Cambridge IGCSE ™: Computer Science
Cambridge IGCSE ™: Computer Science
Cambridge IGCSE ™: Computer Science
Published
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.
Cambridge International will not enter into discussions about these mark schemes.
Cambridge International is publishing the mark schemes for the February/March 2023 series for most
Cambridge IGCSE™, Cambridge International A and AS Level components and some Cambridge O Level
components.
These general marking principles must be applied by all examiners when marking candidate answers.
They should be applied alongside the specific content of the mark scheme or generic level descriptors
for a question. Each question paper and mark scheme will also comply with these marking principles.
• the specific content of the mark scheme or the generic level descriptors for the question
• the specific skills defined in the mark scheme or in the generic level descriptors for the question
• the standard of response required by a candidate as exemplified by the standardisation scripts.
Marks awarded are always whole marks (not half marks, or other fractions).
• marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit
is given for valid answers which go beyond the scope of the syllabus and mark scheme,
referring to your Team Leader as appropriate
• marks are awarded when candidates clearly demonstrate what they know and can do
• marks are not deducted for errors
• marks are not deducted for omissions
• answers should only be judged on the quality of spelling, punctuation and grammar when these
features are specifically assessed by the question as indicated by the mark scheme. The
meaning, however, should be unambiguous.
Rules must be applied consistently, e.g. in situations where candidates have not followed
instructions or in the application of generic level descriptors.
Marks should be awarded using the full range of marks defined in the mark scheme for the question
(however; the use of the full mark range may be limited according to the quality of the candidate
responses seen).
Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should
not be awarded with grade thresholds or grade descriptors in mind.
Note: No marks are awarded for using brand names of software packages or hardware.
1(a) D 1
1(b) One mark for identification. E.g. One mark per bullet for description to max 6
two each.
Virus
• Software/code that replicates
• …when the user runs it // with an active host
• Deletes/damages/corrupts data/files // takes up storage/memory space
Worm
• Software/code that replicates itself on a network
• …without user input // without active host
• Takes-up bandwidth
• Deletes/damages/corrupts data/files // takes up storage/memory space
• Opens back doors to computers over the network
• Used to deposit other malware on networked computers
Trojan horse
• Software/code that is hidden within other software // Software that is
disguised as authentic software
• …when downloaded/installed the other malware/by example it
contains is installed
Adware
• Software/code that generates/displays (unwanted) adverts on a user's
computer
• Some may contain spyware/other malware
• Some when clicked may link to viruses
• Reduces device performance // reduces internet speed
• Redirects internet searches/user to fake websites
Ransomware
• Software/code that stops a user accessing/using their computer/data
• …by encrypting the data/files/computer
• A fee has to be paid to decrypt the data // A fee has to be paid to
'release' the computer/device/data
1(c) One mark for each similarity to max two. One mark for difference (both 3
sides needed unless clearly and accurately implied).
Similarities e.g.
• Check incoming and outgoing signals // filter traffic
• Store whitelist/blacklist
• Block incoming/outgoing signals
• Both block unauthorised access
• Keep a log of traffic
• Both can be hardware or software (or both)
Differences e.g.
• Proxy can hide user's IP address, firewall does not hide the user's IP
address
• Proxy intention is to divert attack from server, firewall is to stop
unauthorised access
• Proxy protects a server, firewall protects individual computer
• Proxy examines/processes requests for a website but a firewall does
not (checks type of signal) // Proxy processes client-side requests
whereas firewall filters packets
• Proxy transmits website data to the user, but a firewall does not (it
allows valid signals)
• Proxy allows faster access to a web page using cache, but a firewall
does not (allow faster access or have cache)
• Proxy can hide internal network from internet, but a firewall cannot
High-level
• Easier for programmer to read/write/understand/edit
• … therefore, the programmer is less likely to make mistakes // can write
in shorter timeframe
• Easier to debug // Easier to find/correct errors
• …so, the programmer can find and correct errors in less time
• Game will be machine independent // Game will be portable (between
hardware)
• …the game can be used on any computer without a need for
understanding of the hardware / compilation for that hardware
• Programmer can focus on the problem instead of the manipulation of
memory/hardware
Low-level
• More memory/RAM efficient
• … 3D graphics will have high memory consumption anyway
• Allows direct manipulation of memory
• … allows for more efficient control/response time
• Allows for use of specialised hardware
Compiler
• Checks all code before executing any code
• Produces error report with all errors found for the whole code (before
translating/running any of the code)
• Produces executable file
Interpreter
• Checks/translates one line of code and then executes it before moving
on to the next line
• Stops when an error is found
• … when corrected the program can be run from the same position //
allows error correction in real time
Pixel:
• One square/circle of one colour // the smallest component of the
image
Resolution:
• The number of pixels per set area/cm/inch // the number of pixels wide
by the number of pixels high // number of pixels in an image
Solid-state storage is non-volatile. This means that the data is not lost
when the power is turned off.
Solid-state storage is made of transistors that are laid out in a grid.
Gates are used to control the flow of the electrons through the transistors.
This changes the data in the transistors from 1 to 0, or from 0 to 1.
Serial
• Data arrives in order sent // does not need reordering
• Less likely to experience interference
• … less likely to have errors
• Can transmit over a longer distance (i.e. another room)
• Still fast transmission…
• …sufficient for this purpose
Parallel
• Faster transmission speed than serial
• … faster response to requests
• Very long connection not needed
• …next room is (likely) within distance for parallel
• … unlikely to error/arrive out of sequence/skew
0 1 1 0 0 0 1 1
0 0 0 0 0 0 0 0