Cambridge International General Certificate of Secondary Education
Cambridge International General Certificate of Secondary Education
Cambridge International General Certificate of Secondary Education
Write your Centre number, candidate number and name in the spaces at the top of this page and any additional
pages you use.
Write in dark blue or black pen.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.
No marks will be awarded for using brand names of software packages or hardware.
Answer all questions.
Any businesses described in this paper are entirely fictitious.
At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.
This syllabus is approved for use in England, Wales and Northern Ireland as a Cambridge International Level 1/Level 2 Certificate.
06_0417_12_2018_1.18
© UCLES 2018 [Turn over
2
Write down the most appropriate item of internal hardware to match the descriptions.
(b) A printed circuit board that contains the main components of the computer.
motherboard
........................................................................................................................................... [1]
(d) A type of memory where data is lost when the computer is switched off.
RAM
........................................................................................................................................... [1]
2 Tick whether the following statements are examples of a 3D printer, a dot matrix printer or a laser
printer.
3D dot matrix laser
(✓) (✓) (✓)
[4]
[4]
Complete the following sentences using the most appropriate word(s) from the list.
(a) An electronic device that plugs into a computer and contains the key for a piece of software
is called
a dongle
........................................................................................................................................... [1]
encryption
........................................................................................................................................... [1]
(c) A security process that uses photons to enable secure communication is called
quantum cryptography
........................................................................................................................................... [1]
(d) A numeric code that is entered to enable payment to be made for a meal in a restaurant with
a debit card is called
a PIN
........................................................................................................................................... [1]
[2]
6 You are a student creating a website for your IGCSE ICT revision work. You have produced some
HTML, but have not yet added the logo or merged the cells. You are aiming to produce the following
page.
Fig. 1
...
<table>
<tr>
<td><h1>IGCSE ICT</h1></td>
</tr>
<tr>
<td><h3>Theory</h3></td>
<td><h3>Practical 1</h3></td>
<td><h3>Practical 2</h3></td>
</tr>
<tr>
</tr>
</table>
Fig. 2
(a) Write the HTML that would display the image called “Logo.jpg” as shown in Fig. 1. If the browser
cannot find the image, then the text “Tawara School Logo” will be displayed.
........................................................................................................................................... [5]
(b) The third line of HTML currently shown in Fig. 2 does not produce the title as shown in Fig. 1.
Write the HTML that would produce the title as shown in Fig. 1.
........................................................................................................................................... [2]
7 A farmer has purchased a computerised feeding system for her goats. A goat has an RFID tag
attached to its ear, which is recognised by the computer. The system uses a passive RFID tag.
The tag will recieve the radio wave from the RFID reader and, the tag will send
...........................................................................................................................................
radio wave back to the reader then, teh radio wave will move from the tag's
antenna to the microchip and then, a signal will generated and sent back to the RF system
...........................................................................................................................................
The RF wave will be detected by the reader which interprets the data.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [3]
(b) The system recognises the goat and therefore gives the correct feed to the animal.
Describe how RFID technology will be used to give the correct feed to the animal.
First, the goat will pass through the RFID reader then, the RFID reader extracts data
...........................................................................................................................................
from her tagand the ID compared with the data stored in the database Then, the
food for the goat will be selected from the database.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [3]
8 An auction company sells toys. It uses a spreadsheet to show each person’s items and the amount
of money the buyer and seller owe to the company.
A B C D E F G H I J
D6*0.2
=......................................................................................................................................... [2]
(b) The person selling the item pays a Seller’s commission on any item sold. This is calculated
using the Selling price and finding a match or the next value below in the table, in cells I6 to
J11.
Write a formula to display in cell F6, the Seller’s commission on the Double Decker bus toy.
This formula will be replicated down to cell F13.
........................................................................................................................................... [5]
(c) Describe how you could replicate the formula in cell F6 for each item.
Click on the cell F6 then, click copy then, select F7 to F13 and Paste
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [2]
(d) Before the auction begins, a hard copy brochure is produced showing information about the
items, data from the spreadsheet and images of some of the items.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [5]
9 Automatic car parking systems built into cars are becoming more common. They allow the car to
park safely in a parking bay unaided. The car uses proximity sensors fitted to the front and rear of
the car to help it park. There are many advantages to using these sensors.
The sensor uses the power from the car so it means that less power for the car
1 ........................................................................................................................................
...........................................................................................................................................
If it glitches, the car may crash the back side and would have have to spend
2 ........................................................................................................................................
alot of money fixing it back
...........................................................................................................................................
...........................................................................................................................................
[3]
(b) Modern-day drivers rely less on paper maps and more on satellite navigation systems (satnav).
Describe the inputs, outputs and processing of a satnav when used by a driver to reach a
destination.
First the driver will input the destinantion where he or she want to go then, the computer will calculate
...........................................................................................................................................
how much time it will take, how to get there fastest, the traffic using the data from the satallites,
then, all of that will be shown on the display.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [4]
10 The European Space Agency (ESA) is building a new space telescope to orbit the Earth and search
for distant galaxies. The ESA is using computer controlled robots to build the lens of the telescope.
(a) Discuss the advantages and disadvantages of using computer controlled robots rather than
humans to build the lens.
The first advantage is that it is cheaper in the long-term because robot doesn't need to be paid
...........................................................................................................................................
Second, They can workd 24/7 unlike humans
Third, they would waste less time becasue they wil be programmed to do the work
...........................................................................................................................................
unlike, for humans, they will have to think what they will do next and actually doing it correctly
Third, If there is Issue, it can be found quickly.
Finally, They can also work in enviroment where the humans need extra protection.
...........................................................................................................................................
...........................................................................................................................................
The first disadvantage is that it will be expensive if ESA is going to use it once and carry out
building other things with humans.
...........................................................................................................................................
Second, It is defficult to re-program or program when something goes wrong.
Thrid, if ESA continue replacing real human jobs with robots like this for example, the people
there will be useless and the skills that they learn will be a waste.
...........................................................................................................................................
Finally, the maintenance is very expensive.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [6]
(b) A new computer system will operate the space telescope; the new computer system is made
up of a number of modules.
Describe how the new computer system is to be tested before it is fully operational.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [4]
(c) When the new system has been developed, both user and technical documentation have to
be written.
Name three components that are found in both technical and user documentation.
The program
1 ........................................................................................................................................
Input formats
2 ........................................................................................................................................
testing
3 ........................................................................................................................................
[3]
11 When people use the internet they run the risk of their computers being infected by viruses.
(a) Describe the effects the virus could have on their computer’s hard disk.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [3]
(b) Explain another way the computer could have become infected with a virus.
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [2]
(c) An antivirus program is set to fully scan a computer for viruses once a day.
First, when it detects a potential virus it will compare the virus ciding with its database
...........................................................................................................................................
then, aleart the user about the potential virus.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [3]
12 A company used to have video-conferences with its suppliers, but due to technical problems they
are considering running an audio-conference.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
.................................................................................................................................................. [4]
13 Tick four health issues associated with the continual use of computers.
Tick
(✓)
Virus
Backache
Electrocution
Fire
RSI
Tripping
Eye strain
Overheating
Headache
Heart attack
[4]
14 Some smartphones connected to the internet can allow the user to point their phone’s camera at
an object or image to display information about it on the phone’s screen. The object acts like an
item in a search engine. This is called augmented reality.
One example of its use is in mobile games, where the user tries to catch characters from the game
as the characters appear to walk in the streets.
Explain, using examples, other ways in which augmented reality could be used in everyday life.
To gather information about a building or a painting to determain how much it cost or information about it
..................................................................................................................................................
To find direction, to give information where you want to go, how to go, and how much time
it will take.
To visualise what sometihing will look in real life, If you want to buy a couch or a table
..................................................................................................................................................
and not sure it will fit perfectly with the room theme you can also use the augmented reality
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
.................................................................................................................................................. [4]
15 As banks reduce the number of branches due to the increased use of online banking system,
improved security of customer data is needed. Many banks are introducing biometric systems to
secure customer data.
(a) Explain, using examples, why biometric systems are more effective than other methods of
security.
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [3]
(b) Adam is paying his bill in a restaurant using a contactless debit card.
Describe the computer processing involved in Electronic Funds Transfer (EFT) using contactless
cards.
The reader will check the amount to pay is less than the contactless limit then,
...........................................................................................................................................
the data is read from the chip using the RFID then, the restaurant's bank's computer
will cotact teh customer's bank's computer and check it if it's valid or not.
After that, If it's valid, the price of the meal is deducted from teh customer's account
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [4]
16 The owner of a gardening company is planning to create a database to store the details of all his
customers. He has the choice of using a flat file database or a relational database.
Discuss the advantages and disadvantages of using a relational database rather than a flat file
database.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
.................................................................................................................................................. [8]
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable
effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will
be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.
Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.