................................
...........................................................................................................................................
[3]
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
3 ........................................................................................................................................
...........................................................................................................................................
[3]
5 The manager of a cinema has purchased a new booking system. There are 26 rows in the cinema
with 20 seats on a row. Each seat is identified by a unique ID. The seat ID consists of the row letter
followed by the position of the seat on the row. An example of the seat on row F position 12 would
be F12.
(a) Write down one example of each of the following types of test data. The answers must be
different in each case.
Normal ..............................................................................................................................
Abnormal ..........................................................................................................................
[2]
(b) When a ticket is produced for the new system it contains a QR code.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [5]
(c) Discuss the advantages and disadvantages of using manual booking systems rather than
online booking systems.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [8]
6 Eye strain is one of the health issues associated with using computers.
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
3 ........................................................................................................................................
...........................................................................................................................................
[3]
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
3 ........................................................................................................................................
...........................................................................................................................................
4 ........................................................................................................................................
...........................................................................................................................................
[4]
7 Tawara Stores has realised that the number of people shopping for food online has increased over
the past few years.
(a) Discuss the advantages and disadvantages to the customer of shopping for food online.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [8]
(b) Tawara Stores are also aware that many current websites do not cater for older people. They
intend to create a version of their website for this audience.
Describe the features of this website to meet the needs of an older audience, giving reasons
for your choice of features.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [4]
8 Tawara Hotel uses magnetic stripe cards to allow guests access to their bedrooms. The hotel is
changing the electronic lock it uses on its bedroom doors so the lock can work with RFID cards.
Compare the use of magnetic stripe cards and RFID cards for key entry. Your answer must include
similarities and differences.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
.................................................................................................................................................. [6]
9 The Internet of Things (IoT) allows devices as well as computers to connect to the internet using
a router. Each device uses an IP address.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [3]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [3]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [4]
10 Both the internet and the intranet are used for communication.
(i) Internet
................................................................................................................................
................................................................................................................................
................................................................................................................................
................................................................................................................................ [2]
(ii) Intranet
................................................................................................................................
................................................................................................................................
................................................................................................................................
................................................................................................................................ [2]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [6]
11 An image has been taken of a bird watcher and a bird. The original image has been saved as a
jpg file type. You have been asked to remove parts of the image to just show the bird and to save
it as a png file type to become the new image.
Original image
New image
(a) Explain the steps needed to change the original image to the new image.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [4]
(b) Explain the differences between a jpg and a png file type.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [4]
12 The protection of personal data is important as many transactions are carried out online.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [4]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [4]
13 In a college library if a book is not available students can reserve the book. When the book becomes
available the librarian needs to inform the student. He does this by typing a letter and printing it.
He has a database of students and has decided that in future he will use mail merge to produce
the letters.
Give four advantages of using mail merge instead of typing out the letter each time.
1 ...............................................................................................................................................
..................................................................................................................................................
2 ...............................................................................................................................................
..................................................................................................................................................
3 ...............................................................................................................................................
..................................................................................................................................................
4 ...............................................................................................................................................
..................................................................................................................................................
[4]
14 People can manage their banking transactions using the internet. However, if the internet signal is
poor telephone banking can be used.
A person wishes to use telephone banking without speaking to an operator to transfer money from
one bank account to another.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
.................................................................................................................................................. [6]
BLANK PAGE
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable
effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will
be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge Assessment
International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at
www.cambridgeinternational.org after the live examination series.
Cambridge Assessment International Education is part of Cambridge Assessment. Cambridge Assessment is the brand name of the University of Cambridge Local
Examinations Syndicate (UCLES), which is a department of the University of Cambridge.
Published
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.
Cambridge International will not enter into discussions about these mark schemes.
Cambridge International is publishing the mark schemes for the May/June 2022 series for most
Cambridge IGCSE, Cambridge International A and AS Level and Cambridge Pre-U components, and some
Cambridge O Level components.
These general marking principles must be applied by all examiners when marking candidate answers. They should be applied alongside the
specific content of the mark scheme or generic level descriptors for a question. Each question paper and mark scheme will also comply with these
marking principles.
the specific content of the mark scheme or the generic level descriptors for the question
the specific skills defined in the mark scheme or in the generic level descriptors for the question
the standard of response required by a candidate as exemplified by the standardisation scripts.
Marks awarded are always whole marks (not half marks, or other fractions).
marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit is given for valid answers which go beyond the
scope of the syllabus and mark scheme, referring to your Team Leader as appropriate
marks are awarded when candidates clearly demonstrate what they know and can do
marks are not deducted for errors
marks are not deducted for omissions
answers should only be judged on the quality of spelling, punctuation and grammar when these features are specifically assessed by the
question as indicated by the mark scheme. The meaning, however, should be unambiguous.
Rules must be applied consistently, e.g. in situations where candidates have not followed instructions or in the application of generic level
descriptors.
Marks should be awarded using the full range of marks defined in the mark scheme for the question (however; the use of the full mark range may
be limited according to the quality of the candidate responses seen).
Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should not be awarded with grade thresholds or
grade descriptors in mind.
3 Two from: 2
Sensors
Keypad/Number pad
Touch screen
Microphone
Camera
5(a) Normal 2
Any seat from A1 to Z20//Any letter from A to Z inclusive followed by any number 1 to 20 inclusive
Abnormal
Any incorrect seat row or number/Any character other than A to Z and/or any number outside range 120 or anything that’s
incorrect
Disadvantages
Manual systems can result in double booking
Manual booking systems update the data less often than online systems
Difficult to see if a seat is taken as the seats are not updated when booked
Bookings can only be made when the booking office is open
Can only book at a booking office
People have to travel to the booking office to book, therefore wastes time
People have to travel to the booking office to book wastes cost
More difficult to change bookings
Physical tickets are issued which can be lost more easily
To gain full marks the discussion must have correct answers for both advantages and disadvantages
Disadvantages
Makes people lazy/lack of exercise
Over-reliance on computers
More security issues
Needs a reliable internet connection
Goods can take time to arrive
Goods could be damaged in transit
More chance of errors in the ordering
More difficult to amend an order after purchase
No way of checking the goods before buying
There may be delivery/packaging costs
To gain full marks the discussion must have correct answers for both advantages and disadvantages
8 Six from: 6
Similarities
Both have improved security by using encryption
Data cannot be read by eye so more secure
Data can be re-written
Direct data entry
Both allow fast access to the room
Both are read by a reader/scanner
Both can be easily damaged
Differences
RFID is contactless therefore has less wear and tear whereas magnetic is placed in reader
RFID reads the data faster
More data on RFID card
RFID cannot be left in the lock accidentally
RFID cards can be read by others from a distance using a device
Easier to clone a magnetic stripe card
Magnetic cards can only be read in one direction whereas RFID are only tapped
Magnetic stripe can be affected by magnets/mobile phones
RFID cards are more robust
To gain full marks the comparison must have correct answers for both similarities and differences
Against policed
Governments block text/viewpoints/their own bias viewpoint
Unsuitable material is easily available in other ways
Control would cost money and users would have to pay
Control would be very difficult to enforce
Could cause less people to use it
Laws are different in each country but the internet is world wide
Creates a feeling of big brother/always being watched
To gain full marks the discussion must have correct answers for both for and against policed
13 Four from: 4
Letters can be personalised for each student
The data is from the file therefore fewer errors
Saves time than typing in all the details each time
Letter can be saved and used again
Standard letter can be used each time/More consistency
Data in the database need only be checked
Easier to make changes to the letters
14 Six from: 6
User telephones the bank telephone centre
System asks for the long number on the credit/debit card/sort code and account number/customer Access/ID number
The user taps out the number on the phone keypad and presses #/speaks the number
System asks for certain characters in a password/phone banking security number
The user taps out the characters asked for/security number and presses #
System checks the number is correct
System rejects the password/security number
The user re-enters the characters/security number
After three attempts the telephone connection drops
System asks other security answers
The user taps it in/speaks the answer
System asks which service you require/options given
Users tap in the number to select transfer from one account to another
System asks number of account transfer from
User taps in account number
System connects with the bank account
System asks for number of account transfer money to
User taps in account number
System asks amount to transfer
User taps in the amount
Checks the amount in the account/maximum not exceeded
Approves request
If amount exceeded the call is terminated/transaction declined/insufficient funds
System asks when the transfer should happen
The user taps in the date
System asks you to confirm it/sends a text message/send email
Customer hangs up to end the transaction
INSTRUCTIONS
• Answer all questions.
• Use a black or dark blue pen.
• Write your name, centre number and candidate number in the boxes at the top of the page.
• Write your answer to each question in the space provided.
• Do not use an erasable pen or correction fluid.
• Do not write on any bar codes.
• You may use an HB pencil for any diagrams, graphs or rough working.
INFORMATION
• The total mark for this paper is 80.
• The number of marks for each question or part question is shown in brackets [ ].
• No marks will be awarded for using brand names of software packages or hardware.
03_0417_12_2023_1.10
© UCLES 2023 [Turn over
2
...........................................................................................................................................
........................................................................................................................................... [1]
1 ........................................................................................................................................
2 ........................................................................................................................................
[2]
A Buzzer
B Laser printer
C Touch screen
D Webcam
[1]
3 State three items that should be included in the technical documentation of a computer system.
1 ...............................................................................................................................................
2 ...............................................................................................................................................
3 ...............................................................................................................................................
[3]
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
3 ........................................................................................................................................
...........................................................................................................................................
[3]
Give four precautions that young people should take when using social media.
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
3 ........................................................................................................................................
...........................................................................................................................................
4 ........................................................................................................................................
...........................................................................................................................................
[4]
5 The number of people using online shopping has increased. This has led to an increase in the
number of journeys for the delivery drivers.
Describe how an expert system can be used to produce the best route for the delivery of items.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
.................................................................................................................................................. [6]
State two devices found in the home which could be connected via Bluetooth.
1 ...............................................................................................................................................
2 ...............................................................................................................................................
[2]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [2]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [2]
8 Many devices in the home can connect to the internet. These are called smart devices.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
.................................................................................................................................................. [4]
9 A web page can contain three web development layers. One of these is the content layer.
...........................................................................................................................................
........................................................................................................................................... [1]
(b) Identify the other two web development layers and give a use for each.
1 ........................................................................................................................................
Use ...................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
Use ...................................................................................................................................
...........................................................................................................................................
[4]
1 ...............................................................................................................................................
..................................................................................................................................................
2 ...............................................................................................................................................
..................................................................................................................................................
3 ...............................................................................................................................................
..................................................................................................................................................
[3]
(a) Describe the possible effects on his computer system if he opens the file.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [2]
(b) Explain how the student could prevent the computer from being infected by viruses.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [3]
(c) Some files containing viruses have to be quarantined as they cannot be deleted.
(i) State the type of files that may have to be quarantined rather than deleted.
................................................................................................................................ [1]
(ii) Explain how the software detects and quarantines the file.
................................................................................................................................
................................................................................................................................
................................................................................................................................
................................................................................................................................
................................................................................................................................
................................................................................................................................ [3]
12 A tennis coach is creating a presentation to explain to teenagers the basics of playing tennis.
(a) Describe the design features that must be included to make the presentation appeal to the
teenagers.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [4]
(b) The designer needs to be aware of copyright legislation when creating the presentation.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [2]
Give two advantages of watching the movie by streaming rather than from a Blu-ray disc.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
.................................................................................................................................................. [2]
14 Compare RAM and ROM. Your answer must include similarities and differences.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
.................................................................................................................................................. [4]
15 Tawara Stores is a small company that does not make much profit. The managing director is
deciding whether to implement a new IT system using direct changeover or parallel running.
Describe the advantages and disadvantages of using direct changeover compared with parallel
running in this scenario.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
.................................................................................................................................................. [6]
16 A school car park is controlled by a barrier. When teachers enter the car park their number plate
is read and the barrier is raised automatically.
camera
microphone
keypad
speaker
pressure
sensor
motor
Fig. 16.1
(a) Visitors can use the keypad as an input device to enter a code which allows the barrier to be
raised.
1 ........................................................................................................................................
2 ........................................................................................................................................
3 ........................................................................................................................................
[3]
(b) Automated Number Plate Recognition (ANPR) is used to read and check the number plate of
the vehicle.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [6]
Method 1 ...........................................................................................................................
Description ........................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
Method 2 ...........................................................................................................................
Description ........................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[4]
................................................................................................................................
................................................................................................................................ [1]
................................................................................................................................
................................................................................................................................ [1]
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.
Cambridge Assessment International Education is part of Cambridge Assessment. Cambridge Assessment is the brand name of the University of Cambridge
Local Examinations Syndicate (UCLES), which is a department of the University of Cambridge.
Published
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.
Cambridge International will not enter into discussions about these mark schemes.
Cambridge International is publishing the mark schemes for the February/March 2023 series for most
Cambridge IGCSE™, Cambridge International A and AS Level components and some Cambridge O Level
components.
These general marking principles must be applied by all examiners when marking candidate answers.
They should be applied alongside the specific content of the mark scheme or generic level descriptors
for a question. Each question paper and mark scheme will also comply with these marking principles.
• the specific content of the mark scheme or the generic level descriptors for the question
• the specific skills defined in the mark scheme or in the generic level descriptors for the question
• the standard of response required by a candidate as exemplified by the standardisation scripts.
Marks awarded are always whole marks (not half marks, or other fractions).
• marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit
is given for valid answers which go beyond the scope of the syllabus and mark scheme,
referring to your Team Leader as appropriate
• marks are awarded when candidates clearly demonstrate what they know and can do
• marks are not deducted for errors
• marks are not deducted for omissions
• answers should only be judged on the quality of spelling, punctuation and grammar when these
features are specifically assessed by the question as indicated by the mark scheme. The
meaning, however, should be unambiguous.
Rules must be applied consistently, e.g. in situations where candidates have not followed
instructions or in the application of generic level descriptors.
Marks should be awarded using the full range of marks defined in the mark scheme for the question
(however; the use of the full mark range may be limited according to the quality of the candidate
responses seen).
Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should
not be awarded with grade thresholds or grade descriptors in mind.
1(b) Applications 2
System
2 B Laser printer 1
3 Three from: 3
Purpose of the system/program/software
Limitations of the system
Program listing/coding
Program language used
Program flowcharts/algorithms
System flowchart
Hardware requirements
Software requirements
File structures
List of variables
Input format
Output format
Sample runs/test runs
Validation routines/rules
5 Six from: 6
Interactive user interface asks questions about the route
The user answers the questions with Yes/No answers
The towns and areas visited/start/end point are typed/entered into the
interactive user interface
Answers lead to other questions
The inference engine searches…
…the knowledge base…
…uses the rules base
The knowledge base is searched for suitable routes between two points
Suggested/probable routes and schedules are displayed
One from:
To display elements within the web page
Holds the css/stylesheet
Defines the format of a web page through styling elements
Maintains the consistency of the elements in the web page
One from:
Behaviour
Scripting
One from:
For scripting language to control elements within the web page
Holds the forms/image galleries
Adds Interactive content of the web page
Adds functionality
10 Three from: 3
Quick to select options
Small footprint
Improved hand/eye coordination
Allows the user to use zoom and pinch making item selection quick
13 Two from: 2
Cheaper than buying the Blu-ray player
Streaming works on different internet connected devices
Streaming uses a simpler interface
14 Four from: 4
Similarities
Both are internal memory
Both are primary storage
The data on both can be read
Both are directly accessed by the CPU
Differences
RAM is volatile//ROM is non-volatile
RAM data can be read from and written to//ROM is read only
RAM is temporary memory//ROM is permanent memory
ROM stores the start up instructions whereas RAM is used to store the
current program/instruction
To gain full marks the comparison must have correct answers for both
similarities and differences
15 Six from: 6
Advantages
Benefits are immediate whereas with parallel running it takes time for the
new system to be fully running
With direct they only have to pay for one set of staff therefore saves costs
Costs are saved as only one computer system is needed
With direct the maintenance is cheaper as there is only one set of
computers
Data is only entered once so saves duplication of data
The new system is checked thoroughly before implementation
Disadvantages
Staff have to be trained and be fully ready to use the new system before it is
implemented
Staff cannot be trained on the new system whereas in parallel both systems
are running
If there is a problem, then all the data can be lost; this could be disastrous for
the company whereas in parallel there is the original system
With direct staff cannot be trained gradually
To gain full marks the description must have correct answers for both
advantages and disadvantages
16(a) Microphone 3
Camera
Pressure sensor
Drawbacks
All vehicles need to be added to the database
If the number plate is obscured/dirty it is difficult to read
Some number plates cannot be read due to odd font/sideways
Data needs to be kept up to date
Expensive to setup/maintain the system
To gain full marks the discussion must have correct answers for both
benefits and drawbacks
Allow one mark for the method and one mark for the corresponding
description
17(b)(i) Checks that the data has been entered/present into the field 1