2014-2019 PP
2014-2019 PP
2014-2019 PP
Write your Centre number, candidate number and name on all the work you hand in.
Write in dark blue or black pen.
Do not use staples, paper clips, glue or correction fluid.
You may use an HB pencil for any diagrams, graphs or rough working.
DO NOT WRITE IN ANY BARCODES.
The number of marks is given in brackets [ ] at the end of each question or part question.
IB14 06_9713_13/4RP
© UCLES 2014 [Turn over
2
Scenario 1
Questions 1 and 2
The WIMBA car company is planning to introduce a new family car and wishes to advertise it. It has
decided to create its own website rather than advertising using pop-ups on someone else’s website.
The company expects the website developers to work from home. This will enable the company to
save the cost of providing offices and paying running costs such as heating and electricity bills.
1 (a) There are three types of advertising: business, product and service advertising.
Name and describe the type of advertising that is used to promote the sales of a family car.
Name
Description
[3]
(b) Text is created using word processing software and imported into the website. This text could
be in the form of a description of the company.
Describe information (naming the type of software), which would be prepared using four
other different software packages before inclusion in the website.
[4]
[3]
(d) Describe three reasons why the company would use pop-unders rather than pop-ups.
[3]
(e) Apart from the drawbacks of using pop-ups, give four disadvantages to the company of
advertising on someone else’s website compared to creating their own website.
[4]
2 (a) Describe four benefits of working at home rather than working in an office from the point of
view of the employees.
[4]
(b) Apart from the running costs of the offices, describe three other ways that the company will
save money by having the employees working at home rather than working in the office.
[3]
Scenario 2
Questions 3, 4 and 5
The hospital employs a number of office staff to deal with the storage of patient records. The staff all
have a duty of confidence.
The computers are not used to store details of medicines. When the nurses realise there is a shortage
of medicines they have to fax their official orders for new stock to the hospital pharmacy.
3 (a) Describe how computers are used to monitor the medical condition of patients in intensive
care.
[5]
(b) Describe four benefits of using computers for monitoring the patients.
[4]
4 Using this scenario, explain what is meant by a ‘duty of confidence’ with regard to patient
information.
[5]
5 Describe the features of a fax machine which allow the orders of new stock to be placed by the
nurse.
[3]
Scenario 3
Questions 6 and 7
Mikado’s is a chain of fast food restaurants. Each member of the sales staff is paid weekly depending
on how much time they have worked.
The payroll is a computerised system which also produces financial reports and exception reports.
Mikado’s is going to introduce a self-ordering system at all its restaurants so fewer sales staff will be
required. The working patterns of the remaining sales staff will be affected.
6 (a) Give three items of information, related to their pay, that will need to be stored on the master
file about each member of the sales staff.
[3]
(b) Give two items of information that will need to be stored about each member of the sales
staff on the transaction file in order that their wages can be calculated.
[2]
[3]
(d) Give two advantages of batch processing compared with online processing.
[2]
(e) Using examples of data from the master and transaction files, describe the computer
processing used in the production of payments to the sales staff.
[5]
(f) Describe the features of financial reports and exception reports that might be produced by
the sales staff payroll system.
[3]
7 Name and describe three ways in which the staff working patterns, other than unemployment,
could change.
[6]
Scenario 4
Questions 8 and 9
Grafton mail order catalogue company currently operates by receiving orders from its customers by
phone. They are going to extend the way they receive orders by having an online system.
Grafton has employed Oscar, a systems analyst, to oversee the introduction of the new system. To
begin with he will analyse the existing system.
After designing and developing the system Oscar will need to test it.
[3]
[3]
9 (a) After organising the results of his research, Oscar will need to complete the analysis of the
existing system.
[3]
Describe three validation rules that could be used on the customer ID and for each one, give
an example of data that could be used to test whether it works or not.
Rule 1
Rule 2
Rule 3
[6]
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of
the examination. It shows the basis on which Examiners were instructed to award marks. It does not
indicate the details of the discussions that took place at an Examiners’ meeting before marking began,
which would have considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner
Report for Teachers.
Cambridge will not enter into discussions about these mark schemes.
Cambridge is publishing the mark schemes for the May/June 2014 series for most IGCSE, GCE
Advanced Level and Advanced Subsidiary Level components and some Ordinary Level components.
Page 2 Mark Scheme Syllabus Paper
GCE AS/A LEVEL – May/June 2014 9713 13
Two from:
Advertising a specific product
Advertising one item such as a specific model of a car
Not the whole range of cars the company sells/not the company itself
Target audience is identified…
… and an advertising campaign that will appeal to that type of audience is created
Media is decided upon [2]
4 Five from:
Office staff have a duty of confidence to patients and hospital
They must not tell anybody about the details of patients records without the patient’s/hospital’s
permission
Patient’s could take out a legal injunction if office staff attempt to give out their information without
their permission
Office staff will have been told to treat the information as confidential
Or it must be obvious to them that the information has been given/obtained in confidence
Best way to achieve confidentiality is for hospital to get office staff to sign a confidentiality
agreement. [5]
5 Three from:
Fax machine is connected to a phone line
Has a number pad which allows pharmacy’s fax machine number to be dialled
Has an inbuilt scanner to scan hard copy faxes/scan the order…
… which is transmitted through phone lines
Pharmacy’s fax machine has an inbuilt printer which allows the order to be printed [3]
Must have at least one feature of each to gain full marks [3]
Job sharing
Two (or more) workers doing the job of one worker (working full time)
Compressed hours
Working for same number of hours as a normal working week but over fewer days [6]
Length check which would check that length is exactly ten characters
Example any string fewer or more than ten characters
Range check which would check that id is >999999999 and less than 10000000000
Example any number >999999999 or less than 10000000000
Write your Centre number, candidate number and name on all the work you hand in.
Write in dark blue or black pen.
Do not use staples, paper clips, glue or correction fluid.
You may use an HB pencil for any diagrams, graphs or rough working.
DO NOT WRITE IN ANY BARCODES.
The number of marks is given in brackets [ ] at the end of each question or part question.
IB14 06_9713_31/2RP
© UCLES 2014 [Turn over
2
Scenario 1
Questions 1 to 4
Pan European Airlines (PEA) requires its passengers to book and manage their flight bookings via the
Internet using its online booking system.
PEA has a website offering services to their customers. One of the services is the issuing of electronic
tickets (e-tickets) when passengers book a flight.
E-tickets are produced by the booking system prior to the flights and are used at check-in to issue
boarding passes.
The airline has a call centre open 24 hours, every day, to deal with customer queries.
PEA uses computer systems for training pilots. It has training facilities for its pilots using computer
simulations which require specialised hardware.
PEA uses computer systems for financial purposes. Gordon is the manager of the financial
department and uses computer modelling to manage its finances.
1 (a) Describe three services other than the issuing of e-tickets that the PEA website could offer
its passengers.
[3]
(b) Describe four steps that a customer would follow when booking flights using PEA’s website.
[4]
[1]
[4]
2 (a) Describe two benefits to the airline of using a call centre to answer passenger enquiries.
[2]
(b) Discuss the advantages and disadvantages to a passenger of using a call centre for
assistance rather than going to a travel agent.
[6]
(c) The airline call centre uses Computer Telephony Integration (CTI) software.
Describe two features of CTI software that would be useful to the airline.
[2]
3 (a) Describe the use of three specialised items of computer hardware that are required when
using computer simulations to train pilots.
[6]
(b) Describe three advantages to the pilots of using computer simulations rather than real
aircraft to learn to fly.
[3]
4 Explain how Gordon could use a computer model to manage the company finances.
[6]
Scenario 2
Questions 5 to 7
International Credit Enterprise is a bank with branches around the country. It holds customers’
personal accounts and their savings accounts.
Customers can access their accounts either at a branch or by online banking via the bank’s website.
The website can be used by disabled customers with suitably configured computers.
The bank also offers financial advice for customers and uses an expert system to help customers with
their financial planning.
5 (a) Describe five difficulties that disabled people might encounter when trying to use online
banking facilities.
[5]
(b) Describe three software configurations of a personal computer that could be used to assist
disabled people when accessing their bank accounts online.
[3]
6 Explain how the bank’s computer system would check that the person accessing the account
details has the authority to do so.
[6]
7 (a) Describe in detail the use of five components of an expert system for financial planning.
[5]
[2]
[2]
Scenario 3
Questions 8 to 10
A school has a computer network that can be accessed by students from any computer in the school
and remotely through the school website.
The students use the computers to improve their learning. The teachers use ICT to assist in the
assessment of the students’ work and to keep records of the students’ progress.
The school uses a VPN to enable teachers to access the school network from home.
8 Describe five ways in which the school’s computers could be used to improve the students’
learning.
[5]
9 Describe how a teacher could use ICT to record the progress of students and report their
progress to parents.
[6]
10 (a) Describe three network devices which could be used in the school's network. Include details
of how each would handle data packets.
Device 1
Device 2
Device 3
[6]
[3]
BLANK PAGE
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of
the examination. It shows the basis on which Examiners were instructed to award marks. It does not
indicate the details of the discussions that took place at an Examiners’ meeting before marking began,
which would have considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner
Report for Teachers.
Cambridge will not enter into discussions about these mark schemes.
Cambridge is publishing the mark schemes for the May/June 2014 series for most IGCSE, GCE
Advanced Level and Advanced Subsidiary Level components and some Ordinary Level components.
Page 2 Mark Scheme Syllabus Paper
GCE A LEVEL – May/June 2014 9713 31
Digital ticket sent by email/download exists as digital record (of booking/reservation) in airline
computer system
Contains reservation number and e-ticket number [1]
Fewer (many) premises so reduced costs can provide assistance/availability for longer hours
Can manage staff/resources more efficiently so reduce costs
Reduces vulnerability to single points of failure within communication systems
Reduces costs of forwarding calls to multi-site locations
Reduces costs of line rentals as calls are queued within company system [2]
Disadvantages from:
4 Descriptions from:
Input costs/values....
example: wage/salary/ICT/insurance costs
Calculate the total the company costs
Input price of tickets/projected/ticket sales
Input required/desired profit margins
Use goal seek to determine breakeven/ profit level
Use “what if” scenarios by altering data/values/costs
Run the model to compare it with actual situation [6]
Sticky keys feature so that e.g. shift key is not needed for upper case
Filter keys to prevent (unintended) multiple key presses
Use of zoom feature/large font size for easier reading
Non-display of images on web site/use of alt text
Use of voice recognition for commands/input of data
Use of text to voice
Eye control software to move cursor [3]
6 Explanations from:
[Total: 80]
Write your Centre number, candidate number and name on all the work you hand in.
Write in dark blue or black pen.
Do not use staples, paper clips, glue or correction fluid.
You may use an HB pencil for any diagrams, graphs or rough working.
DO NOT WRITE IN ANY BARCODES.
The number of marks is given in brackets [ ] at the end of each question or part question.
IB14 06_9713_11/5RP
© UCLES 2014 [Turn over
2
Scenario 1
Question 1, 2, 3 and 4
Dubai Airways (DA) is a company which carries passengers from all parts of the world to Dubai.
It issues e-tickets which have a bar code and the flight details.
After flights, DA invites each passenger to complete a form giving their opinions about the flight. As
part of the system update DA have asked the systems analyst, Li, to design a new form. The
company is undecided whether the data on the form should be captured using Optical Character
Recognition (OCR) or Optical Mark Recognition (OMR).
1 Validation is used to check that data input into DA’s system is reasonable. For each statement
below, tick the most appropriate answer.
(a) The most appropriate use of a check digit would be to ensure the validity of:
Number of passengers
Name of destination
[1]
(b) The most appropriate use of a format check would be to ensure the validity of:
Number of passengers
Name of destination
[1]
(c) The most appropriate use of a range check would be to ensure the validity of:
Number of passengers
Name of destination
[1]
2 Tick the four statements which are true when referring to the testing of DA’s new system.
True
Live data is test data that has never been used before
Live data is test data for which the results are already known
Extreme data is data of the wrong data type for the field concerned
Abnormal data is data of the correct type for the field concerned
[4]
3 (a) After the system has been tested Li will need to produce an evaluation. Describe three
stages involved in the evaluation of such a system.
Stage 1
Stage 2
Stage 3
[3]
(b) Name two types of technical documentation and for each one describe two examples of its
contents.
Type of documentation 1:
Content 1:
Content 2:
Type of documentation 2:
Content 1:
Content 2:
[6]
4 (a) Identify three different features of a well-designed paper based form that will make it easier
for a passenger to fill in. For each feature, state whether OMR or OCR would be the most
appropriate method of input to a computer.
[3]
(b) Discuss the advantages and disadvantages of OMR compared with OCR.
[5]
Scenario 2
Questions 5, 6 and 7
Midtown Bank in the UK operates an online banking service. A number of customers are concerned
about the privacy and security of their data.
This system means that bank employees have access to the personal details of customers of the
bank. There are social and ethical implications which can arise because of this.
As the number of customers using their online banking service has increased, there are fewer
customers visiting local branches. This has led to some of the branches closing.
5 (a) Describe the following security issues associated with online banking.
Phishing
[2]
Pharming
[2]
Spyware
[2]
(b) Apart from security issues, describe three drawbacks to customers of using online banking.
[3]
[3]
6 (a) Anonymised and aggregated information are two ways customer information can be
summarised to safeguard its confidentiality.
Anonymised information
Aggregated information
[2]
(b) Describe two ways that aggregated information would be useful to the bank.
[2]
(c) Apart from the need to use anonymised and aggregated information explain the
responsibilities of the bank when safeguarding the privacy of customers’ data.
[5]
7 As bank branches have closed, changes in working patterns have occurred as well as changes in
employment status. Describe three of the changes to working patterns.
[3]
Scenario 3
Question 8
Mrs Sharif is the head teacher of a large school with over 2000 students.
Teachers keep records of test scores on the school’s computer system. The total possible mark for
each test varies from test to test and subject to subject.
Mrs Sharif wants the teachers to use the test scores of each student so that they can be included in a
report to the student’s parents. She will need to choose a suitable printer for printing the reports.
8 (a) Give four features of spreadsheet software which would be used by a teacher to analyse the
test results of the students and for each feature give a use for it.
Feature 1
Use 1
Feature 2
Use 2
Feature 3
Use 3
Feature 4
Use 4
[8]
(b) Give three advantages to a teacher of using spreadsheets rather than manually analysing
test results.
[3]
(c) Describe three features of word processing software that you could use to include the
analysed data in the typed reports.
[3]
(d) Mrs Sharif wants to use a laser printer to print the reports. Give two reasons why she has
chosen a laser printer rather than other types of printer.
[2]
Scenario 4
Questions 9, 10 and 11
RockICT has a computerised payroll system. Sequential files are used for the master and transaction
files.
Workers are paid on a weekly basis depending on how many hours they work. Batch processing is
used to run the payroll.
Because the system is computerised the payroll office workers are allowed to work from home.
9 (a) Give three reasons why the company would want their payroll workers to work at home
rather than in the office.
[3]
(b) Describe three reasons why the payroll workers would want to work at home rather than in
the office.
[3]
[1]
[3]
11 Describe six steps in the weekly updating of the payroll master file.
[6]
BLANK PAGE
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of
the examination. It shows the basis on which Examiners were instructed to award marks. It does not
indicate the details of the discussions that took place at an Examiners’ meeting before marking began,
which would have considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner
Report for Teachers.
Cambridge will not enter into discussions about these mark schemes.
Cambridge is publishing the mark schemes for the May/June 2014 series for most IGCSE, GCE
Advanced Level and Advanced Subsidiary Level components and some Ordinary Level components.
Page 2 Mark Scheme Syllabus Paper
GCE AS/A LEVEL – May/June 2014 9713 11
1 (a)
Number of passengers
Name of destination
[1]
(b)
Number of passengers
Name of destination
[1]
(c)
Number of passengers
Name of destination
[1]
2
Live data is test data that has never been used before
Live data is test data for which the results are already known
Extreme data is data of the wrong data type for the field concerned
Abnormal data is data of the correct type for the field concerned
Two from:
Two from:
Must have at least one each from OMR and OCR to gain full marks
One mark is available for a reasoned conclusion [5]
5 (a) Phishing
Two from:
E-mail appear to be from customer's bank
Ask for customer’s details – password, card/account number, other security details
E-mail makes up plausible reason
Can include a link/website address for customer to go to which looks just like the actual
bank’s website but is a fake website
Pharming
Two from:
Installs a piece of malicious software/code on customer’s computer
Fraudster redirects genuine website’s traffic to own website
Customer is now sending personal details to fraudster’s website
Spyware
Two from:
Downloaded/software used to gather user's key presses
Software detects key presses of user logging on to bank site [6]
Aggregated information:
Personal details of individuals are combined to provide information without naming
those individuals [1]
7 Three from:
Some workers may have to/will have the opportunity to go part time
There will be the opportunity to job share
There will be the opportunity for flexible working hours
There will be the opportunity to work compressed hours
Workers will need to have the ability to move from branch to branch [3]
Conditional formatting
Cells are coloured differently to indicate acceptable progress or otherwise
Graphs/charts
Comparison of student’s chart with target grades/class average/previous scores/gradient
of the graph shows whether there is improvement or not
Maximum function
Could see which was highest mark and when
Minimum function
Could see which was lowest mark and when
Sorting/filtering
To produce a rank order of students + reason – for the purpose of grading/setting/to list
best/worst performing students/students achieving a particular mark range/grade so that
these students can be set suitable targets
Goal seek
Could see what test results required to achieve satisfactory average [8]
Time is not wasted travelling/ more free time because of less travelling
Can spend more time with their family/can arrange their work schedule to suit themselves
Don’t have to live close to the company so can live in area of their choice
Don’t have to spend money on fuel/transport travelling to work
Don’t have the stress of travelling to work in rush hour
If the payroll worker is disabled it’s easier for him/her as he/she doesn’t have to travel [3]
10 (a) With no thought given to the order/data has not been sorted/stored in the order they are
added [1]
11 Six from:
The transaction file is sorted in the same order as the master file
Sorted on employee number
First record in the transaction file read
Reads first record in the old master file
These two records are compared
If records don’t match computer writes master file record to new master file
If it matches transaction is carried out
Then
If transaction relates to calculation of pay:
Computer calculates the pay
Using rate of pay from master file
Using hours worked from transaction file
Computer calculates the income tax/insurance/pension contributions
Computer subtracts this from total pay
Processed record is written to master file
Process is repeated until end of old master file
Write your Centre number, candidate number and name on all the work you hand in.
Write in dark blue or black pen.
Do not use staples, paper clips, glue or correction fluid.
You may use an HB pencil for any diagrams, graphs or rough working.
DO NOT WRITE IN ANY BARCODES.
The number of marks is given in brackets [ ] at the end of each question or part question.
IB14 06_9713_12/FP
© UCLES 2014 [Turn over
2
Scenario 1
Question 1, 2, 3 and 4
Dubai Airways (DA) is a company which carries passengers from all parts of the world to Dubai.
It issues e-tickets which have a bar code and the flight details.
After flights, DA invites each passenger to complete a form giving their opinions about the flight. As
part of the system update DA have asked the systems analyst, Li, to design a new form. The
company is undecided whether the data on the form should be captured using Optical Character
Recognition (OCR) or Optical Mark Recognition (OMR).
1 Validation is used to check that data input into DA’s system is reasonable. For each statement
below, tick the most appropriate answer.
(a) The most appropriate use of a check digit would be to ensure the validity of:
Number of passengers
Name of destination
[1]
(b) The most appropriate use of a format check would be to ensure the validity of:
Number of passengers
Name of destination
[1]
(c) The most appropriate use of a range check would be to ensure the validity of:
Number of passengers
Name of destination
[1]
2 Tick the four statements which are true when referring to the testing of DA’s new system.
True
Live data is test data that has never been used before
Live data is test data for which the results are already known
Extreme data is data of the wrong data type for the field concerned
Abnormal data is data of the correct type for the field concerned
[4]
3 (a) After the system has been tested Li will need to produce an evaluation. Describe three
stages involved in the evaluation of such a system.
Stage 1
Stage 2
Stage 3
[3]
(b) Name two types of technical documentation and for each one describe two examples of its
contents.
Type of documentation 1:
Content 1:
Content 2:
Type of documentation 2:
Content 1:
Content 2:
[6]
4 (a) Identify three different features of a well-designed paper based form that will make it easier
for a passenger to fill in. For each feature, state whether OMR or OCR would be the most
appropriate method of input to a computer.
[3]
(b) Discuss the advantages and disadvantages of OMR compared with OCR.
[5]
Scenario 2
Questions 5, 6 and 7
Midtown Bank in the UK operates an online banking service. A number of customers are concerned
about the privacy and security of their data.
This system means that bank employees have access to the personal details of customers of the
bank. There are social and ethical implications which can arise because of this.
As the number of customers using their online banking service has increased, there are fewer
customers visiting local branches. This has led to some of the branches closing.
5 (a) Describe the following security issues associated with online banking.
Phishing
[2]
Pharming
[2]
Spyware
[2]
(b) Apart from security issues, describe three drawbacks to customers of using online banking.
[3]
[3]
6 (a) Anonymised and aggregated information are two ways customer information can be
summarised to safeguard its confidentiality.
Anonymised information
Aggregated information
[2]
(b) Describe two ways that aggregated information would be useful to the bank.
[2]
(c) Apart from the need to use anonymised and aggregated information explain the
responsibilities of the bank when safeguarding the privacy of customers’ data.
[5]
7 As bank branches have closed, changes in working patterns have occurred as well as changes in
employment status. Describe three of the changes to working patterns.
[3]
Scenario 3
Question 8
Mrs Sharif is the head teacher of a large school with over 2000 students.
Teachers keep records of test scores on the school’s computer system. The total possible mark for
each test varies from test to test and subject to subject.
Mrs Sharif wants the teachers to use the test scores of each student so that they can be included in a
report to the student’s parents. She will need to choose a suitable printer for printing the reports.
8 (a) Give four features of spreadsheet software which would be used by a teacher to analyse the
test results of the students and for each feature give a use for it.
Feature 1
Use 1
Feature 2
Use 2
Feature 3
Use 3
Feature 4
Use 4
[8]
(b) Give three advantages to a teacher of using spreadsheets rather than manually analysing
test results.
[3]
(c) Describe three features of word processing software that you could use to include the
analysed data in the typed reports.
[3]
(d) Mrs Sharif wants to use a laser printer to print the reports. Give two reasons why she has
chosen a laser printer rather than other types of printer.
[2]
Scenario 4
Questions 9, 10 and 11
RockICT has a computerised payroll system. Sequential files are used for the master and transaction
files.
Workers are paid on a weekly basis depending on how many hours they work. Batch processing is
used to run the payroll.
Because the system is computerised the payroll office workers are allowed to work from home.
9 (a) Give three reasons why the company would want their payroll workers to work at home
rather than in the office.
[3]
(b) Describe three reasons why the payroll workers would want to work at home rather than in
the office.
[3]
[1]
[3]
11 Describe six steps in the weekly updating of the payroll master file.
[6]
BLANK PAGE
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of
the examination. It shows the basis on which Examiners were instructed to award marks. It does not
indicate the details of the discussions that took place at an Examiners’ meeting before marking began,
which would have considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner
Report for Teachers.
Cambridge will not enter into discussions about these mark schemes.
Cambridge is publishing the mark schemes for the May/June 2014 series for most IGCSE, GCE
Advanced Level and Advanced Subsidiary Level components and some Ordinary Level components.
Page 2 Mark Scheme Syllabus Paper
GCE AS/A LEVEL – May/June 2014 9713 12
1 (a)
Number of passengers
Name of destination
[1]
(b)
Number of passengers
Name of destination
[1]
(c)
Number of passengers
Name of destination
[1]
2
Live data is test data that has never been used before
Live data is test data for which the results are already known
Extreme data is data of the wrong data type for the field concerned
Abnormal data is data of the correct type for the field concerned
Two from:
Two from:
Must have at least one each from OMR and OCR to gain full marks
One mark is available for a reasoned conclusion [5]
5 (a) Phishing
Two from:
E-mail appear to be from customer's bank
Ask for customer’s details – password, card/account number, other security details
E-mail makes up plausible reason
Can include a link/website address for customer to go to which looks just like the actual
bank’s website but is a fake website
Pharming
Two from:
Installs a piece of malicious software/code on customer’s computer
Fraudster redirects genuine website’s traffic to own website
Customer is now sending personal details to fraudster’s website
Spyware
Two from:
Downloaded/software used to gather user's key presses
Software detects key presses of user logging on to bank site [6]
Aggregated information:
Personal details of individuals are combined to provide information without naming
those individuals [1]
7 Three from:
Some workers may have to/will have the opportunity to go part time
There will be the opportunity to job share
There will be the opportunity for flexible working hours
There will be the opportunity to work compressed hours
Workers will need to have the ability to move from branch to branch [3]
Conditional formatting
Cells are coloured differently to indicate acceptable progress or otherwise
Graphs/charts
Comparison of student’s chart with target grades/class average/previous scores/gradient
of the graph shows whether there is improvement or not
Maximum function
Could see which was highest mark and when
Minimum function
Could see which was lowest mark and when
Sorting/filtering
To produce a rank order of students + reason – for the purpose of grading/setting/to list
best/worst performing students/students achieving a particular mark range/grade so that
these students can be set suitable targets
Goal seek
Could see what test results required to achieve satisfactory average [8]
Time is not wasted travelling/ more free time because of less travelling
Can spend more time with their family/can arrange their work schedule to suit themselves
Don’t have to live close to the company so can live in area of their choice
Don’t have to spend money on fuel/transport travelling to work
Don’t have the stress of travelling to work in rush hour
If the payroll worker is disabled it’s easier for him/her as he/she doesn’t have to travel [3]
10 (a) With no thought given to the order/data has not been sorted/stored in the order they are
added [1]
11 Six from:
The transaction file is sorted in the same order as the master file
Sorted on employee number
First record in the transaction file read
Reads first record in the old master file
These two records are compared
If records don’t match computer writes master file record to new master file
If it matches transaction is carried out
Then
If transaction relates to calculation of pay:
Computer calculates the pay
Using rate of pay from master file
Using hours worked from transaction file
Computer calculates the income tax/insurance/pension contributions
Computer subtracts this from total pay
Processed record is written to master file
Process is repeated until end of old master file
Write your Centre number, candidate number and name on all the work you hand in.
Write in dark blue or black pen.
Do not use staples, paper clips, glue or correction fluid.
You may use an HB pencil for any diagrams, graphs or rough working.
DO NOT WRITE IN ANY BARCODES.
The number of marks is given in brackets [ ] at the end of each question or part question.
IB14 06_9713_32/RP
© UCLES 2014 [Turn over
2
Scenario 1
Questions 1 to 4
Pan European Airlines (PEA) requires its passengers to book and manage their flight bookings via the
Internet using its online booking system.
PEA has a website offering services to their customers. One of the services is the issuing of electronic
tickets (e-tickets) when passengers book a flight.
E-tickets are produced by the booking system prior to the flights and are used at check-in to issue
boarding passes.
The airline has a call centre open 24 hours, every day, to deal with customer queries.
PEA uses computer systems for training pilots. It has training facilities for its pilots using computer
simulations which require specialised hardware.
PEA uses computer systems for financial purposes. Gordon is the manager of the financial
department and uses computer modelling to manage its finances.
1 (a) Describe three services other than the issuing of e-tickets that the PEA website could offer
its passengers.
[3]
(b) Describe four steps that a customer would follow when booking flights using PEA’s website.
[4]
[1]
[4]
2 (a) Describe two benefits to the airline of using a call centre to answer passenger enquiries.
[2]
(b) Discuss the advantages and disadvantages to a passenger of using a call centre for
assistance rather than going to a travel agent.
[6]
(c) The airline call centre uses Computer Telephony Integration (CTI) software.
Describe two features of CTI software that would be useful to the airline.
[2]
3 (a) Describe the use of three specialised items of computer hardware that are required when
using computer simulations to train pilots.
[6]
(b) Describe three advantages to the pilots of using computer simulations rather than real
aircraft to learn to fly.
[3]
4 Explain how Gordon could use a computer model to manage the company finances.
[6]
Scenario 2
Questions 5 to 7
International Credit Enterprise is a bank with branches around the country. It holds customers’
personal accounts and their savings accounts.
Customers can access their accounts either at a branch or by online banking via the bank’s website.
The website can be used by disabled customers with suitably configured computers.
The bank also offers financial advice for customers and uses an expert system to help customers with
their financial planning.
5 (a) Describe five difficulties that disabled people might encounter when trying to use online
banking facilities.
[5]
(b) Describe three software configurations of a personal computer that could be used to assist
disabled people when accessing their bank accounts online.
[3]
6 Explain how the bank’s computer system would check that the person accessing the account
details has the authority to do so.
[6]
7 (a) Describe in detail the use of five components of an expert system for financial planning.
[5]
[2]
[2]
Scenario 3
Questions 8 to 10
A school has a computer network that can be accessed by students from any computer in the school
and remotely through the school website.
The students use the computers to improve their learning. The teachers use ICT to assist in the
assessment of the students’ work and to keep records of the students’ progress.
The school uses a VPN to enable teachers to access the school network from home.
8 Describe five ways in which the school’s computers could be used to improve the students’
learning.
[5]
9 Describe how a teacher could use ICT to record the progress of students and report their
progress to parents.
[6]
10 (a) Describe three network devices which could be used in the school's network. Include details
of how each would handle data packets.
Device 1
Device 2
Device 3
[6]
[3]
BLANK PAGE
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of
the examination. It shows the basis on which Examiners were instructed to award marks. It does not
indicate the details of the discussions that took place at an Examiners’ meeting before marking began,
which would have considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner
Report for Teachers.
Cambridge will not enter into discussions about these mark schemes.
Cambridge is publishing the mark schemes for the May/June 2014 series for most IGCSE, GCE
Advanced Level and Advanced Subsidiary Level components and some Ordinary Level components.
Page 2 Mark Scheme Syllabus Paper
GCE A LEVEL – May/June 2014 9713 32
Digital ticket sent by email/download exists as digital record (of booking/reservation) in airline
computer system
Contains reservation number and e-ticket number [1]
Fewer (many) premises so reduced costs can provide assistance/availability for longer hours
Can manage staff/resources more efficiently so reduce costs
Reduces vulnerability to single points of failure within communication systems
Reduces costs of forwarding calls to multi-site locations
Reduces costs of line rentals as calls are queued within company system [2]
Disadvantages from:
4 Descriptions from:
Input costs/values....
example: wage/salary/ICT/insurance costs
Calculate the total the company costs
Input price of tickets/projected/ticket sales
Input required/desired profit margins
Use goal seek to determine breakeven/ profit level
Use “what if” scenarios by altering data/values/costs
Run the model to compare it with actual situation [6]
Sticky keys feature so that e.g. shift key is not needed for upper case
Filter keys to prevent (unintended) multiple key presses
Use of zoom feature/large font size for easier reading
Non-display of images on web site/use of alt text
Use of voice recognition for commands/input of data
Use of text to voice
Eye control software to move cursor [3]
6 Explanations from:
[Total: 80]
Write your Centre number, candidate number and name on all the work you hand in.
Write in dark blue or black pen.
Do not use staples, paper clips, glue or correction fluid.
You may use an HB pencil for any diagrams, graphs or rough working.
DO NOT WRITE IN ANY BARCODES.
The number of marks is given in brackets [ ] at the end of each question or part question.
IB14 06_9713_33/FP
© UCLES 2014 [Turn over
2
Scenario 1
Questions 1 to 4
Pan European Airlines (PEA) requires its passengers to book and manage their flight bookings via the
Internet using its online booking system.
PEA has a website offering services to their customers. One of the services is the issuing of electronic
tickets (e-tickets) when passengers book a flight.
E-tickets are produced by the booking system prior to the flights and are used at check-in to issue
boarding passes.
The airline has a call centre open 24 hours, every day, to deal with customer queries.
PEA uses computer systems for training pilots. It has training facilities for its pilots using computer
simulations which require specialised hardware.
PEA uses computer systems for financial purposes. Gordon is the manager of the financial
department and uses computer modelling to manage its finances.
1 (a) Describe three services other than the issuing of e-tickets that the PEA website could offer
its passengers.
[3]
(b) Describe four steps that a customer would follow when booking flights using PEA’s website.
[4]
[1]
[4]
2 (a) Describe two benefits to the airline of using a call centre to answer passenger enquiries.
[2]
(b) Discuss the advantages and disadvantages to a passenger of using a call centre for
assistance rather than going to a travel agent.
[6]
(c) The airline call centre uses Computer Telephony Integration (CTI) software.
Describe two features of CTI software that would be useful to the airline.
[2]
3 (a) Describe the use of three specialised items of computer hardware that are required when
using computer simulations to train pilots.
[6]
(b) Describe three advantages to the pilots of using computer simulations rather than real
aircraft to learn to fly.
[3]
4 Explain how Gordon could use a computer model to manage the company finances.
[6]
Scenario 2
Questions 5 to 7
International Credit Enterprise is a bank with branches around the country. It holds customers’
personal accounts and their savings accounts.
Customers can access their accounts either at a branch or by online banking via the bank’s website.
The website can be used by disabled customers with suitably configured computers.
The bank also offers financial advice for customers and uses an expert system to help customers with
their financial planning.
5 (a) Describe five difficulties that disabled people might encounter when trying to use online
banking facilities.
[5]
(b) Describe three software configurations of a personal computer that could be used to assist
disabled people when accessing their bank accounts online.
[3]
6 Explain how the bank’s computer system would check that the person accessing the account
details has the authority to do so.
[6]
7 (a) Describe in detail the use of five components of an expert system for financial planning.
[5]
[2]
[2]
Scenario 3
Questions 8 to 10
A school has a computer network that can be accessed by students from any computer in the school
and remotely through the school website.
The students use the computers to improve their learning. The teachers use ICT to assist in the
assessment of the students’ work and to keep records of the students’ progress.
The school uses a VPN to enable teachers to access the school network from home.
8 Describe five ways in which the school’s computers could be used to improve the students’
learning.
[5]
9 Describe how a teacher could use ICT to record the progress of students and report their
progress to parents.
[6]
10 (a) Describe three network devices which could be used in the school's network. Include details
of how each would handle data packets.
Device 1
Device 2
Device 3
[6]
[3]
BLANK PAGE
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of
the examination. It shows the basis on which Examiners were instructed to award marks. It does not
indicate the details of the discussions that took place at an Examiners’ meeting before marking began,
which would have considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner
Report for Teachers.
Cambridge will not enter into discussions about these mark schemes.
Cambridge is publishing the mark schemes for the May/June 2014 series for most IGCSE, GCE
Advanced Level and Advanced Subsidiary Level components and some Ordinary Level components.
Page 2 Mark Scheme Syllabus Paper
GCE A LEVEL – May/June 2014 9713 33
Digital ticket sent by email/download exists as digital record (of booking/reservation) in airline
computer system
Contains reservation number and e-ticket number [1]
Fewer (many) premises so reduced costs can provide assistance/availability for longer hours
Can manage staff/resources more efficiently so reduce costs
Reduces vulnerability to single points of failure within communication systems
Reduces costs of forwarding calls to multi-site locations
Reduces costs of line rentals as calls are queued within company system [2]
Disadvantages from:
4 Descriptions from:
Input costs/values....
example: wage/salary/ICT/insurance costs
Calculate the total the company costs
Input price of tickets/projected/ticket sales
Input required/desired profit margins
Use goal seek to determine breakeven/ profit level
Use “what if” scenarios by altering data/values/costs
Run the model to compare it with actual situation [6]
Sticky keys feature so that e.g. shift key is not needed for upper case
Filter keys to prevent (unintended) multiple key presses
Use of zoom feature/large font size for easier reading
Non-display of images on web site/use of alt text
Use of voice recognition for commands/input of data
Use of text to voice
Eye control software to move cursor [3]
6 Explanations from:
[Total: 80]
Write your Centre number, candidate number and name on all the work you hand in.
Write in dark blue or black pen.
Do not use staples, paper clips, glue or correction fluid.
You may use an HB pencil for any diagrams, graphs or rough working.
DO NOT WRITE IN ANY BARCODES.
The number of marks is given in brackets [ ] at the end of each question or part question.
DC (NF) 100112
© UCLES 2014 [Turn over
2
Scenario 1
Questions 1, 2, 3, 4 and 5
International Exploration & Mining (IEM) is a multi-national company specialising in mineral prospecting.
Fergal is employed by the company as an inspector to visit and inspect geological sites in search of
deposits of mineral ores.
Fergal takes a laptop computer when visiting a potential site and uses it to record his findings.
IEM has created an expert system for use by their inspectors and geologists who can access it using
the Internet and the company network.
He uses his own knowledge and the company’s expert system to predict the likelihood of a particular
mineral ore being found in the location.
Fergal connects the laptop to the company network using the Internet to send back his findings and to
keep in regular contact with the company and other inspectors.
The company also uses Fergal’s findings and those of its other inspectors and geologists to construct
computer models to predict where mineral ore deposits might be found.
1 (a) Describe how the facts in the knowledge base of the company’s expert system would have
been obtained.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[4]
(b) Give two examples of the input data that would be needed from Fergal for use by the
company’s expert system.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...............................................................................................................................................[2]
2 Discuss the advantages and disadvantages to the inspectors of using an expert system for mineral
prospecting.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[8]
3 Describe three steps that are taken when constructing a computer model of an area being
prospected.
1 .......................................................................................................................................................
..........................................................................................................................................................
2 .......................................................................................................................................................
..........................................................................................................................................................
3 .......................................................................................................................................................
......................................................................................................................................................[3]
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
5 (a) Explain how each protocol shown below could be used to obtain information from the company
network.
http ............................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
FTP ...........................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[4]
(b) Describe two ways Fergal can ensure that his findings are kept secure while being transferred
to the company.
1 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[4]
(c) Describe how Fergal could use the Internet for keeping in contact with the company and with
other company inspectors.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[6]
Scenario 2
Questions 6, 7 and 8
Many people use online booking systems, online auctions and online transaction services.
A government agency has been set up to attempt to reduce the antisocial use of ICT and computer
fraud.
It is developing new security software to try to make people more confident about the security of their
personal data when using these services.
6 (a) Discuss the benefits and drawbacks of using the Internet to book tickets.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[6]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[1]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[4]
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[8]
8 Describe how timeline software would help the agency when creating its new security software.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[2]
Scenario 3
Questions 9, 10 and 11
A regional government has asked Iqbal (a website designer), to create a new website which will include
facilities for:
A new road is to be built through the region. The website facilities will allow citizens to register their
details and to have more influence on their political representatives during the building of this road.
Before the website is implemented, Iqbal must be confident that there are no security issues and must
appoint moderators for the online focus group.
9 Describe three different security problems and three different solutions that Iqbal must consider
before implementing the website.
Problem 1 .........................................................................................................................................
..........................................................................................................................................................
Solution 1 .........................................................................................................................................
..........................................................................................................................................................
Problem 2 .........................................................................................................................................
..........................................................................................................................................................
Solution 2 .........................................................................................................................................
..........................................................................................................................................................
Problem 3 .........................................................................................................................................
..........................................................................................................................................................
Solution 3 .........................................................................................................................................
......................................................................................................................................................[6]
10 Describe how, other than using focus groups, political representatives could use the Internet to
communicate with, and gather feedback from, citizens.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[6]
11 Iqbal will also organise an online focus group to discuss the building of the new road.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
(b) Discuss the advantages and disadvantages of using an online focus group to find out what
people think about the plans for the road.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[6]
BLANK PAGE
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of
the examination. It shows the basis on which Examiners were instructed to award marks. It does not
indicate the details of the discussions that took place at an Examiners’ meeting before marking began,
which would have considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner
Report for Teachers.
Cambridge will not enter into discussions about these mark schemes.
Cambridge is publishing the mark schemes for the October/November 2014 series for
most Cambridge IGCSE®, Cambridge International A and AS Level components and some
Cambridge O Level components.
2 Eight from:
Advantages:
Contains the knowledge of many experts
Provide permanent record of process
Can enhance his own knowledge
Produce results quicker/reduces time taken to produce results
Fewer errors in work
No need to check with other inspectors/geologists if in doubt over findings
No need to carry/have access to paper records/information/reference books
Disadvantages:
Can lead to demotivation/less thought process by operative
Inspectors need to be trained to use the system
Expert system follows rules while operative might have “insight”/use common sense
Expert system does not easily adapt to new/different conditions
Expert system needs to be up-to-date to provide the most useful information for the inspectors to
use
Updating may take the system offline and make it unavailable
3 Three from:
Analysing the geology of an area/location
Analyse/interpret the records/data of observations
Create a model describing the geology of the area e.g. rock boundaries/faults/water flow
Create a 3D representation of the area showing rock formations/likely mineral deposits/
fluid flow/oil in rocks/spaces between rocks [3]
Two from:
FTP: FTP client/application on laptop used to login in with user ID/password
Active or passive FTP mode selected depending on company server settings
Data type, e.g. ASCII/binary/EBCDIC, of data transfer determined
Mode, e.g. Stream/block/compressed, of data transfer selected [4]
Benefits:
Customers do not need to travel to make a booking so save travel costs/time
Customers can compare bookings with different companies
Customers can make bookings from anywhere
Customers can make bookings at any time
Customers has instant confirmation available
Reduced staff for branches/agents so saving money on salaries/wages
Customer base not restricted by time zones
Drawbacks:
Cannot authenticate customers for security purposes
No personal contact with customers/agents
Customers with special requirements may not be able to ask questions/get information online
Do not have street presence to attract new customers
Reliant on customers having internet access
(b) (i) The use of ICT/computer systems to intentionally deceive (others) for personal gain [1]
8 Two from:
Create Gantt charts
Create PERT charts
…helps to identify the short and long term targets for the task of creating the software
…helps to prioritise the tasks
…helps to create a critical path [2]
Weblog:
Have a chronological record of postings
Perception of greater access
Can have multimedia elements
Consumes time to create and update
Unfiltered/uncensored
Emails:
Emails sent to registered subscribers
Send emails with information/attachments of newsletters
Website:
Information posted
Online questionnaires collect views
Forum:
Can be accessed from anywhere
Have a large audience
Wide range of users produces range of ideas and views
Usually only text-based
Malicious postings could be possible
Moderators/administrators can censor postings
Difficult to identify posters of malicious postings
e-Petitions:
Petition is set up on (government/politician) website
Petition checked for authenticity to ensure that
…there is not one already on that topic
…it does not contain confidential, libellous, false or defamatory statements
…it does not contain offensive, joke or nonsense content
Petition is available for anyone to sign
Social networks:
Use of social networks for “branding”/public image of politicians
Use for voter registration – collecting names of voters
Allow voters/supporters to express opinions/make comments on social network pages
Encourage voters/supporters follow/engage with politicians [6]
Advantages:
Members can be from all over the world/anywhere/wider range of views or opinions available
Timings do not have to take account of travel time
Travel and accommodation do not have to be arranged or paid for
Use of moderators to ensure appropriate language/tone of contributions
Contributors cannot remain anonymous
No need to employ staff/researchers so reduced costs
Disadvantages:
Organiser/moderator has less influence over the discussion
Contributors/citizens need IT skills/access to IT facilities
Interaction between organiser/moderator is reduced
Members often contribute less online than face-to-face
Reactions of members cannot be observed easily [6]
[Total: 80]
Write your Centre number, candidate number and name on all the work you hand in.
Write in dark blue or black pen.
Do not use staples, paper clips, glue or correction fluid.
You may use a pencil for any diagrams, graphs or rough working.
DO NOT WRITE IN ANY BARCODES.
The number of marks is given in brackets [ ] at the end of each question or part question.
DC (NH) 88703/2
© UCLES 2014 [Turn over
2
Scenario 1
Questions 1, 2, 3, 4, 5, 6 and 7
A systems analyst has been hired to investigate the current system with a view to designing a new
computerised system.
Part of the design of a new system involves specifying the required hardware and software.
At 15 second intervals the current status of the system, including the temperature of the mixture, will be
output to a printer.
If they go ahead with computerising the process, in order to keep the same number of workers
employed, many workers will have to work part-time.
The company would like to use ICT to produce advertising materials to publicise its new range of
products.
1 Three methods of researching the current system would be the use of questionnaires, interviews
and observations. For each statement below, tick the most appropriate answer.
As the questionnaires would be anonymous, system users might exaggerate their responses
Users can take them away and complete them in their own time
System users might not answer honestly and give the answers they think the interviewer wants
to hear
Questions can be tailored to suit the individual
System users might behave differently if they know they are being watched
2 Tick four ways in which the inputs, outputs and processing in the existing system would be
established by the systems analyst.
Identify the sources and volume of input data and collection methods
Identify the manual and computer procedures necessary to achieve the current output
3 (a) Describe what is meant by the following terms when referring to Data Flow Diagrams.
Store .........................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Terminator .................................................................................................................................
...............................................................................................................................................[4]
(b) Give three reasons why the systems analyst would use Data Flow Diagrams.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
3 ................................................................................................................................................
...............................................................................................................................................[3]
4 (a) For each of the following examples describe the type of process control which would be used,
giving a reason why.
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
Refrigeration .............................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
(b) Discuss the benefits and drawbacks to the company of using computerised process control.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[6]
5 The system analyst has recommended the use of a dot matrix printer rather than a laser or inkjet
printer.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[6]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...............................................................................................................................................[2]
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...............................................................................................................................................[2]
7 (a) Describe three advantages to the company of using posters rather than flyers in this scenario.
1 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
3 ................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[3]
(b) Give four reasons why the company would advertise using flyers rather than using posters in
this scenario.
1 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
3 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
4 ................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[4]
Scenario 2
Questions 8, 9, 10 and 11
Volcano Ltd is a book publishing company which has several offices throughout Sweden.
In Stockholm the office has a number of departments. The manager of the Humanities department,
Johanna, often works from home. During the winter months she uses a microprocessor controlled
central heating system. The company pay all her expenses for her heating, lighting and equipment
costs.
The company also sells books using their own online shopping website.
8 Describe the inputs and outputs of a microprocessor controlled central heating system.
Inputs
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[2]
Outputs
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[2]
9 (a) Apart from distractions at home, give four reasons why the company would want Johanna to
work in the office rather than at home.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
3 ................................................................................................................................................
...................................................................................................................................................
4 ................................................................................................................................................
...............................................................................................................................................[4]
(b) Give two possible distractions to Johanna which might interrupt her work at home.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...............................................................................................................................................[2]
10 Describe, including the use of essential hardware, how a video-conference for the training would
take place.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[5]
11 (a) A customer has loaded the website of the online shopping system. Describe five steps she
would have to go through in order to select an item before she pays for it.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
3 ................................................................................................................................................
...................................................................................................................................................
4 ................................................................................................................................................
...................................................................................................................................................
5 ................................................................................................................................................
...............................................................................................................................................[5]
(b) Some customers have to use online shopping systems. Give four circumstances where this
is the case.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
3 ................................................................................................................................................
...................................................................................................................................................
4 ................................................................................................................................................
...............................................................................................................................................[4]
(c) Describe four reasons why some customers may be unable to use online shopping.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
3 ................................................................................................................................................
...................................................................................................................................................
4 ................................................................................................................................................
...............................................................................................................................................[4]
Scenario 3
Question 12
China News is a newspaper produced in Beijing. The owners have printing presses in a number of
other Chinese cities.
After journalists type up their stories they submit them to the editor including the photographs they
have used.
After the newspaper layout is completed, satellites are used to send it for printing.
12 (a) Describe four ICT techniques that the editor would use to produce the newspaper layout after
receiving the journalists’ stories and photographs.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
3 ................................................................................................................................................
...................................................................................................................................................
4 ................................................................................................................................................
...............................................................................................................................................[4]
(b) Describe how satellites are used when faxing a completed page from the main office to the
printing presses in other parts of China.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[3]
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of
the examination. It shows the basis on which Examiners were instructed to award marks. It does not
indicate the details of the discussions that took place at an Examiners’ meeting before marking began,
which would have considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner
Report for Teachers.
Cambridge will not enter into discussions about these mark schemes.
Cambridge is publishing the mark schemes for the October/November 2014 series for
most Cambridge IGCSE®, Cambridge International A and AS Level components and some
Cambridge O Level components.
1 (a)
Responses can be machine readable
Users can take them away and complete them in their own time
(b)
System users might not answer honestly and give the answers they think the
interviewer wants to hear
(c)
You can see the system first hand
System users might behave differently if they know they are being watched
2
Identify who the manager is
Identify the sources and volume of input data and collection methods
Identify the manual and computer procedures necessary to achieve the current output
3 (a) Store
The actual data output from the system recorded for future use
Process box
Data processes are put in a process box/accept an example
Terminator
When data flows from or to somebody or somewhere outside the system, that somebody or
somewhere is called a terminator [4]
Production line
Discrete process control [1]
Each container is filled and has a label put on it which is like an on/off or
stop/start process/in between cartons the process pauses/stops [1]
Refrigeration
Continuous process control [1]
Process is virtually unending/low temperature needs to be maintained continuously [1]
Benefits
Quantities of ingredients can be measured more accurately
Time spent on a task can be monitored more accurately
Temperature can be set more accurately
There will be greater productivity
Fewer hours will be worked by each worker so less paid in wages
Whole process can be continuous/no need to stop e.g. at shift changeovers
The product is produced to a more consistent standard
Drawbacks
If incorrect programming whole batch may be lost
Initial costs of computer equipment/technical staff to set it up/initial setup/installation may be
expensive
Cost of retraining workforce will be high
One mark is available for a reasoned conclusion
5 Six from:
More free time/more time to spend with family due to fewer hours worked
Will still be doing work that they have been trained for/are used to…
…if they had to change jobs they might lose their skills/self-confidence
Less stressful as they can miss rush hour traffic [2]
8 Inputs
Two from
Outputs
Two from
10 Five from:
If you work certain hours and cannot get to book shop in normal opening hours
Where it’s difficult to leave the house due to young family
People with disabilities making it difficult to walk
When you live in remote areas/live long way from shops
The shop you want to use only has an online presence
The book/product is not available in the local shop
May not have any type of transport to get to the shop [4]
Write your Centre number, candidate number and name on all the work you hand in.
Write in dark blue or black pen.
Do not use staples, paper clips, glue or correction fluid.
You may use a pencil for any diagrams, graphs or rough working.
DO NOT WRITE IN ANY BARCODES.
The number of marks is given in brackets [ ] at the end of each question or part question.
DC (NF) 99988
© UCLES 2014 [Turn over
2
Scenario 1
Questions 1, 2, 3, 4, 5, 6 and 7
A systems analyst has been hired to investigate the current system with a view to designing a new
computerised system.
Part of the design of a new system involves specifying the required hardware and software.
At 15 second intervals the current status of the system, including the temperature of the mixture, will be
output to a printer.
If they go ahead with computerising the process, in order to keep the same number of workers
employed, many workers will have to work part-time.
The company would like to use ICT to produce advertising materials to publicise its new range of
products.
1 Three methods of researching the current system would be the use of questionnaires, interviews
and observations. For each statement below, tick the most appropriate answer.
As the questionnaires would be anonymous, system users might exaggerate their responses
Users can take them away and complete them in their own time
System users might not answer honestly and give the answers they think the interviewer wants
to hear
Questions can be tailored to suit the individual
System users might behave differently if they know they are being watched
2 Tick four ways in which the inputs, outputs and processing in the existing system would be
established by the systems analyst.
Identify the sources and volume of input data and collection methods
Identify the manual and computer procedures necessary to achieve the current output
3 (a) Describe what is meant by the following terms when referring to Data Flow Diagrams.
Store .........................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Terminator .................................................................................................................................
...............................................................................................................................................[4]
(b) Give three reasons why the systems analyst would use Data Flow Diagrams.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
3 ................................................................................................................................................
...............................................................................................................................................[3]
4 (a) For each of the following examples describe the type of process control which would be used,
giving a reason why.
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
Refrigeration .............................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
(b) Discuss the benefits and drawbacks to the company of using computerised process control.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[6]
5 The system analyst has recommended the use of a dot matrix printer rather than a laser or inkjet
printer.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[6]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...............................................................................................................................................[2]
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...............................................................................................................................................[2]
7 (a) Describe three advantages to the company of using posters rather than flyers in this scenario.
1 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
3 ................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[3]
(b) Give four reasons why the company would advertise using flyers rather than using posters in
this scenario.
1 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
3 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
4 ................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[4]
Scenario 2
Questions 8, 9, 10 and 11
Volcano Ltd is a book publishing company which has several offices throughout Sweden.
In Stockholm the office has a number of departments. The manager of the Humanities department,
Johanna, often works from home. During the winter months she uses a microprocessor controlled
central heating system. The company pay all her expenses for her heating, lighting and equipment
costs.
The company also sells books using their own online shopping website.
8 Describe the inputs and outputs of a microprocessor controlled central heating system.
Inputs
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[2]
Outputs
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[2]
9 (a) Apart from distractions at home, give four reasons why the company would want Johanna to
work in the office rather than at home.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
3 ................................................................................................................................................
...................................................................................................................................................
4 ................................................................................................................................................
...............................................................................................................................................[4]
(b) Give two possible distractions to Johanna which might interrupt her work at home.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...............................................................................................................................................[2]
10 Describe, including the use of essential hardware, how a video-conference for the training would
take place.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[5]
11 (a) A customer has loaded the website of the online shopping system. Describe five steps she
would have to go through in order to select an item before she pays for it.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
3 ................................................................................................................................................
...................................................................................................................................................
4 ................................................................................................................................................
...................................................................................................................................................
5 ................................................................................................................................................
...............................................................................................................................................[5]
(b) Some customers have to use online shopping systems. Give four circumstances where this
is the case.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
3 ................................................................................................................................................
...................................................................................................................................................
4 ................................................................................................................................................
...............................................................................................................................................[4]
(c) Describe four reasons why some customers may be unable to use online shopping.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
3 ................................................................................................................................................
...................................................................................................................................................
4 ................................................................................................................................................
...............................................................................................................................................[4]
Scenario 3
Question 12
China News is a newspaper produced in Beijing. The owners have printing presses in a number of
other Chinese cities.
After journalists type up their stories they submit them to the editor including the photographs they
have used.
After the newspaper layout is completed, satellites are used to send it for printing.
12 (a) Describe four ICT techniques that the editor would use to produce the newspaper layout after
receiving the journalists’ stories and photographs.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
3 ................................................................................................................................................
...................................................................................................................................................
4 ................................................................................................................................................
...............................................................................................................................................[4]
(b) Describe how satellites are used when faxing a completed page from the main office to the
printing presses in other parts of China.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[3]
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of
the examination. It shows the basis on which Examiners were instructed to award marks. It does not
indicate the details of the discussions that took place at an Examiners’ meeting before marking began,
which would have considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner
Report for Teachers.
Cambridge will not enter into discussions about these mark schemes.
Cambridge is publishing the mark schemes for the October/November 2014 series for
most Cambridge IGCSE®, Cambridge International A and AS Level components and some
Cambridge O Level components.
1 (a)
Responses can be machine readable
Users can take them away and complete them in their own time
(b)
System users might not answer honestly and give the answers they think the
interviewer wants to hear
(c)
You can see the system first hand
System users might behave differently if they know they are being watched
2
Identify who the manager is
Identify the sources and volume of input data and collection methods
Identify the manual and computer procedures necessary to achieve the current output
3 (a) Store
The actual data output from the system recorded for future use
Process box
Data processes are put in a process box/accept an example
Terminator
When data flows from or to somebody or somewhere outside the system, that somebody or
somewhere is called a terminator [4]
Production line
Discrete process control [1]
Each container is filled and has a label put on it which is like an on/off or
stop/start process/in between cartons the process pauses/stops [1]
Refrigeration
Continuous process control [1]
Process is virtually unending/low temperature needs to be maintained continuously [1]
Benefits
Quantities of ingredients can be measured more accurately
Time spent on a task can be monitored more accurately
Temperature can be set more accurately
There will be greater productivity
Fewer hours will be worked by each worker so less paid in wages
Whole process can be continuous/no need to stop e.g. at shift changeovers
The product is produced to a more consistent standard
Drawbacks
If incorrect programming whole batch may be lost
Initial costs of computer equipment/technical staff to set it up/initial setup/installation may be
expensive
Cost of retraining workforce will be high
One mark is available for a reasoned conclusion
5 Six from:
More free time/more time to spend with family due to fewer hours worked
Will still be doing work that they have been trained for/are used to…
…if they had to change jobs they might lose their skills/self-confidence
Less stressful as they can miss rush hour traffic [2]
8 Inputs
Two from
Outputs
Two from
10 Five from:
If you work certain hours and cannot get to book shop in normal opening hours
Where it’s difficult to leave the house due to young family
People with disabilities making it difficult to walk
When you live in remote areas/live long way from shops
The shop you want to use only has an online presence
The book/product is not available in the local shop
May not have any type of transport to get to the shop [4]
Write your Centre number, candidate number and name on all the work you hand in.
Write in dark blue or black pen.
Do not use staples, paper clips, glue or correction fluid.
You may use a pencil for any diagrams, graphs or rough working.
DO NOT WRITE IN ANY BARCODES.
The number of marks is given in brackets [ ] at the end of each question or part question.
DC (NH) 88704/2
© UCLES 2014 [Turn over
2
Scenario 1
Questions 1, 2, 3, 4, 5 and 6
Ali Fashions Ltd has a number of stores in Cairo. It is converting its existing computer system to make
it more efficient.
A systems analyst is being employed to analyse the existing system and then design the new system.
Ali Fashions Ltd currently has two separate files, one for storing customer records and another for
storing records of sales.
The customer records are processed as a single master file at the end of the day using a transaction
file which is created in the course of the day. There are three types of transaction. Examples are:
When customers buy goods the cost of the goods is added to their account. For example, a customer
buying a shirt costing $20 would need to have that sale recorded on their account. If they already owed
$40, $20 would need to be added to their account to give a balance of $60.
The systems analyst has decided that the sales records and the customer records should be combined
into a relational database system.
1 Three methods of implementing the new system would be the use of parallel running, direct
changeover and pilot running. For each statement below, tick the most appropriate answer.
If there is a fault with the new system the old system can still be used
If there is a fault with the new system the old system can still be used
If there is a fault with the new system not all stores in the organisation would be affected
If there is a fault with the new system none of the stores in the organisation would be affected
To provide the systems analyst with a detailed overview of the whole system
So that programmers can fully understand the program code that has been used
3 The calculations involved in updating a customer record file following a purchase will need to be
tested. A test plan consisting of a table containing columns would be created.
Name three of the column headings. For each one give an example or description of the possible
contents of the column making reference to the data given in the scenario.
Heading 1 .........................................................................................................................................
..........................................................................................................................................................
Contents ...........................................................................................................................................
..........................................................................................................................................................
Heading 2 .........................................................................................................................................
..........................................................................................................................................................
Contents ...........................................................................................................................................
..........................................................................................................................................................
Heading 3 .........................................................................................................................................
..........................................................................................................................................................
Contents ...........................................................................................................................................
......................................................................................................................................................[6]
4 (a) Name three types of transaction involved in the updating of the master file at the end of the
day. Using the scenario, give one example of each type of transaction.
1 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
3 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[6]
(b) Fixed magnetic hard disks are used to store the transaction and master data files. Discuss
the advantages and disadvantages of using disks compared with using magnetic tape for this
storage.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[6]
5 (a) Describe the relational database that would need to be created to store the sales records and
the customer records.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[5]
(b) Give three reasons why the systems analyst would recommend a relational database.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
3 ................................................................................................................................................
...............................................................................................................................................[3]
6 (a) When data is entered into the new database it will need to be verified. Describe two ways in
which this can be done.
1 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[4]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[3]
Scenario 2
Questions 7, 8, 9 and 10
The WIMBA car company has automated production lines. Computer controlled robot arms are used to
produce its new model.
The company wishes to advertise all aspects of its business, including car insurance, as well as this
new model. It is planning to advertise using multimedia presentations in shopping malls.
Maria is the manager of the advertising department. She uses time management software in her job.
Many workers in her department work compressed hours.
7 (a) For each of the following four end effectors, describe the task each would perform in car
production.
Camera .....................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[4]
(b) Give four reasons why companies use robots when assembling car bodies.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
3 ................................................................................................................................................
...................................................................................................................................................
4 ................................................................................................................................................
...............................................................................................................................................[4]
8 (a) Describe the three types of advertising shown below. Give an example of each type, referring
only to aspects of the car company used in this scenario.
Business ...................................................................................................................................
...................................................................................................................................................
Example ....................................................................................................................................
...................................................................................................................................................
Product .....................................................................................................................................
...................................................................................................................................................
Example ....................................................................................................................................
...................................................................................................................................................
Service ......................................................................................................................................
...................................................................................................................................................
Example ....................................................................................................................................
...............................................................................................................................................[6]
(b) Describe, with reference to the scenario, four features which are found in a multimedia
presentation which would not be found in a flyer.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
3 ................................................................................................................................................
...................................................................................................................................................
4 ................................................................................................................................................
...............................................................................................................................................[4]
9 Maria uses software to help her carry out a number of time management tasks.
Describe three of these tasks that she might wish to carry out.
1 .......................................................................................................................................................
..........................................................................................................................................................
2 .......................................................................................................................................................
..........................................................................................................................................................
3 .......................................................................................................................................................
......................................................................................................................................................[3]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...............................................................................................................................................[2]
(c) Describe two drawbacks to the company of workers working compressed hours.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...............................................................................................................................................[2]
Scenario 3
Question 11
ICE refrigerators Ltd is an English company which manufactures refrigerators. It provides a help line
service to its customers.
When customers phone the help line they are put through to a call centre. The call centre has a system
which automatically processes the phone call before the operator speaks to the customer.
Health and Safety issues often arise through the use of computer equipment at the call centre.
11 (a) Describe four measures which could be taken to minimise safety risks.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
3 ................................................................................................................................................
...................................................................................................................................................
4 ................................................................................................................................................
...............................................................................................................................................[4]
(b) Describe four different measures which operators could take to minimise health problems.
Include in your description the health problem each measure would help to minimise.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
3 ................................................................................................................................................
...................................................................................................................................................
4 ................................................................................................................................................
...............................................................................................................................................[4]
(c) Describe five steps involved in the processing of a customer call by the call centre’s automated
system.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
3 ................................................................................................................................................
...................................................................................................................................................
4 ................................................................................................................................................
...................................................................................................................................................
5 ................................................................................................................................................
...............................................................................................................................................[5]
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of
the examination. It shows the basis on which Examiners were instructed to award marks. It does not
indicate the details of the discussions that took place at an Examiners’ meeting before marking began,
which would have considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner
Report for Teachers.
Cambridge will not enter into discussions about these mark schemes.
Cambridge is publishing the mark schemes for the October/November 2014 series for
most Cambridge IGCSE®, Cambridge International A and AS Level components and some
Cambridge O Level components.
1 (a)
It is the cheapest method of implementation
If there is a fault with the new system the old system can still be used
(b)
If there is a fault with the new system the old system can still be used
There is no need to train the workers
The benefits of the new system are available immediately
(c)
If there is a fault with the new system not all stores in the organisation would be
affected
If there is a fault with the new system none of the stores in the organisation would be
affected
It is a quicker method of implementation than direct changeover
It is a cheaper method than direct changeover
[1]
2
To provide the systems analyst with a detailed overview of the whole system
So that programmers can fully understand the program code that has been used
Test data
This column would contain test data values such as 40 and 20/description of test data
Expected results
This column would contain the calculation 20 + 40 = 60/description of expected results
Actual results
This column would contain the actual results of the test, in this case 60/description of actual
results
Comment
This column would contain whether the test worked, in this case whether 60 was produced or
not/description of a comment
Amendment [1]
A customer’s address/name is changed/customer buys something +[1]
Deletion [1]
A customer closes their account/dies +[1]
Insertion [1]
A new customer opens an account +[1]
Magnetic disc has faster access than magnetic tape to data for reading from a file
Magnetic disc has faster access than magnetic tape to data for writing to a file
Fixed magnetic disc is not as portable as a magnetic tape, so not as effective for transaction
file…
…if this is to be prepared off line
Data on a magnetic disc has direct access…
…so useful if data from master file is required quickly
Data on a magnetic tape requires serial access…
…but as all the data on the transaction file will be used this is not an issue
Visual verification
Visually compare data on screen/printout with original/source document
Decide which version is correct if differences are spotted
Verification checks that data is copied correctly from one medium to another
Verification checks that versions of data have been entered correctly
Verification does not check if data is correct or reasonable
Validation is used to check entered data is reasonable/acceptable [3]
Business – Advertises the whole company to make the company name familiar not just a
single product or service
9 Three from:
Descriptions of:
Organising meeting times
Arranging workloads
Organising research and development projects
Project management [3]
Measure
Get up and walk around every so often
Good quality seating that supports the back/sitting in an appropriate position
Height-adjustable seating
Focus on a distant object from time to time/improve the lighting in the room/have anti-glare
screens
Use ergonometric/ergonomic keyboards
Height, position and distance from worker of screens/keyboards should be optimised
Health problem
Lower back pain
Problems with one’s sight
RSI in the fingers
RSI in the wrists/carpal tunnel syndrome
Eye strain/headaches
Upper back/neck/shoulder pain/eyestrain/headaches [4]
Write your Centre number, candidate number and name on all the work you hand in.
Write in dark blue or black pen.
Do not use staples, paper clips, glue or correction fluid.
You may use an HB pencil for any diagrams, graphs or rough working.
DO NOT WRITE IN ANY BARCODES.
The number of marks is given in brackets [ ] at the end of each question or part question.
DC (NH) 88702/2
© UCLES 2014 [Turn over
2
Scenario 1
Questions 1, 2, 3, 4 and 5
International Exploration & Mining (IEM) is a multi-national company specialising in mineral prospecting.
Fergal is employed by the company as an inspector to visit and inspect geological sites in search of
deposits of mineral ores.
Fergal takes a laptop computer when visiting a potential site and uses it to record his findings.
IEM has created an expert system for use by their inspectors and geologists who can access it using
the Internet and the company network.
He uses his own knowledge and the company’s expert system to predict the likelihood of a particular
mineral ore being found in the location.
Fergal connects the laptop to the company network using the Internet to send back his findings and to
keep in regular contact with the company and other inspectors.
The company also uses Fergal’s findings and those of its other inspectors and geologists to construct
computer models to predict where mineral ore deposits might be found.
1 (a) Describe how the facts in the knowledge base of the company’s expert system would have
been obtained.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[4]
(b) Give two examples of the input data that would be needed from Fergal for use by the
company’s expert system.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...............................................................................................................................................[2]
2 Discuss the advantages and disadvantages to the inspectors of using an expert system for mineral
prospecting.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[8]
3 Describe three steps that are taken when constructing a computer model of an area being
prospected.
1 .......................................................................................................................................................
..........................................................................................................................................................
2 .......................................................................................................................................................
..........................................................................................................................................................
3 .......................................................................................................................................................
......................................................................................................................................................[3]
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
5 (a) Explain how each protocol shown below could be used to obtain information from the company
network.
http ............................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
FTP ...........................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[4]
(b) Describe two ways Fergal can ensure that his findings are kept secure while being transferred
to the company.
1 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[4]
(c) Describe how Fergal could use the Internet for keeping in contact with the company and with
other company inspectors.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[6]
Scenario 2
Questions 6, 7 and 8
Many people use online booking systems, online auctions and online transaction services.
A government agency has been set up to attempt to reduce the antisocial use of ICT and computer
fraud.
It is developing new security software to try to make people more confident about the security of their
personal data when using these services.
6 (a) Discuss the benefits and drawbacks of using the Internet to book tickets.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[6]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[1]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[4]
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[8]
8 Describe how timeline software would help the agency when creating its new security software.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[2]
Scenario 3
Questions 9, 10 and 11
A regional government has asked Iqbal (a website designer), to create a new website which will include
facilities for:
A new road is to be built through the region. The website facilities will allow citizens to register their
details and to have more influence on their political representatives during the building of this road.
Before the website is implemented, Iqbal must be confident that there are no security issues and must
appoint moderators for the online focus group.
9 Describe three different security problems and three different solutions that Iqbal must consider
before implementing the website.
Problem 1 .........................................................................................................................................
..........................................................................................................................................................
Solution 1 .........................................................................................................................................
..........................................................................................................................................................
Problem 2 .........................................................................................................................................
..........................................................................................................................................................
Solution 2 .........................................................................................................................................
..........................................................................................................................................................
Problem 3 .........................................................................................................................................
..........................................................................................................................................................
Solution 3 .........................................................................................................................................
......................................................................................................................................................[6]
10 Describe how, other than using focus groups, political representatives could use the Internet to
communicate with, and gather feedback from, citizens.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[6]
11 Iqbal will also organise an online focus group to discuss the building of the new road.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
(b) Discuss the advantages and disadvantages of using an online focus group to find out what
people think about the plans for the road.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[6]
BLANK PAGE
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of
the examination. It shows the basis on which Examiners were instructed to award marks. It does not
indicate the details of the discussions that took place at an Examiners’ meeting before marking began,
which would have considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner
Report for Teachers.
Cambridge will not enter into discussions about these mark schemes.
Cambridge is publishing the mark schemes for the October/November 2014 series for
most Cambridge IGCSE®, Cambridge International A and AS Level components and some
Cambridge O Level components.
2 Eight from:
Advantages:
Contains the knowledge of many experts
Provide permanent record of process
Can enhance his own knowledge
Produce results quicker/reduces time taken to produce results
Fewer errors in work
No need to check with other inspectors/geologists if in doubt over findings
No need to carry/have access to paper records/information/reference books
Disadvantages:
Can lead to demotivation/less thought process by operative
Inspectors need to be trained to use the system
Expert system follows rules while operative might have “insight”/use common sense
Expert system does not easily adapt to new/different conditions
Expert system needs to be up-to-date to provide the most useful information for the inspectors to
use
Updating may take the system offline and make it unavailable
3 Three from:
Analysing the geology of an area/location
Analyse/interpret the records/data of observations
Create a model describing the geology of the area e.g. rock boundaries/faults/water flow
Create a 3D representation of the area showing rock formations/likely mineral deposits/
fluid flow/oil in rocks/spaces between rocks [3]
Two from:
FTP: FTP client/application on laptop used to login in with user ID/password
Active or passive FTP mode selected depending on company server settings
Data type, e.g. ASCII/binary/EBCDIC, of data transfer determined
Mode, e.g. Stream/block/compressed, of data transfer selected [4]
Benefits:
Customers do not need to travel to make a booking so save travel costs/time
Customers can compare bookings with different companies
Customers can make bookings from anywhere
Customers can make bookings at any time
Customers has instant confirmation available
Reduced staff for branches/agents so saving money on salaries/wages
Customer base not restricted by time zones
Drawbacks:
Cannot authenticate customers for security purposes
No personal contact with customers/agents
Customers with special requirements may not be able to ask questions/get information online
Do not have street presence to attract new customers
Reliant on customers having internet access
(b) (i) The use of ICT/computer systems to intentionally deceive (others) for personal gain [1]
8 Two from:
Create Gantt charts
Create PERT charts
…helps to identify the short and long term targets for the task of creating the software
…helps to prioritise the tasks
…helps to create a critical path [2]
Weblog:
Have a chronological record of postings
Perception of greater access
Can have multimedia elements
Consumes time to create and update
Unfiltered/uncensored
Emails:
Emails sent to registered subscribers
Send emails with information/attachments of newsletters
Website:
Information posted
Online questionnaires collect views
Forum:
Can be accessed from anywhere
Have a large audience
Wide range of users produces range of ideas and views
Usually only text-based
Malicious postings could be possible
Moderators/administrators can censor postings
Difficult to identify posters of malicious postings
e-Petitions:
Petition is set up on (government/politician) website
Petition checked for authenticity to ensure that
…there is not one already on that topic
…it does not contain confidential, libellous, false or defamatory statements
…it does not contain offensive, joke or nonsense content
Petition is available for anyone to sign
Social networks:
Use of social networks for “branding”/public image of politicians
Use for voter registration – collecting names of voters
Allow voters/supporters to express opinions/make comments on social network pages
Encourage voters/supporters follow/engage with politicians [6]
Advantages:
Members can be from all over the world/anywhere/wider range of views or opinions available
Timings do not have to take account of travel time
Travel and accommodation do not have to be arranged or paid for
Use of moderators to ensure appropriate language/tone of contributions
Contributors cannot remain anonymous
No need to employ staff/researchers so reduced costs
Disadvantages:
Organiser/moderator has less influence over the discussion
Contributors/citizens need IT skills/access to IT facilities
Interaction between organiser/moderator is reduced
Members often contribute less online than face-to-face
Reactions of members cannot be observed easily [6]
[Total: 80]
Write your Centre number, candidate number and name on all the work you hand in.
Write in dark blue or black pen.
Do not use staples, paper clips, glue or correction fluid.
You may use an HB pencil for any diagrams, graphs or rough working.
DO NOT WRITE IN ANY BARCODES.
The number of marks is given in brackets [ ] at the end of each question or part question.
DC (NF) 100063
© UCLES 2014 [Turn over
2
Scenario 1
Questions 1, 2, 3, 4 and 5
International Exploration & Mining (IEM) is a multi-national company specialising in mineral prospecting.
Fergal is employed by the company as an inspector to visit and inspect geological sites in search of
deposits of mineral ores.
Fergal takes a laptop computer when visiting a potential site and uses it to record his findings.
IEM has created an expert system for use by their inspectors and geologists who can access it using
the Internet and the company network.
He uses his own knowledge and the company’s expert system to predict the likelihood of a particular
mineral ore being found in the location.
Fergal connects the laptop to the company network using the Internet to send back his findings and to
keep in regular contact with the company and other inspectors.
The company also uses Fergal’s findings and those of its other inspectors and geologists to construct
computer models to predict where mineral ore deposits might be found.
1 (a) Describe how the facts in the knowledge base of the company’s expert system would have
been obtained.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[4]
(b) Give two examples of the input data that would be needed from Fergal for use by the
company’s expert system.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...............................................................................................................................................[2]
2 Discuss the advantages and disadvantages to the inspectors of using an expert system for mineral
prospecting.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[8]
3 Describe three steps that are taken when constructing a computer model of an area being
prospected.
1 .......................................................................................................................................................
..........................................................................................................................................................
2 .......................................................................................................................................................
..........................................................................................................................................................
3 .......................................................................................................................................................
......................................................................................................................................................[3]
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
5 (a) Explain how each protocol shown below could be used to obtain information from the company
network.
http ............................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
FTP ...........................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[4]
(b) Describe two ways Fergal can ensure that his findings are kept secure while being transferred
to the company.
1 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[4]
(c) Describe how Fergal could use the Internet for keeping in contact with the company and with
other company inspectors.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[6]
Scenario 2
Questions 6, 7 and 8
Many people use online booking systems, online auctions and online transaction services.
A government agency has been set up to attempt to reduce the antisocial use of ICT and computer
fraud.
It is developing new security software to try to make people more confident about the security of their
personal data when using these services.
6 (a) Discuss the benefits and drawbacks of using the Internet to book tickets.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[6]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[1]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[4]
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[8]
8 Describe how timeline software would help the agency when creating its new security software.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[2]
Scenario 3
Questions 9, 10 and 11
A regional government has asked Iqbal (a website designer), to create a new website which will include
facilities for:
A new road is to be built through the region. The website facilities will allow citizens to register their
details and to have more influence on their political representatives during the building of this road.
Before the website is implemented, Iqbal must be confident that there are no security issues and must
appoint moderators for the online focus group.
9 Describe three different security problems and three different solutions that Iqbal must consider
before implementing the website.
Problem 1 .........................................................................................................................................
..........................................................................................................................................................
Solution 1 .........................................................................................................................................
..........................................................................................................................................................
Problem 2 .........................................................................................................................................
..........................................................................................................................................................
Solution 2 .........................................................................................................................................
..........................................................................................................................................................
Problem 3 .........................................................................................................................................
..........................................................................................................................................................
Solution 3 .........................................................................................................................................
......................................................................................................................................................[6]
10 Describe how, other than using focus groups, political representatives could use the Internet to
communicate with, and gather feedback from, citizens.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[6]
11 Iqbal will also organise an online focus group to discuss the building of the new road.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
(b) Discuss the advantages and disadvantages of using an online focus group to find out what
people think about the plans for the road.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[6]
BLANK PAGE
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of
the examination. It shows the basis on which Examiners were instructed to award marks. It does not
indicate the details of the discussions that took place at an Examiners’ meeting before marking began,
which would have considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner
Report for Teachers.
Cambridge will not enter into discussions about these mark schemes.
Cambridge is publishing the mark schemes for the October/November 2014 series for
most Cambridge IGCSE®, Cambridge International A and AS Level components and some
Cambridge O Level components.
2 Eight from:
Advantages:
Contains the knowledge of many experts
Provide permanent record of process
Can enhance his own knowledge
Produce results quicker/reduces time taken to produce results
Fewer errors in work
No need to check with other inspectors/geologists if in doubt over findings
No need to carry/have access to paper records/information/reference books
Disadvantages:
Can lead to demotivation/less thought process by operative
Inspectors need to be trained to use the system
Expert system follows rules while operative might have “insight”/use common sense
Expert system does not easily adapt to new/different conditions
Expert system needs to be up-to-date to provide the most useful information for the inspectors to
use
Updating may take the system offline and make it unavailable
3 Three from:
Analysing the geology of an area/location
Analyse/interpret the records/data of observations
Create a model describing the geology of the area e.g. rock boundaries/faults/water flow
Create a 3D representation of the area showing rock formations/likely mineral deposits/
fluid flow/oil in rocks/spaces between rocks [3]
Two from:
FTP: FTP client/application on laptop used to login in with user ID/password
Active or passive FTP mode selected depending on company server settings
Data type, e.g. ASCII/binary/EBCDIC, of data transfer determined
Mode, e.g. Stream/block/compressed, of data transfer selected [4]
Benefits:
Customers do not need to travel to make a booking so save travel costs/time
Customers can compare bookings with different companies
Customers can make bookings from anywhere
Customers can make bookings at any time
Customers has instant confirmation available
Reduced staff for branches/agents so saving money on salaries/wages
Customer base not restricted by time zones
Drawbacks:
Cannot authenticate customers for security purposes
No personal contact with customers/agents
Customers with special requirements may not be able to ask questions/get information online
Do not have street presence to attract new customers
Reliant on customers having internet access
(b) (i) The use of ICT/computer systems to intentionally deceive (others) for personal gain [1]
8 Two from:
Create Gantt charts
Create PERT charts
…helps to identify the short and long term targets for the task of creating the software
…helps to prioritise the tasks
…helps to create a critical path [2]
Weblog:
Have a chronological record of postings
Perception of greater access
Can have multimedia elements
Consumes time to create and update
Unfiltered/uncensored
Emails:
Emails sent to registered subscribers
Send emails with information/attachments of newsletters
Website:
Information posted
Online questionnaires collect views
Forum:
Can be accessed from anywhere
Have a large audience
Wide range of users produces range of ideas and views
Usually only text-based
Malicious postings could be possible
Moderators/administrators can censor postings
Difficult to identify posters of malicious postings
e-Petitions:
Petition is set up on (government/politician) website
Petition checked for authenticity to ensure that
…there is not one already on that topic
…it does not contain confidential, libellous, false or defamatory statements
…it does not contain offensive, joke or nonsense content
Petition is available for anyone to sign
Social networks:
Use of social networks for “branding”/public image of politicians
Use for voter registration – collecting names of voters
Allow voters/supporters to express opinions/make comments on social network pages
Encourage voters/supporters follow/engage with politicians [6]
Advantages:
Members can be from all over the world/anywhere/wider range of views or opinions available
Timings do not have to take account of travel time
Travel and accommodation do not have to be arranged or paid for
Use of moderators to ensure appropriate language/tone of contributions
Contributors cannot remain anonymous
No need to employ staff/researchers so reduced costs
Disadvantages:
Organiser/moderator has less influence over the discussion
Contributors/citizens need IT skills/access to IT facilities
Interaction between organiser/moderator is reduced
Members often contribute less online than face-to-face
Reactions of members cannot be observed easily [6]
[Total: 80]
Write your Centre number, candidate number and name on all the work you hand in.
Write in dark blue or black pen.
Do not use staples, paper clips, glue or correction fluid.
You may use an HB pencil for any diagrams, graphs or rough working.
DO NOT WRITE IN ANY BARCODES.
The number of marks is given in brackets [ ] at the end of each question or part question.
DC (NF/FD) 101215/3
© UCLES 2015 [Turn over
2
Scenario 1
Questions 1, 2, 3 and 4
East African Media Ltd, based in Nairobi, owns the African Times newspaper. It has built a new printing
plant in Mombasa, many kilometres away. The company also has a factory which manufactures rolls of
paper (newsprint) which are used to produce the newspaper.
The printing plant needs a constant room temperature for the printing presses to operate in.
To keep the temperature constant a microprocessor controlled air conditioning system is used.
Many of its reporters work in towns which are far away from the editor’s office in Nairobi.
They type up their stories and send them with any photographs by email to their editor.
The editor then sets the layout of the story using typesetting techniques on a computer.
East African Media Ltd uses the latest technology to print the newspaper. In order to print the paper in
Mombasa it requires the use of facsimile transmission. The company uses satellite communications to
fax a newspaper for printing.
9DOYH
&RQGHQVLQJXQLW (YDSRUDWLQJXQLW
&RPSUHVVRU
converts cool low-pressure gas into hot high-pressure gas.
converts cool low-pressure gas into hot high-pressure gas.
converts cool low-pressure gas into hot high-pressure gas.
2 Tick the four statements referring to process control in this scenario which are true.
True
Keeping a constant temperature for the printing presses is an example of batch
process control.
Batch process control is used to produce extremely large amounts of product per
year.
A PLC could be used to control the temperature for the printing presses.
[4]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [3]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [3]
4 (a) Describe how the reporters would use ICT to produce their stories ready for emailing to the
editor’s office.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [3]
(b) Describe the features of typesetting that the editor would use.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [3]
(c) Describe how a completed page would be transmitted from the editor’s office to the printing
presses in Mombasa.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [2]
Scenario 2
Questions 5, 6 and 7
It wishes to advertise:
• all aspects of the company
• the car insurance it sells
• the new model of car.
Some workers in the advertising department work compressed hours whilst others work flexible hours.
Maria is the manager of the car assembly plant. She uses time management software in her work.
5 (a) For each example below name and describe the type of advertising that would be used.
For each type of advertising named, describe an example other than those used in the
scenario.
WIMBA ......................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Insurance ..................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [6]
(b) A number of input devices are used to import information about the company and its cars for
inclusion in the website.
Describe, in detail, examples of multimedia information that would be imported using two
different input devices for inclusion in the website.
1 ...............................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
2 ...............................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [2]
(c) Describe four benefits to the company of creating their own advertising website.
1 ...............................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
2 ...............................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
3 ...............................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
4 ...............................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [4]
(d) Describe the differences between pop ups and pop unders.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [4]
6 (a) Describe the differences between working flexible hours and working compressed hours.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [4]
1 ...............................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
2 ...............................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [2]
(c) Describe two benefits to the company of workers working flexible hours.
1 ...............................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
2 ...............................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [2]
7 Maria uses a Gantt chart similar to the one below to plan the assembly of a car.
Fitting of chassis
Quality control
...................................................................................................................................................
.............................................................................................................................................. [1]
...................................................................................................................................................
.............................................................................................................................................. [1]
(c) The stage of assembling the car body has been delayed by six hours. Describe, in detail, the
effects on each of the other activities in the Gantt chart.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [4]
Scenario 3
Questions 8, 9, 10 and 11
Mendoza Electricity Group (MEG) is a company in Argentina which sells electricity to its customers.
The company operates a call centre for customers who have questions about their bill or wish to pay
their bills by phone using a credit or debit card. The call centre uses third party control.
Each customer has been given a twelve digit account number by MEG.
The company has a computerised system for producing bills. The company likes to update its master
file every week in terms of amendments, addition and deletion of records.
Every three months (quarter) the bills are produced using the batch processing of the master and
transaction files. No customer pays more than 16000 pesos.
The company has employed Andrew, a systems analyst, to update the existing system. He will design
validation rules to ensure the account numbers entered and the bill calculated are valid.
1 ......................................................................................................................................................
..........................................................................................................................................................
2 ......................................................................................................................................................
..........................................................................................................................................................
3 ......................................................................................................................................................
..........................................................................................................................................................
4 ......................................................................................................................................................
..................................................................................................................................................... [4]
9 (a) Identify four items of information, apart from the account number that a customer would be
asked for if they were paying their bill by credit card.
1 ...............................................................................................................................................
...................................................................................................................................................
2 ...............................................................................................................................................
...................................................................................................................................................
3 ...............................................................................................................................................
...................................................................................................................................................
4 ...............................................................................................................................................
.............................................................................................................................................. [4]
(b) Describe the processing that would take place to produce the customer’s quarterly bill.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [4]
10 (a) MEG stores the master file and transaction file on magnetic tape.
Explain why the company uses magnetic tape.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [2]
(b) For each of these updating activities give one example related to the scenario.
Amendment ..............................................................................................................................
...................................................................................................................................................
Addition .....................................................................................................................................
...................................................................................................................................................
Deletion .....................................................................................................................................
.............................................................................................................................................. [3]
11 (a) After information has been collected about the existing system, Andrew will need to record it.
He could use Data Flow Diagrams or Systems Flowcharts.
Describe these methods.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [3]
1 ...............................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
2 ...............................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
3 ...............................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [6]
(c) Improvements may need to be made if the results of testing shows that the validation rules
still allow invalid data to be input.
Describe with examples three such improvements.
1 ...............................................................................................................................................
...................................................................................................................................................
2 ...............................................................................................................................................
...................................................................................................................................................
3 ...............................................................................................................................................
.............................................................................................................................................. [3]
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable
effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will
be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.
Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.
Cambridge will not enter into discussions about these mark schemes.
Cambridge is publishing the mark schemes for the May/June 2015 series for most
Cambridge IGCSE®, Cambridge International A and AS Level components and some
Cambridge O Level components.
1 (a) [1]
(b) [1]
(c) [1]
2 [4]
5 (a) WIMBA
Business [1]
Advertising of a single company + example [1]
Insurance
Service [1]
Advertising of services such as government/tourism/banking [1]
Video of the car/company could be imported from video camera/ digital camera
Vocal introduction to company could be input using microphone
pop ups from the other company’s site may create unhappy customers who may avoid that
company in future/will have poor impression of the company/will tend to ignore them
Customers will use pop-up blocking (software) which does not allow their advertising on
other company’s website to appear
Can make their own website better suited to their needs
Own website has shorter delay in updating/improving advertising
Company has more control over its own website than it would over the host’s website
May be so many other companies’ advertising on host website the company’s may not be
seen/not as much advertising can be used/limited space available
Pop-ups are small windows which suddenly appear in front of the web page user is working
on/pop-unders are small windows placed underneath the web page user is working on
Pop-up instantly grabs the attention of the customer/Pop-unders don’t appear to users until
they close the page they are working on.
Pop-unders are not removed by pop-up blocking/pop ups are blocked by pop up blocking
software
Flexible hours refer to hours that are worked whereas compressed hours refer to days that
are worked
Flexible hours give workers some choice about what times of each day they work
Flexible hours can vary from day to day
Compressed hours would be fixed for those days which were being worked fully
Workers work the same number of hours each week with flexible hours
If compressed hours were spread over two weeks, would work more hours one week than
the next
Allows workers to organise their working lives to suit their personal needs
Can choose to work off-peak hours as travelling to work outside peak times is easier and
cheaper
If workers stay late to finish a job, they can take time off at a later date
If the job requires great concentration, it can be done at quiet times of day
Or two of:
Card number
Expiry date
Name (as shown on card)
Card Security Code
Address
Magnetic tape has serial access and the files would be sequential/batch processing required
Tapes have a greater longevity than most other media
Tapes are cheaper per unit of memory
(b) Amendment
Customers’ details change [1]
Addition
New customer [1]
Deletion
Customer closes account/dies [1]
System flowcharts
Using particular input, output, storage and processing symbols
The diagram would represent inputs, outputs and processing (only if not given for DFDs)
(Use of live/normal data) such as a number between 0 and 16000 for the bill
(Use of live/normal data) such as a customer number which is exactly 12 characters
(Use of live/normal data) such as a customer number which is digits only
This data should be accepted by the system
Two from:
Two from:
Amend rule to ensure the acceptable value for the bill is >= and <= and not just > and <
Amend rule to ensure that it uses 0 to 16000
Amend rule to ensure it checks it is numeric
Amend rule to make sure < has not been used instead of > and vice versa
Amend rule to ensure length check is 12 exactly
Field descriptions are included which adequately inform about field contents
Write your Centre number, candidate number and name on all the work you hand in.
Write in dark blue or black pen.
Do not use staples, paper clips, glue or correction fluid.
You may use an HB pencil for any diagrams, graphs or rough working.
DO NOT WRITE IN ANY BARCODES.
The number of marks is given in brackets [ ] at the end of each question or part question.
DC (NH) 101216/2
© UCLES 2015 [Turn over
2
Scenario 1
Questions 1, 2 and 3
Computer Assist is a company that provides computing facilities for disabled people.
The computers allow disabled people to access the internet to view websites and to use commercial
and government online services.
The company provides additional, specialised hardware for its computers and specialised software is
installed for use by disabled people.
1 (a) Describe how disabled people could use specialist software to convert between text and
speech.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[4]
(b) Name and describe two other methods that can assist disabled people to enter data into a
computer.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[4]
2 Explain how access by disabled people to each of the following services has been increased by
use of the internet.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[4]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[4]
3 Describe three features of some websites that could make it difficult for viewing by visually
impaired people.
1 .......................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
2 .......................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
3 .......................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[6]
Scenario 2
Questions 4, 5, 6, 7 and 8
The shops are connected to a computerised stock control system using Point of Sale (POS) terminals.
Desirable Outfits supplies its shops from a central warehouse and uses a computerised ‘just-in-time’
stock control system.
Desirable Outfits wants to increase its sales by advertising in the media using newspapers, radio and
television.
Desirable Outfits uses mailmerge to contact selected customers about a new clothing range.
Mahmoud has been invited for interview at head office and will need to travel by train.
4 (a) Describe the steps that Mahmoud would take in order to buy a train ticket online.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[5]
(b) Discuss the benefits and drawbacks of buying train tickets online.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[6]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
(b) Describe the benefits and drawbacks to Desirable Outfits of using a computerised ‘just-in-
time’ stock control system.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[6]
6 Describe how variable fields are set up in the mailmerge to control the selection of customers who
will receive the information about the new clothing range.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[4]
7 (a) Describe how hardware and software are used in a computerised automatic stock control
system linked to POS terminals.
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[2]
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[2]
(b) Describe the processing carried out by a computerised stock control system.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[6]
8 Describe three ways that Desirable Outfits could carry out market research to find out the
effectiveness of its advertising in the media.
1 .......................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
2 .......................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
3 .......................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[6]
Scenario 3
Questions 9, 10, 11 and 12
Colin is a network administrator responsible for a company network that allows employees to access
its facilities from within the company buildings and from outside. The company uses dedicated cabling
within its buildings.
The network is used by employees who work in the company buildings and there is an extranet for use
by employees who work from home and when travelling on business.
Colin uses Telnet and Secure Shell (SSH) for maintaining and administering the computers and servers
on the network. Telnet and SSH are network protocols used in some client server systems.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[5]
(c) Explain why the company uses dedicated cabling for its network.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[3]
11 Explain why Colin prefers to use SSH rather than Telnet for administering the network.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[3]
12 Name and describe the features of two protocols, other than SSH and Telnet, that could be used
on the network to transfer data.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[4]
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable
effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will
be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.
Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of
the examination. It shows the basis on which Examiners were instructed to award marks. It does not
indicate the details of the discussions that took place at an Examiners’ meeting before marking began,
which would have considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner
Report for Teachers.
Cambridge will not enter into discussions about these mark schemes.
Cambridge is publishing the mark schemes for the May/June 2015 series for most
Cambridge IGCSE®, Cambridge International A and AS Level components and some
Cambridge O Level components.
Sticky keys: no need to press two keys at once/press first key followed by second to get
action
Filter keys: ignores brief or repeated key presses
Head pointer: have a camera on top of monitor to detect head movements/physical device on
head to tap keys
Overlay (concept) keyboard: overlay with larger characters that can be easily picked out
Magnifier/Zoom software: to enlarge text/areas of the screen so that these can be seen
better
Predictive text: to complete/suggest words/sentences from a few characters/words
Guaranteed a seat
No double booking
Choose lowest price/compare prices
Easier to choose route
Easier to choose time
Goods not delivered to the shop exactly on time/in the correct amounts could adversely
affect the sales in shops
Shop has to anticipate projected sales so orders can be placed in time for delivery
The warehouse may not be able to immediately meet the requirements of a massive and
unexpected order from a shop
…since it has few or no stocks available/left after orders from other shops
…a road traffic problem/transport problem/natural disaster could impede the flow of goods to
the shop from the warehouse so goods do not arrive/are late in arrival
A (computer) network/intranet
…with controlled access from outside the intranet
Benefits:
Allows customers to access facilities of intranet/website
Allows employees to access facilities of intranet/website
Allows suppliers to access facilities of intranet/website
Exchange data using Electronic Data Interchange (EDI)
Share product catalogues exclusively with other traders
Collaborate with other companies on joint designs
Provide or access services provided by one company to a group of other companies, e.g. an
online banking application managed by one company on behalf of affiliated banks
Drawbacks:
Extranets can be expensive to implement and maintain within an organisation
… (e.g. hardware, software, employee training costs)
…by an external application service provider
Security issues are of concern if the data is valuable
SSH enables secure exchange of data between computers when using unsecured networks such
as the internet
SSH enables log into remote computer to execute commands on remote computer/server
Telnet is insecure/SSH is more secure
SSH uses encryption
…uses public key authentication/key needed for decryption
…data if intercepted cannot be read
UDP
…does not require hand-shaking
…before data can be transferred
…data sent to address of computer
…no checking that data has arrived
TCP/IP
…defines the packet structure
…allows routing of packets
HTTP
…used to transfer data for web pages
FTP
…peer to peer transfer of files
Write your Centre number, candidate number and name on all the work you hand in.
Write in dark blue or black pen.
Do not use staples, paper clips, glue or correction fluid.
You may use an HB pencil for any diagrams, graphs or rough working.
DO NOT WRITE IN ANY BARCODES.
The number of marks is given in brackets [ ] at the end of each question or part question.
DC (NF) 101349/3
© UCLES 2015 [Turn over
2
Scenario 1
Questions 1, 2 and 3.
Stoner school has a cabled local area network (LAN) and a wireless local area network (WLAN) that
allows users to share peripherals, to exchange data and to access the internet.
A user is required to provide a UserID (user name) and a password when logging into the network.
1 (a) Describe how the UserID (user name) is processed to allow the user to gain access to the
network.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [3]
(b) Describe how the entry of a password by a user completes the login process.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [3]
2 (a) Describe two benefits to staff and students of using the WLAN.
1 ...............................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
2 ...............................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [4]
(b) Describe two drawbacks to staff and students of using the WLAN.
1 ...............................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
2 ...............................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [4]
3 Tick one box in each table to choose the most appropriate protocol for each of the tasks listed.
()
FTP
https
SSH
Telnet
UDP
[1]
()
FTP
https
SSH
Telnet
UDP
[1]
()
FTP
https
SSH
Telnet
UDP
[1]
()
FTP
https
SSH
Telnet
UDP
[1]
Scenario 2
Questions 4, 5, 6, 7 and 8.
The bridge will be modelled in a computer system and a scale model prototype will be built before the
real bridge is constructed.
Computer Aided Design and Computer Aided Manufacture software (CAD/CAM) will be used to create
the prototype.
A mainframe computer will be used to create and test a computer model of the bridge.
Project management software is to be used to create a project plan for the building of the bridge.
4 Describe how features of CAD/CAM could be used to create the prototype of the bridge for testing.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..................................................................................................................................................... [8]
5 Explain why a mainframe computer was chosen to create and test a computer model of the bridge.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..................................................................................................................................................... [2]
© UCLES 2015 9713/32/M/J/15
9
6 (a) Describe two advantages of using a computer model to test the bridge.
1 ...............................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
2 ...............................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [2]
(b) Describe two disadvantages of using a computer model to test the bridge.
1 ...............................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
2 ...............................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [2]
7 Describe two features of project management software that could be used to organise the stages
of the planning and construction of the bridge.
1 ......................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
2 ......................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..................................................................................................................................................... [4]
8 Designing and testing a prototype are two stages in the construction project that must be scheduled
in the project plan.
State three other stages in the bridge construction that must be scheduled.
1 ......................................................................................................................................................
..........................................................................................................................................................
2 ......................................................................................................................................................
..........................................................................................................................................................
3 ......................................................................................................................................................
..................................................................................................................................................... [3]
Scenario 3
Questions 9, 10, 11 and 12.
Governments provide online facilities to increase access to employment opportunities and to health,
legal and political services.
The digital divide is the gap between individuals and groups of people who are able to make effective
use of ICT and those who are not able to do so.
The digital divide affects many areas including access to health services and employment opportunities.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..................................................................................................................................................... [4]
10 Explain how the digital divide can limit people’s employment opportunities.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..................................................................................................................................................... [8]
11 Discuss the benefits and drawbacks of individuals being able to access legal information online.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
.…….….………..................……………………………………..………………….………………............
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..................................................................................................................................................... [8]
12 Explain how the digital divide can affect access to health services.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..................................................................................................................................................... [5]
Scenario 4
Questions 13, 14 and 15.
Sensors are used to collect data about physical variables. The data is sent to a computer for storage
and analysis.
Weather stations use sensors to collect data about the weather such as the temperature and barometric
pressure.
Hospitals use sensors to collect data, such as body temperature and blood pressure, which are used
by computers for monitoring patients in intensive care units.
13 Other than sensors for measuring temperature and barometric pressure, state four sensors that
could be used when monitoring the weather and describe a use for each.
1 ......................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
2 ......................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
3 ......................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
4 ......................................................................................................................................................
..........................................................................................................................................................
..................................................................................................................................................... [4]
14 Describe how the data from sensors could be used for monitoring a patient in an intensive care
unit.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..................................................................................................................................................... [4]
15 Explain the benefits and drawbacks of monitoring patients using computers in an intensive care
unit.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..................................................................................................................................................... [8]
BLANK PAGE
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable
effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will
be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.
Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of
the examination. It shows the basis on which Examiners were instructed to award marks. It does not
indicate the details of the discussions that took place at an Examiners’ meeting before marking began,
which would have considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner
Report for Teachers.
Cambridge will not enter into discussions about these mark schemes.
Cambridge is publishing the mark schemes for the May/June 2015 series for most
Cambridge IGCSE®, Cambridge International A and AS Level components and some
Cambridge O Level components.
()
FTP
https
SSH
Telnet
UDP
()
FTP
https
SSH
Telnet
UDP
()
FTP
https
SSH
Telnet
UDP
()
FTP
https
SSH
Telnet
UDP
Benefits:
access to legal information from e.g. home
no need to book an appointment with lawyer
...some people may be intimidated by lawyers
...reduced costs e.g. travel costs
access to legal information without having to pay law firms
can access the information whenever it is convenient
access to information on family matters e.g. divorce, child care without visiting a lawyer
access to advice on e.g. house purchases without paying estate agents fees
access to changes in regulations and laws/updated regulations and laws
online consultations with lawyers to get personalised advice
Drawbacks:
legal advice may be misinterpreted/not understood
online data may be deliberately altered to mislead
unqualified people may use advice and mislead others
individuals may not be able to find/make of all the relevant information
Benefits:
automatic recording of data from patient for review
automatic chart production for reports/analysis by medical staff
remote monitoring of patient
...nurses can be alerted quickly
computers can monitor more than one variable per patient simultaneously
computers can monitor many patients at once
...nurses can supervise/watch over many patients at once
...nurses are freed up to other tasks
patients monitored 24/7
patients monitored continuously
Drawbacks:
patient does not get personal care
not all parameters may be monitored (e.g. blood sugar level)
alarm may be overlooked/ignored
cost of equipment purchase/maintenance
power failure/computer failure can cause loss of data/monitoring/affect patient safety
Write your Centre number, candidate number and name on all the work you hand in.
Write in dark blue or black pen.
Do not use staples, paper clips, glue or correction fluid.
You may use an HB pencil for any diagrams, graphs or rough working.
DO NOT WRITE IN ANY BARCODES.
The number of marks is given in brackets [ ] at the end of each question or part question.
DC (FD) 110077
© UCLES 2015 [Turn over
2
Scenario 1
Questions 1, 2 and 3
Computer Assist is a company that provides computing facilities for disabled people.
The computers allow disabled people to access the internet to view websites and to use commercial
and government online services.
The company provides additional, specialised hardware for its computers and specialised software is
installed for use by disabled people.
1 (a) Describe how disabled people could use specialist software to convert between text and
speech.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[4]
(b) Name and describe two other methods that can assist disabled people to enter data into a
computer.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[4]
2 Explain how access by disabled people to each of the following services has been increased by
use of the internet.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[4]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[4]
3 Describe three features of some websites that could make it difficult for viewing by visually
impaired people.
1 .......................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
2 .......................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
3 .......................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[6]
Scenario 2
Questions 4, 5, 6, 7 and 8
The shops are connected to a computerised stock control system using Point of Sale (POS) terminals.
Desirable Outfits supplies its shops from a central warehouse and uses a computerised ‘just-in-time’
stock control system.
Desirable Outfits wants to increase its sales by advertising in the media using newspapers, radio and
television.
Desirable Outfits uses mailmerge to contact selected customers about a new clothing range.
Mahmoud has been invited for interview at head office and will need to travel by train.
4 (a) Describe the steps that Mahmoud would take in order to buy a train ticket online.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[5]
(b) Discuss the benefits and drawbacks of buying train tickets online.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[6]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
(b) Describe the benefits and drawbacks to Desirable Outfits of using a computerised ‘just-in-
time’ stock control system.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[6]
6 Describe how variable fields are set up in the mailmerge to control the selection of customers who
will receive the information about the new clothing range.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[4]
7 (a) Describe how hardware and software are used in a computerised automatic stock control
system linked to POS terminals.
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[2]
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[2]
(b) Describe the processing carried out by a computerised stock control system.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[6]
8 Describe three ways that Desirable Outfits could carry out market research to find out the
effectiveness of its advertising in the media.
1 .......................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
2 .......................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
3 .......................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[6]
Scenario 3
Questions 9, 10, 11 and 12
Colin is a network administrator responsible for a company network that allows employees to access
its facilities from within the company buildings and from outside. The company uses dedicated cabling
within its buildings.
The network is used by employees who work in the company buildings and there is an extranet for use
by employees who work from home and when travelling on business.
Colin uses Telnet and Secure Shell (SSH) for maintaining and administering the computers and servers
on the network. Telnet and SSH are network protocols used in some client server systems.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[5]
(c) Explain why the company uses dedicated cabling for its network.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[3]
11 Explain why Colin prefers to use SSH rather than Telnet for administering the network.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[3]
12 Name and describe the features of two protocols, other than SSH and Telnet, that could be used
on the network to transfer data.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[4]
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable
effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will
be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.
Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of
the examination. It shows the basis on which Examiners were instructed to award marks. It does not
indicate the details of the discussions that took place at an Examiners’ meeting before marking began,
which would have considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner
Report for Teachers.
Cambridge will not enter into discussions about these mark schemes.
Cambridge is publishing the mark schemes for the May/June 2015 series for most
Cambridge IGCSE®, Cambridge International A and AS Level components and some
Cambridge O Level components.
Sticky keys: no need to press two keys at once/press first key followed by second to get
action
Filter keys: ignores brief or repeated key presses
Head pointer: have a camera on top of monitor to detect head movements/physical device on
head to tap keys
Overlay (concept) keyboard: overlay with larger characters that can be easily picked out
Magnifier/Zoom software: to enlarge text/areas of the screen so that these can be seen
better
Predictive text: to complete/suggest words/sentences from a few characters/words
Guaranteed a seat
No double booking
Choose lowest price/compare prices
Easier to choose route
Easier to choose time
Goods not delivered to the shop exactly on time/in the correct amounts could adversely
affect the sales in shops
Shop has to anticipate projected sales so orders can be placed in time for delivery
The warehouse may not be able to immediately meet the requirements of a massive and
unexpected order from a shop
…since it has few or no stocks available/left after orders from other shops
…a road traffic problem/transport problem/natural disaster could impede the flow of goods to
the shop from the warehouse so goods do not arrive/are late in arrival
A (computer) network/intranet
…with controlled access from outside the intranet
Benefits:
Allows customers to access facilities of intranet/website
Allows employees to access facilities of intranet/website
Allows suppliers to access facilities of intranet/website
Exchange data using Electronic Data Interchange (EDI)
Share product catalogues exclusively with other traders
Collaborate with other companies on joint designs
Provide or access services provided by one company to a group of other companies, e.g. an
online banking application managed by one company on behalf of affiliated banks
Drawbacks:
Extranets can be expensive to implement and maintain within an organisation
… (e.g. hardware, software, employee training costs)
…by an external application service provider
Security issues are of concern if the data is valuable
SSH enables secure exchange of data between computers when using unsecured networks such
as the internet
SSH enables log into remote computer to execute commands on remote computer/server
Telnet is insecure/SSH is more secure
SSH uses encryption
…uses public key authentication/key needed for decryption
…data if intercepted cannot be read
UDP
…does not require hand-shaking
…before data can be transferred
…data sent to address of computer
…no checking that data has arrived
TCP/IP
…defines the packet structure
…allows routing of packets
HTTP
…used to transfer data for web pages
FTP
…peer to peer transfer of files
Write your Centre number, candidate number and name on all the work you hand in.
Write in blue or black pen.
Do not use staples, paper clips, glue or correction fluid.
You may use a pencil for any diagrams, graphs or rough working.
DO NOT WRITE IN ANY BARCODES.
The number of marks is given in brackets [ ] at the end of each of each question or part question.
DC (LEG/FD) 101217/3
© UCLES 2015 [Turn over
2
Scenario 1
Questions 1, 2, 3, 4 and 5
XYA is a company in a developing country that buys and sells steel. They employ a number of sales
staff to phone potential customers in order to sell their steel.
They are seeking to save costs and have asked a number of their sales staff to work from home.
Temperatures are fairly low in the winter so sales staff tend to have central heating systems in their
homes.
Regular staff meetings are planned to take place using phone conferencing which the manager Ibrahim
will organise.
1 Tick the four statements which are benefits to the company of workers working from home.
Benefit
Workers will not have to work as hard as if they were in an office
It is easier to get all the workers together for meetings and briefings
It would be easier for managers to supervise workers
Not so much money would have to be spent on the company’s utility bills
There would be no distractions for workers preventing them from working
Lower costs as company can rent smaller offices
The workforce would probably be happier so there would be improved motivation
to work and increased productivity
It would be easier to sell steel
The cost to the company of the phone calls would be cheaper as home phone
charges are lower
More staff would be retained so money would not have to be spent on training
new staff
[4]
2 Tick the four statements which are benefits to the company of using staff to make phone sales
rather than advertising on a website.
Benefit
You can reach a larger audience by phone than by using a website
3 Describe how a microprocessor makes use of the data from a temperature sensor to control a
central heating system.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[3]
4 Each sales person would need a PC and a monitor. They will need additional hardware and
software to allow them to work from home.
(a) Name, and describe the use of, three additional items of hardware. Each use must be different.
1 .................................................................................................................................................
...................................................................................................................................................
2 .................................................................................................................................................
...................................................................................................................................................
3 .................................................................................................................................................
...............................................................................................................................................[3]
(b) Name, and describe the use of, three items of software. Each use must be different.
1 .................................................................................................................................................
...................................................................................................................................................
2 .................................................................................................................................................
...................................................................................................................................................
3 .................................................................................................................................................
...............................................................................................................................................[3]
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[4]
Scenario 2
Questions 6 and 7
A geography teacher wants to use computers to help students improve their learning and help with her
lesson preparation.
6 Describe the use of each of the following types of software that the geography teacher would use
to prepare materials for her lessons. Each use must be different.
Spreadsheet .....................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
DTP ..................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[4]
7 Discuss the benefits and drawbacks to teachers and students of using computers in lessons to aid
teaching and learning.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[6]
Scenario 3
Questions 8, 9, 10, 11 and 12
RockICT has decided to combine its staff records. It currently has separate computerised personal and
payroll details of all its staff.
The payroll system runs using all the data on a weekly basis. Workers are paid according to how many
hours they work in a week. On the new system human resources staff will need to be able to access
records quickly.
Joanne, a systems analyst, has collected a large amount of information about the existing system. The
information will be analysed before the system is designed.
RockICT requires its workers to have a duty of fidelity. It also has to follow government data protection
rules when storing data about its workers.
RockICT has hired Arty, an art and design company to produce CD covers for the albums its musicians
produce.
8 (a) Give three items of information, not related to their pay, that will need to be stored on the
master file about each member of RockICT staff.
1 .................................................................................................................................................
...................................................................................................................................................
2 .................................................................................................................................................
...................................................................................................................................................
3 .................................................................................................................................................
...............................................................................................................................................[3]
(b) Label the components of the following systems flowchart to show how the master file is
updated.
................................
Old master file
................................
.......................................
.......................................
................................ ................................
................................ ................................
[4]
9 (a) Describe in detail two ways that Joanne will use a data flow diagram to identify suitable
hardware for the new system.
1 .................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
2 .................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[4]
(b) Describe how Joanne will identify the user and system requirements for the new system.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[4]
10 (a) Describe what is meant by the indexed sequential method of storing data.
Give reasons why it would be suitable in this scenario.
Indicate which storage medium would be most appropriate to use.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[6]
(b) Joanne will need to design the file structure of the new system.
Describe six steps involved in designing the file structure, without referring to the indexed
sequential method of storing data.
1 .................................................................................................................................................
...................................................................................................................................................
2 .................................................................................................................................................
...................................................................................................................................................
3 .................................................................................................................................................
...................................................................................................................................................
4 .................................................................................................................................................
...................................................................................................................................................
5 .................................................................................................................................................
...................................................................................................................................................
6 .................................................................................................................................................
...............................................................................................................................................[6]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
(b) Describe four rules which would be included in data protection legislation.
1 .................................................................................................................................................
...................................................................................................................................................
2 .................................................................................................................................................
...................................................................................................................................................
3 .................................................................................................................................................
...................................................................................................................................................
4 .................................................................................................................................................
...............................................................................................................................................[4]
(c) Apart from following data protection rules and having a duty of fidelity, explain the
responsibilities of the company and its workers with regard to the privacy of payroll data.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[4]
12 Arty use graphics software to change images that have been imported into the software.
(a) Name and describe two input devices which are used to import images for use in the CD
covers.
1 .................................................................................................................................................
...................................................................................................................................................
2 .................................................................................................................................................
...............................................................................................................................................[4]
(b) Name and describe four features of the graphics software used when changing the images.
1 .................................................................................................................................................
...................................................................................................................................................
2 .................................................................................................................................................
...................................................................................................................................................
3 .................................................................................................................................................
...................................................................................................................................................
4 .................................................................................................................................................
...............................................................................................................................................[4]
(c) Describe two sources of images which would accompany the software when bought.
1 .................................................................................................................................................
...................................................................................................................................................
2 .................................................................................................................................................
...............................................................................................................................................[2]
(d) The printing of the CD covers is now computer controlled. Describe two effects this had on
the workers who used to be involved in the printing process.
1 .................................................................................................................................................
...................................................................................................................................................
2 .................................................................................................................................................
...............................................................................................................................................[2]
BLANK PAGE
BLANK PAGE
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable
effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will
be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.
Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of
the examination. It shows the basis on which Examiners were instructed to award marks. It does not
indicate the details of the discussions that took place at an Examiners’ meeting before marking began,
which would have considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner
Report for Teachers.
Cambridge will not enter into discussions about these mark schemes.
Cambridge is publishing the mark schemes for the May/June 2015 series for most
Cambridge IGCSE®, Cambridge International A and AS Level components and some
Cambridge O Level components.
1 [4]
It is easier to get all the workers together for meetings and briefings
2 [4]
You can reach a larger audience by phone than by using a website
They will know accurately how many sales they have made
Advantages
You can see the facial expressions/body language of other participants
You can see/amend/share documents that you want to discuss with each other
Easier to identify whose turn it is/who wants to contribute next
Once equipment is bought less expensive to run/set up/organise than a phone conference
Disadvantages
More expensive to buy hardware/software
If there are problems with internet connection, conference may be interrupted
More equipment needed so greater chance of problems
Benefits
ICT make lessons more interesting/entertaining
ICT make lessons more varied
Internet allows students to investigate ideas
Internet allows students to carry out research
Neatness of students work makes it easier for teacher to mark
ICT provides a more interactive learning environment
Teachers can spend less time with students with special needs because of ICT resources/
ICT resources can help students with special needs
Teachers have more varied teaching aids/can make use of multimedia in lessons
Teachers can use/produce computer based tests/can use ICT to assess students’
performance/students can assess own performance
Teachers can use spreadsheets/databases to record test scores/produce graphs of progress
Easier to compare class/students’ performance/track progress
Tests can be computer-marked saving teachers’ time
Easier to monitor student activities using monitoring software
Drawbacks
Takes a lot of time to prepare ICT materials
Can be difficult to ensure all students are on task if no monitoring software is available
More resources are available so students might make inefficient use of these
More difficult to co-ordinate activities
Plagiarism can cause teachers’ problems
Name
Contact details i.e. phone/address
Holiday entitlement
Job title
Employee number/ID number/payroll number/works number
Social security/national insurance number
Department worked in
Date employed
Date of birth
(b)
Transaction [1]
Old master
file file
Update [1]
process
[1]
Reports New
[1]
master
file
Look at the terminators and flow arrows in the DFD which show the volume of input data
…which leads to decisions on appropriate input devices
Look at the terminators and flow arrows out of the system which indicate the quantity/ format
of the output/required output…
…which leads to decisions on appropriate output devices
Look at the stores in the DFD which will show how much data needs to be stored…
… the storage requirements will be known
….which is needed to identify the size and number of storage devices
Using collected information/results of observation to see exactly what job each worker is
doing
Joanne will have interviewed payroll workers/manager to find their requirements
Will use the DFD to come to a conclusion about the user/system requirements
From user requirements she will produce a requirements specification…
…list of the features of the system that is required
Identify general requirements such as what the user wants the overall system to do
Identify specific requirements
Example of specific requirements
Results of examining documents will help identify required hardware/software
Results of observation will help identify required hardware/software
Kept secure
Fairly and lawfully processed
Processed for limited purposes
Adequate, relevant and not excessive
Accurate and up to date
Not kept longer than necessary
Processed in accordance with the individual’s rights
Not transferred to countries outside that country unless it has adequate protection for the
individual interests of the individual or another person
Payroll workers must not share any payroll data with anybody/outside the organisation/other
employees.
Payroll workers should sign a confidentiality agreement/have a duty of confidence
Information about an individual should not be passed to another organisation without
permission of the individual
Information should be anonymised where possible
Information should be aggregated where possible
Scanner
Used to import hard copy images/photographs
Digital camera
Used to download photographs stored on the camera
Write your Centre number, candidate number and name on all the work you hand in.
Write in blue or black pen.
Do not use staples, paper clips, glue or correction fluid.
You may use a pencil for any diagrams, graphs or rough working.
DO NOT WRITE IN ANY BARCODES.
The number of marks is given in brackets [ ] at the end of each of each question or part question.
DC (FD) 110076
© UCLES 2015 [Turn over
2
Scenario 1
Questions 1, 2, 3, 4 and 5
XYA is a company in a developing country that buys and sells steel. They employ a number of sales
staff to phone potential customers in order to sell their steel.
They are seeking to save costs and have asked a number of their sales staff to work from home.
Temperatures are fairly low in the winter so sales staff tend to have central heating systems in their
homes.
Regular staff meetings are planned to take place using phone conferencing which the manager Ibrahim
will organise.
1 Tick the four statements which are benefits to the company of workers working from home.
Benefit
Workers will not have to work as hard as if they were in an office
It is easier to get all the workers together for meetings and briefings
It would be easier for managers to supervise workers
Not so much money would have to be spent on the company’s utility bills
There would be no distractions for workers preventing them from working
Lower costs as company can rent smaller offices
The workforce would probably be happier so there would be improved motivation
to work and increased productivity
It would be easier to sell steel
The cost to the company of the phone calls would be cheaper as home phone
charges are lower
More staff would be retained so money would not have to be spent on training
new staff
[4]
2 Tick the four statements which are benefits to the company of using staff to make phone sales
rather than advertising on a website.
Benefit
You can reach a larger audience by phone than by using a website
3 Describe how a microprocessor makes use of the data from a temperature sensor to control a
central heating system.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[3]
4 Each sales person would need a PC and a monitor. They will need additional hardware and
software to allow them to work from home.
(a) Name, and describe the use of, three additional items of hardware. Each use must be different.
1 .................................................................................................................................................
...................................................................................................................................................
2 .................................................................................................................................................
...................................................................................................................................................
3 .................................................................................................................................................
...............................................................................................................................................[3]
(b) Name, and describe the use of, three items of software. Each use must be different.
1 .................................................................................................................................................
...................................................................................................................................................
2 .................................................................................................................................................
...................................................................................................................................................
3 .................................................................................................................................................
...............................................................................................................................................[3]
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[4]
Scenario 2
Questions 6 and 7
A geography teacher wants to use computers to help students improve their learning and help with her
lesson preparation.
6 Describe the use of each of the following types of software that the geography teacher would use
to prepare materials for her lessons. Each use must be different.
Spreadsheet .....................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
DTP ..................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[4]
7 Discuss the benefits and drawbacks to teachers and students of using computers in lessons to aid
teaching and learning.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[6]
Scenario 3
Questions 8, 9, 10, 11 and 12
RockICT has decided to combine its staff records. It currently has separate computerised personal and
payroll details of all its staff.
The payroll system runs using all the data on a weekly basis. Workers are paid according to how many
hours they work in a week. On the new system human resources staff will need to be able to access
records quickly.
Joanne, a systems analyst, has collected a large amount of information about the existing system. The
information will be analysed before the system is designed.
RockICT requires its workers to have a duty of fidelity. It also has to follow government data protection
rules when storing data about its workers.
RockICT has hired Arty, an art and design company to produce CD covers for the albums its musicians
produce.
8 (a) Give three items of information, not related to their pay, that will need to be stored on the
master file about each member of RockICT staff.
1 .................................................................................................................................................
...................................................................................................................................................
2 .................................................................................................................................................
...................................................................................................................................................
3 .................................................................................................................................................
...............................................................................................................................................[3]
(b) Label the components of the following systems flowchart to show how the master file is
updated.
................................
Old master file
................................
.......................................
.......................................
................................ ................................
................................ ................................
[4]
9 (a) Describe in detail two ways that Joanne will use a data flow diagram to identify suitable
hardware for the new system.
1 .................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
2 .................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[4]
(b) Describe how Joanne will identify the user and system requirements for the new system.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[4]
10 (a) Describe what is meant by the indexed sequential method of storing data.
Give reasons why it would be suitable in this scenario.
Indicate which storage medium would be most appropriate to use.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[6]
(b) Joanne will need to design the file structure of the new system.
Describe six steps involved in designing the file structure, without referring to the indexed
sequential method of storing data.
1 .................................................................................................................................................
...................................................................................................................................................
2 .................................................................................................................................................
...................................................................................................................................................
3 .................................................................................................................................................
...................................................................................................................................................
4 .................................................................................................................................................
...................................................................................................................................................
5 .................................................................................................................................................
...................................................................................................................................................
6 .................................................................................................................................................
...............................................................................................................................................[6]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
(b) Describe four rules which would be included in data protection legislation.
1 .................................................................................................................................................
...................................................................................................................................................
2 .................................................................................................................................................
...................................................................................................................................................
3 .................................................................................................................................................
...................................................................................................................................................
4 .................................................................................................................................................
...............................................................................................................................................[4]
(c) Apart from following data protection rules and having a duty of fidelity, explain the
responsibilities of the company and its workers with regard to the privacy of payroll data.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[4]
12 Arty use graphics software to change images that have been imported into the software.
(a) Name and describe two input devices which are used to import images for use in the CD
covers.
1 .................................................................................................................................................
...................................................................................................................................................
2 .................................................................................................................................................
...............................................................................................................................................[4]
(b) Name and describe four features of the graphics software used when changing the images.
1 .................................................................................................................................................
...................................................................................................................................................
2 .................................................................................................................................................
...................................................................................................................................................
3 .................................................................................................................................................
...................................................................................................................................................
4 .................................................................................................................................................
...............................................................................................................................................[4]
(c) Describe two sources of images which would accompany the software when bought.
1 .................................................................................................................................................
...................................................................................................................................................
2 .................................................................................................................................................
...............................................................................................................................................[2]
(d) The printing of the CD covers is now computer controlled. Describe two effects this had on
the workers who used to be involved in the printing process.
1 .................................................................................................................................................
...................................................................................................................................................
2 .................................................................................................................................................
...............................................................................................................................................[2]
BLANK PAGE
BLANK PAGE
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable
effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will
be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.
Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of
the examination. It shows the basis on which Examiners were instructed to award marks. It does not
indicate the details of the discussions that took place at an Examiners’ meeting before marking began,
which would have considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner
Report for Teachers.
Cambridge will not enter into discussions about these mark schemes.
Cambridge is publishing the mark schemes for the May/June 2015 series for most
Cambridge IGCSE®, Cambridge International A and AS Level components and some
Cambridge O Level components.
1 [4]
It is easier to get all the workers together for meetings and briefings
2 [4]
You can reach a larger audience by phone than by using a website
They will know accurately how many sales they have made
Advantages
You can see the facial expressions/body language of other participants
You can see/amend/share documents that you want to discuss with each other
Easier to identify whose turn it is/who wants to contribute next
Once equipment is bought less expensive to run/set up/organise than a phone conference
Disadvantages
More expensive to buy hardware/software
If there are problems with internet connection, conference may be interrupted
More equipment needed so greater chance of problems
Benefits
ICT make lessons more interesting/entertaining
ICT make lessons more varied
Internet allows students to investigate ideas
Internet allows students to carry out research
Neatness of students work makes it easier for teacher to mark
ICT provides a more interactive learning environment
Teachers can spend less time with students with special needs because of ICT resources/
ICT resources can help students with special needs
Teachers have more varied teaching aids/can make use of multimedia in lessons
Teachers can use/produce computer based tests/can use ICT to assess students’
performance/students can assess own performance
Teachers can use spreadsheets/databases to record test scores/produce graphs of progress
Easier to compare class/students’ performance/track progress
Tests can be computer-marked saving teachers’ time
Easier to monitor student activities using monitoring software
Drawbacks
Takes a lot of time to prepare ICT materials
Can be difficult to ensure all students are on task if no monitoring software is available
More resources are available so students might make inefficient use of these
More difficult to co-ordinate activities
Plagiarism can cause teachers’ problems
Name
Contact details i.e. phone/address
Holiday entitlement
Job title
Employee number/ID number/payroll number/works number
Social security/national insurance number
Department worked in
Date employed
Date of birth
(b)
Transaction [1]
Old master
file file
Update [1]
process
[1]
Reports New
[1]
master
file
Look at the terminators and flow arrows in the DFD which show the volume of input data…
…which leads to decisions on appropriate input devices
Look at the terminators and flow arrows out of the system which indicate the quantity/ format
of the output/required output…
…which leads to decisions on appropriate output devices
Look at the stores in the DFD which will show how much data needs to be stored…
… the storage requirements will be known
….which is needed to identify the size and number of storage devices
Using collected information/results of observation to see exactly what job each worker is
doing
Joanne will have interviewed payroll workers/manager to find their requirements
Will use the DFD to come to a conclusion about the user/system requirements
From user requirements she will produce a requirements specification…
…list of the features of the system that is required
Identify general requirements such as what the user wants the overall system to do
Identify specific requirements
Example of specific requirements
Results of examining documents will help identify required hardware/software
Results of observation will help identify required hardware/software
Kept secure
Fairly and lawfully processed
Processed for limited purposes
Adequate, relevant and not excessive
Accurate and up to date
Not kept longer than necessary
Processed in accordance with the individual’s rights
Not transferred to countries outside that country unless it has adequate protection for the
individual interests of the individual or another person
Payroll workers must not share any payroll data with anybody/outside the organisation/other
employees.
Payroll workers should sign a confidentiality agreement/have a duty of confidence
Information about an individual should not be passed to another organisation without
permission of the individual
Information should be anonymised where possible
Information should be aggregated where possible
Scanner
Used to import hard copy images/photographs
Digital camera
Used to download photographs stored on the camera
Write your Centre number, candidate number and name on all the work you hand in.
Write in dark blue or black pen.
Do not use staples, paper clips, glue or correction fluid.
You may use an HB pencil for any diagrams, graphs or rough working.
DO NOT WRITE IN ANY BARCODES.
The number of marks is given in brackets [ ] at the end of each question or part question.
DC (SLM) 113354/1
© UCLES 2015 [Turn over
2
Scenario 1
Questions 1, 2, 3, 4 and 5.
A regional government agency is responsible for encouraging citizens to use ICT to access government
information and services online.
The agency is also responsible for trying to reduce the ‘digital divide’ so that citizens can use online
services and facilities provided by banks and retailers.
The agency is concerned about the antisocial use of ICT and about computer fraud. It wishes to
commission a survey to be completed by citizens to reveal the extent of these problems.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[8]
2 Discuss the benefits and drawbacks of the government putting its information and services online.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[8]
3 Explain how the regional government could try to reduce the ‘digital divide’ so that more citizens
would be able to access its online services.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[4]
4 Describe four examples of antisocial use of ICT and for each one describe how it might be
prevented. Each method of prevention must be different.
Example 1 .........................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
Prevention .........................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
Example 2 .........................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
Prevention .........................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
Example 3 .........................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
Prevention .........................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
Example 4 .........................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
Prevention .........................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[8]
5 Explain how using banking and shopping services online by citizens can lead to fraud.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[6]
Scenario 2
Questions 6, 7, and 8.
RockICT plc is a store that sells goods online. Customers are required to have an online account for
use when purchasing goods.
Peter wants to purchase goods online from the store and uses a web browser to locate and access the
store’s secure website.
When purchasing goods using the store’s website, Peter adds the goods to a virtual shopping cart and
pays for the goods online by clicking the ‘buy now’ button shown on the cart webpage.
The purchased goods can be kept in the store for Peter to collect, sent to Peter using the postal service
or delivered by the store’s own delivery vehicles.
6 Describe features of the store’s website that would enable and encourage Peter to browse and
choose goods to add to his virtual shopping cart.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[6]
7 Describe, in detail, the processing that occurs when Peter clicks on the ‘buy now’ button of his
virtual shopping cart.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[8]
8 Explain how a secure website helps to keep Peter’s payment details from being viewed by
unauthorised persons while being transmitted to and from the store’s website.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[8]
Scenario 3
Questions 9, 10 and 11.
Each of the offices has its own local area network (LAN) that uses dedicated cabling and wireless
connections.
The office LANs are connected together using the internet to create a company wide area network
(WAN).
9 The company uses the following on its network. Describe the role of each:
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[4]
(ii) firewall
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[3]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[3]
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[4]
11 Explain the reasons why both wireless and dedicated cabling are used for the company LANs.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[8]
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable
effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will
be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.
Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of
the examination. It shows the basis on which Examiners were instructed to award marks. It does not
indicate the details of the discussions that took place at an Examiners’ meeting before marking began,
which would have considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner
Report for Teachers.
Cambridge will not enter into discussions about these mark schemes.
Cambridge is publishing the mark schemes for the October/November 2015 series for most
Cambridge IGCSE®, Cambridge International A and AS Level components and some
Cambridge O Level components.
2 Eight from:
Benefits:
Saves the cost of printing paper-based information
Reduced staffing costs/office requirement as fewer staff needed
Information can be updated easily/kept up-to-date
Increased access to government information
Information can be personalised
Faster access by citizens to government information/news
Government perceived to be more ‘open’
Drawbacks:
Personal contact with government officials can be lost
Not all citizens have access to internet/computers/ICT skills
Concern over use of (personal) data by government
One mark for each example, one mark for prevention, max 8 marks.
Example Prevention
[8]
Personal details can be intercepted during transfer between user and bank/shopping site
Personal details can be used for identity theft
User IDs/passwords can be stolen by cyber attackers/hackers and used for fraudulent activities
Financial details can be intercepted during transfer between user and bank/shopping site
Financial details can be used to purchase goods by third parties
Financial details can be used to transfer/steal funds from bank accounts of users
…money taken from bank accounts without authorisation
Possibility of pharming – using a fake web site
…goods never arrive
Receipt of phishing emails/calls from third person purporting to be from bank/online seller asking
for personal/financial details
…use of these details by third person to commit fraud
fraudulent claims by purchaser against seller/bank
…falsely claiming non-delivery of goods
…return of goods for false reasons after using them e.g. wear once of garments (e.g. event such
as wedding) then return for refund of cost
use of stolen credit cards/credit card details
…to commit fraud by purchasing goods/services [6]
7 Eight from:
Virtual shopping cart adds costs of goods and delivery charges to produce total cost
Virtual shopping cart submits order to website/company payment gateway
Need to supply login details/access user account to ‘proceed to checkout’
Update of stock levels on stock control system
Payment gateway forwards request/details to buyer’s credit card company
…using encrypted data for transmission
Credit card company checks the card/account number exists
Credit card company checks for sufficient funds/credit
Credit card company checks if card/account is blocked/stolen/frozen
…authorises the payment if valid
Payment gateway tells virtual shopping cart that payment has been authorised/is successful
Payment gateway starts transfer of funds from buyer credit card account to website/shop account
Payment made and transaction finalised
Confirmation of/input of delivery details
Confirmation sent to buyer/Peter via email
Order tracking process is initiated so Peter can follow the progress of the order [8]
8 Eight from:
(Dedicated) cables:
Wireless:
Provides easier to add devices when extra staff or nodes required in offices
…no need to install extra cabling
…extra cabling can be more expensive
Provides access where the structure of the building is not suitable for cabling
…materials may be difficult to penetrate for cables e.g. stone/steel
…restrictions on alterations/additions to building because it is old/protected
Allows mobility of devices
…devices are not fixed or tethered by cables
…offices can be re-arranged with the need for physical connections to be moved
Allows flexibility
…devices can be positioned wherever there is a signal
Can provide guest logins
…can provide logins for guests/visitors with no need for physical connection
[Total: 80]
Write your Centre number, candidate number and name on all the work you hand in.
Write in dark blue or black pen.
Do not use staples, paper clips, glue or correction fluid.
You may use an HB pencil for any diagrams, graphs or rough working.
DO NOT WRITE IN ANY BARCODES.
The number of marks is given in brackets [ ] at the end of each question or part question.
DC (LM) 116413
© UCLES 2015 [Turn over
2
Scenario 1
Questions 1, 2, 3 and 4.
The scientists collect data manually by going into the factory and out into the surrounding areas where
they use laptops to record the data that they collect.
The scientists also use sensors connected to their office computers to collect data.
The data from the manual collection and from the sensors is sent to head office to be analysed and
used in weekly reports.
1 Describe how data logging could be used to monitor the environmental conditions around the
factory.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..................................................................................................................................................... [6]
2 Describe how the functions available in a spreadsheet could be used to analyse the collected
data.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..................................................................................................................................................... [4]
3 Discuss the benefits and drawbacks of monitoring the environmental conditions in and around the
factory by using a computer system rather than manual monitoring.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..................................................................................................................................................... [8]
4 Describe how FTP could be used to transfer the data files between the computers at the factory
and the head office.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..................................................................................................................................................... [6]
Scenario 2
Questions 5, 6 and 7.
NoRisk Bank plc holds the financial details of a large number of personal and commercial account
holders. The bank allows account holders to manage their accounts online.
Gupta is a network administrator responsible for the safety and security of the data held by NoRisk
Bank plc.
Gupta uses a number of different methods to try and keep the data associated with the accounts
safe and secure. When logging in, the bank’s computer system requires account users to undergo
authentication.
Gupta also uses a range of anti-malware software to try to prevent the corruption and theft of the data.
...................................................................................................................................................
.............................................................................................................................................. [1]
(b) Passwords are a method of authentication. Describe two other methods of authentication
that could be used when account holders log into an account.
1 ...............................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
2 ...............................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [4]
6 (a) Describe how a firewall can help to keep the account data secure.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [4]
(b) Describe the drawbacks of using each of the following methods of keeping data secure.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...................................................................................................................................... [2]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...................................................................................................................................... [2]
7 Describe how Gupta would use each of the following anti-malware applications to keep data safe
and secure.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..................................................................................................................................................... [6]
Scenario 3
Questions 8, 9, 10 and 11.
Global Systems is an international company with one head office and a number of other offices around
the world. It has a business network that uses wired and wireless methods of data transmission. The
wireless network requires a security key for access.
The network is used for transferring data around the network from computer to computer, to and from
servers and for sharing peripherals such as scanners and printers.
The business network also allows users to communicate with each other and has internet access to
allow communications between users in different offices and with others around the world.
The business network consists of local area networks (LANs) in the head office which are connected
into a wide area network (WAN) with the LANs in other offices using public telecommunications
systems.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..................................................................................................................................................... [6]
9 Explain two reasons why infrared is not often used for wireless networking.
1 ......................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
2 ......................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..................................................................................................................................................... [4]
© UCLES 2015 9713/33/O/N/15 [Turn over
12
10 Explain why wired equivalent privacy (WEP) should no longer be used to secure wireless networks.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..................................................................................................................................................... [4]
11 Discuss the benefits and drawbacks of connecting the individual LANs into a WAN.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..................................................................................................................................................... [8]
Scenario 4
Questions 12 and 13.
Speedy Dropoff Co owns a number of trucks that it uses to deliver parcels in a large city. It keeps the
trucks in a parking garage just outside the city.
The company also has a maintenance garage where servicing of the trucks, repairs and diagnosing of
engine faults is carried out. Engine fault diagnosis is carried out using an expert system.
Rowena is the delivery manager of the company and uses route scheduling software to work out the
shortest route that each truck should take to make its deliveries. She also wants the trucks to take the
most economical routes.
12 (a) Explain, with detailed descriptions of the components, what is meant by an “expert system”.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [6]
(b) Describe, apart from car fault diagnosis and route scheduling, two other uses of expert
systems.
1 ...............................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
2 ...............................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [4]
© UCLES 2015 9713/33/O/N/15 [Turn over
16
13 (a) State four inputs to the route scheduling software so that it can work out the shortest route for
a delivery truck.
1 ...............................................................................................................................................
...................................................................................................................................................
2 ...............................................................................................................................................
...................................................................................................................................................
3 ...............................................................................................................................................
...................................................................................................................................................
4 ...............................................................................................................................................
.............................................................................................................................................. [4]
(b) Describe one other input that must be entered so that the route scheduling software can work
out the most economical route.
...................................................................................................................................................
.............................................................................................................................................. [1]
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable
effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will
be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.
Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of
the examination. It shows the basis on which Examiners were instructed to award marks. It does not
indicate the details of the discussions that took place at an Examiners’ meeting before marking began,
which would have considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner
Report for Teachers.
Cambridge will not enter into discussions about these mark schemes.
Cambridge is publishing the mark schemes for the October/November 2015 series for most
Cambridge IGCSE®, Cambridge International A and AS Level components and some
Cambridge O Level components.
Benefits:
data is continually monitored by computers
…if event happens it is not missed
more accurate collection of data by sensors/computers
can monitor multiple sensors simultaneously
logged data is already in electronic form so no transcription errors/does not need to be entered
personnel are not needed to take the measurements so they can do other useful tasks
data can be displayed immediately/in real time
data can be analysed immediately/in real time
Drawbacks:
interruptions to power supply could cause collection of data to be missed/not happen
damage/failure of equipment could cause collection of data to be missed/not happen/be
inaccurate
maintenance of equipment can be expensive/time consuming/requires expertise/training
4 Six from:
use of FTP client on warehouse computers and FTP server at head office
…uses FTP protocol
…can be secured with use of SSL/TLS/SSH
FTP address of server is entered e.g. ftp.cie.org.uk
…or use of IP address of server
user name and password required
…anonymous connections (no user name and password required) may be allowed for downloads
but not for uploads/private FTP servers
use of port 21 to send commands to server from client (communications port)
…port is a ‘logical connection point’ for transferring data
use of a different port (the data port) for transfer of data
…both communications port and data port must be open/connect for data to be transferred
active mode
…client opens port and server connects to it
…most servers use port 20 as data port
passive mode
…server opens port and clients connects to it
firewalls must be set to allow FTP/ports that FTP uses [6]
biometrics
…valid example of use
digital certificates
…unique to user
transaction authentication number
…entered and verified against list issued and held by bank
…TAN only recognised/used once
multi-factor authentication
…two or more factors
…knowledge factor (something known only to user)
…possession factor (something only user has)
…inherence factor (something only user is) [4]
7 Anti-virus software:
Two from:
install/run in background on computer
regularly update
scan all files regularly
scan incoming files
monitor ports on computer
remove/quarantine viruses
Anti-spyware software:
Two from:
install/run in background on computer
regularly update
scan computer regularly
helps to prevent key-logging
Anti-popup software:
Two from:
install/run in background on computer
regularly update
use to remove popup code [6]
8 Six from:
10 Four from:
Benefits:
data/files can be stored on central fileserver
can share files/data over a large area/between LANs
can share peripherals/storage between LANs
can send messages/email quickly between users on different LANs
allows employees to work from home on corporate WAN
central backups can be set up
Drawbacks:
can be expensive/complex to set up
can be expensive and complex to maintain requiring expertise/skilled technicians
larger networks are easier to compromise/security is of greater importance
use of peripherals e.g. printers can be slow due to queues of jobs
failure of servers can affect all users/workstations
malware can spread more easily between workstations
computer-based system
using wide range of human knowledge
to help solve problems
uses knowledge base consists of a database of facts and the rules base
inference engine to find appropriate solutions
rules base consists of IF THEN statements
user interface to input questions/output possible solutions
knowledge base editor to edit rules and facts in in knowledge base [6]
medical diagnosis
…to help doctors diagnosis patient illness
identification systems
…to help identify plants
…stone tools in archaeology
…structure of chemicals
tax/financial planning/advice
…calculating e.g. tax liabilities
insurance planning
…designing insurance packages for individuals/groups
…investment analysis
mineral prospecting
…probabilities of finding minerals/oil
automatic pilots in aircraft
…maintain flight/perform pre-set manoeuvres
…aid to human pilots [4]
price of fuel
fuel consumption
number of hills on the route
known traffic black spots that might delay/slow journey times [1]
[Total: 80]
Write your Centre number, candidate number and name on all the work you hand in.
Write in dark blue or black pen.
Do not use staples, paper clips, glue or correction fluid.
You may use a pencil for any diagrams, graphs or rough working.
DO NOT WRITE IN ANY BARCODES.
The number of marks is given in brackets [ ] at the end of each question or part question.
DC (NF) 101509/4
© UCLES 2015 [Turn over
2
Scenario 1
Questions 1, 2, 3 and 4
The Queen Elizabeth Hospital uses computers to help run its intensive care unit. Nurses are still
required to take some readings relating to the condition of the patients. The computer will alert a nurse
if readings reach dangerous levels.
The hospital also uses computers to store and retrieve confidential records of all patients. This database
needs to be accessed at any time of day. When data is analysed for the purpose of producing statistics
it is usually in summarised form to protect patient confidentiality.
Advantage
Computers can monitor patients continuously.
Computers can measure more than one variable at any one time.
2 Tick the four statements referring to the use of computers in intensive care which are true.
Advantage
Sensors store the pre-set value.
If any data is outside the pre-set range the computer sounds an alarm.
[4]
© UCLES 2015 9713/11/O/N/15 [Turn over
4
3 Explain why batch processing would not be used to warn the nurses about a patient’s condition
worsening.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..................................................................................................................................................... [3]
4 Name and describe two methods by which patient information could be summarised to help keep
patient data confidential.
1 ......................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
2 ......................................................................................................................................................
..........................................................................................................................................................
..................................................................................................................................................... [4]
Scenario 2
Questions 5 and 6
Paula Richards is employed by a company to visit and inspect its stores. She spends most of her
time travelling.
Paula produces her reports using her laptop computer. She also has a smartphone which she
uses for other aspects of her work.
Some of the stores she visits are quite large and the management teams have equipment which
allows them to video conference with Paula when she returns to head office to discuss her report.
5 Using aspects of the scenario, describe four different uses she could make of her smartphone to
help her in her work.
1 ......................................................................................................................................................
..........................................................................................................................................................
2 ......................................................................................................................................................
..........................................................................................................................................................
3 ......................................................................................................................................................
..........................................................................................................................................................
4 ......................................................................................................................................................
..................................................................................................................................................... [4]
1 ......................................................................................................................................................
..........................................................................................................................................................
2 ......................................................................................................................................................
..........................................................................................................................................................
3 ......................................................................................................................................................
..........................................................................................................................................................
4 ......................................................................................................................................................
..........................................................................................................................................................
5 ......................................................................................................................................................
..................................................................................................................................................... [5]
Scenario 3
Questions 7, 8, 9, 10 and 11
First Call Fashions is a very large mail order catalogue company which sells a variety of clothes in the
UK. Stella, the owner, has decided to computerise the company operations. She has employed Rafael,
a systems analyst, to supervise the process.
Rafael will analyse the current system. He will need to establish the inputs and outputs of the system.
As part of the design stage he will need to design a screen input form to input the details of all the
clothes.
He will need to produce user documentation for the system. User documentation often gives guidance
on how to use the system such as:
Stella is going to open a call centre so that customers can phone in for help with their orders. She is
considering whether to open it in the UK or overseas.
7 Rafael wants to establish the inputs and outputs of the current system.
Describe three items he will identify as a result of examining documents.
1 ......................................................................................................................................................
..........................................................................................................................................................
2 ......................................................................................................................................................
..........................................................................................................................................................
3 ......................................................................................................................................................
..................................................................................................................................................... [3]
8 (a) Apart from navigation aids, describe five features of a well-designed screen-based data input
form.
1 ...............................................................................................................................................
...................................................................................................................................................
2 ...............................................................................................................................................
...................................................................................................................................................
3 ...............................................................................................................................................
...................................................................................................................................................
4 ...............................................................................................................................................
...................................................................................................................................................
5 ...............................................................................................................................................
.............................................................................................................................................. [5]
(b) Describe four advantages of using a screen form rather than a paper-based form to collect
the data.
1 ...............................................................................................................................................
...................................................................................................................................................
2 ...............................................................................................................................................
...................................................................................................................................................
3 ...............................................................................................................................................
...................................................................................................................................................
4 ...............................................................................................................................................
.............................................................................................................................................. [4]
9 (a) Apart from those uses listed in the scenario, describe four other items which would be
contained in the user documentation, including the reason for their inclusion.
1 ...............................................................................................................................................
...................................................................................................................................................
2 ...............................................................................................................................................
...................................................................................................................................................
3 ...............................................................................................................................................
...................................................................................................................................................
4 ...............................................................................................................................................
.............................................................................................................................................. [4]
1 ...............................................................................................................................................
...................................................................................................................................................
2 ...............................................................................................................................................
...................................................................................................................................................
3 ...............................................................................................................................................
.............................................................................................................................................. [3]
10 Describe in detail, three methods of obtaining feedback from users of the new system and for
each one give a different drawback of the method.
Method 1 ..........................................................................................................................................
..........................................................................................................................................................
Drawback 1 ......................................................................................................................................
..........................................................................................................................................................
Method 2 ..........................................................................................................................................
..........................................................................................................................................................
Drawback 2 ......................................................................................................................................
..........................................................................................................................................................
Method 3 ..........................................................................................................................................
..........................................................................................................................................................
Drawback 3 ......................................................................................................................................
..................................................................................................................................................... [6]
11 (a) Give three advantages of using overseas call centres from the company’s point of view.
1 ...............................................................................................................................................
...................................................................................................................................................
2 ...............................................................................................................................................
...................................................................................................................................................
3 ...............................................................................................................................................
.............................................................................................................................................. [3]
(b) Give three advantages of using UK call centres from the point of view of the customer.
1 ...............................................................................................................................................
...................................................................................................................................................
2 ...............................................................................................................................................
...................................................................................................................................................
3 ...............................................................................................................................................
.............................................................................................................................................. [3]
Scenario 4
Question 12
Joan is a manager of a department in an examination board. She wants to introduce a multimedia ICT
qualification. Eventually, she will send multimedia files by emails to the schools taking the qualification.
She also uses the internet to search for resource materials for the qualification but sometimes cannot
obtain the required information.
12 (a) Describe what Joan has to do to prepare an email in order to send a very large attachment.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [3]
(b) A school receives the email but cannot open the attachment.
Give four reasons why this may happen.
1 ...............................................................................................................................................
...................................................................................................................................................
2 ...............................................................................................................................................
...................................................................................................................................................
3 ...............................................................................................................................................
...................................................................................................................................................
4 ...............................................................................................................................................
.............................................................................................................................................. [4]
(c) Describe, including the use of Boolean operands, five different ways Joan could better target
her searches when using the internet.
1 ...............................................................................................................................................
...................................................................................................................................................
2 ...............................................................................................................................................
...................................................................................................................................................
3 ...............................................................................................................................................
...................................................................................................................................................
4 ...............................................................................................................................................
...................................................................................................................................................
5 ...............................................................................................................................................
.............................................................................................................................................. [5]
Scenario 5
Question 13
Hightown Bank, New York, operates an online banking system. A number of customers are concerned
about the security of their accounts.
(b) This message is sent from a computer “ICT affects all aspects of our lives”.
It is converted so that when it arrives at another computer it is seen as “RXG zuuvxgh zoo
zhkvxgh lu lfi orevh”.
...................................................................................................................................... [1]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...................................................................................................................................... [2]
(c) Describe, in detail, four other safeguards that the bank could use to protect customer account
information.
1 ...............................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
2 ...............................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
3 ...............................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
4 ...............................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [4]
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable
effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will
be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.
Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of
the examination. It shows the basis on which Examiners were instructed to award marks. It does not
indicate the details of the discussions that took place at an Examiners’ meeting before marking began,
which would have considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner
Report for Teachers.
Cambridge will not enter into discussions about these mark schemes.
Cambridge is publishing the mark schemes for the October/November 2015 series for most
Cambridge IGCSE®, Cambridge International A and AS Level components and some
Cambridge O Level components.
1
Computers can monitor patients continuously.
Computers can measure more than one variable at any one time.
A computer can monitor the condition of several patients at the same time
leaving nurses free to do other tasks.
The use of computers to take readings reduces the chances of nurses being
exposed to contagious diseases.
[4]
2
Sensors store the pre-set value.
If the patient’s blood pressure is too high the sensor sends the reading to
the computer.
The sensor readings are converted from digital to analogue so the computer
can process them.
The computer compares any data fed back by a sensor to a pre-set value.
The computer cannot take readings without the nurse supervising it.
If any data is outside the pre-set range the computer sounds an alarm.
3 Three from:
Batch processing is the processing of transactions/data in sequence but monitoring is real time
Data is collected in batches and then run altogether but data needs to be collected continuously
Batch processing is only suitable for applications where results of processing is not time critical
but monitoring is time critical
Warning to nurses would have to be given without any delay [3]
5 Four from:
6 Five from:
7 Three from:
Easier to correct
Easier to duplicate data when records contain the same data
Easier to move to a particular record for editing purposes
Easier to read/clearer data in free text fields
Built in validation rules to prevent missing data in fields/making sure data is
reasonable/prevent errors [4]
The purpose of the system to give an overall description of what the system does
The input and output formats, so that you know how to enter data and know what the output
will look like
The hardware and software needed to run the system so that the user doesn’t use the wrong
hardware/software
Examples of sample runs of the system so that the user can tell if they are using the system
in the correct way.
Troubleshooting guide/a list of Frequently Asked Questions to know what to do when errors
occur [4]
The systems analyst would not have a detailed overview of the whole system
It would be difficult for programmers/systems analyst to amend the system to eliminate errors
Programmers would have difficulty fully understanding the program code that has been used
It would be difficult to develop further the system or upgrade it [3]
10 Method: Could observe users performing set tasks and record their progress using video
recording/get an user to perform a task and measure the time it takes them to carry out the task
[1]
Drawback: Description of the Hawthorne effect [1]
Method: Interview users to gather their responses about what they thought of the system and
how easy it was to use [1]
Drawback: Users have to be available at the time the analyst wants to interview them/time
consuming as it may take a long time to interview all the users/may get answers which the user
thinks the analyst wants to hear [1]
Method: Hand out questionnaires to users to ask them about their thoughts on the new system
with regard to how easy they found it to use [1]
Drawback: They may give answers which are exaggerated as they are anonymous/questions
cannot be changed once they are typed up/follow up questions cannot be asked [1]
Anti-virus software will quarantine the attachment so that you cannot open it
File could be corrupted in transmission
Might not have the software needed to open it
Might not have the software required to decompress it
The file was not attached
Might not have the password required to decompress it [4]
Use AND operator so that more than one condition must be met which will reduce the
number of hits
Use OR operator so that only one of at least two conditions needs to be met which will
increase the number of hits
Use NOT operator so that items failing to meet a condition are removed to exclude unwanted
results
Use quotes to limit the items to those that match the condition exactly which will reduce the
number of hits
Use wild cards so that any one of a number of matching items will result which will increase
the number of hits
Use a different type of search engine so that different results may be obtained [5]
Pharming [1]
Spyware [1]
Hacking [1]
Viruses [1]
Cookie [1]
[Total:80]
Write your Centre number, candidate number and name on all the work you hand in.
Write in dark blue or black pen.
Do not use staples, paper clips, glue or correction fluid.
You may use a pencil for any diagrams, graphs or rough working.
DO NOT WRITE IN ANY BARCODES.
The number of marks is given in brackets [ ] at the end of each question or part question.
DC (LM) 116412
© UCLES 2015 [Turn over
2
Scenario 1
Questions 1, 2, 3 and 4
The Queen Elizabeth Hospital uses computers to help run its intensive care unit. Nurses are still
required to take some readings relating to the condition of the patients. The computer will alert a nurse
if readings reach dangerous levels.
The hospital also uses computers to store and retrieve confidential records of all patients. This database
needs to be accessed at any time of day. When data is analysed for the purpose of producing statistics
it is usually in summarised form to protect patient confidentiality.
Advantage
Computers can monitor patients continuously.
Computers can measure more than one variable at any one time.
2 Tick the four statements referring to the use of computers in intensive care which are true.
Advantage
Sensors store the pre-set value.
If any data is outside the pre-set range the computer sounds an alarm.
[4]
© UCLES 2015 9713/12/O/N/15 [Turn over
4
3 Explain why batch processing would not be used to warn the nurses about a patient’s condition
worsening.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..................................................................................................................................................... [3]
4 Name and describe two methods by which patient information could be summarised to help keep
patient data confidential.
1 ......................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
2 ......................................................................................................................................................
..........................................................................................................................................................
..................................................................................................................................................... [4]
Scenario 2
Questions 5 and 6
Paula Richards is employed by a company to visit and inspect its stores. She spends most of her
time travelling.
Paula produces her reports using her laptop computer. She also has a smartphone which she
uses for other aspects of her work.
Some of the stores she visits are quite large and the management teams have equipment which
allows them to video conference with Paula when she returns to head office to discuss her report.
5 Using aspects of the scenario, describe four different uses she could make of her smartphone to
help her in her work.
1 ......................................................................................................................................................
..........................................................................................................................................................
2 ......................................................................................................................................................
..........................................................................................................................................................
3 ......................................................................................................................................................
..........................................................................................................................................................
4 ......................................................................................................................................................
..................................................................................................................................................... [4]
1 ......................................................................................................................................................
..........................................................................................................................................................
2 ......................................................................................................................................................
..........................................................................................................................................................
3 ......................................................................................................................................................
..........................................................................................................................................................
4 ......................................................................................................................................................
..........................................................................................................................................................
5 ......................................................................................................................................................
..................................................................................................................................................... [5]
Scenario 3
Questions 7, 8, 9, 10 and 11
First Call Fashions is a very large mail order catalogue company which sells a variety of clothes in the
UK. Stella, the owner, has decided to computerise the company operations. She has employed Rafael,
a systems analyst, to supervise the process.
Rafael will analyse the current system. He will need to establish the inputs and outputs of the system.
As part of the design stage he will need to design a screen input form to input the details of all the
clothes.
He will need to produce user documentation for the system. User documentation often gives guidance
on how to use the system such as:
Stella is going to open a call centre so that customers can phone in for help with their orders. She is
considering whether to open it in the UK or overseas.
7 Rafael wants to establish the inputs and outputs of the current system.
Describe three items he will identify as a result of examining documents.
1 ......................................................................................................................................................
..........................................................................................................................................................
2 ......................................................................................................................................................
..........................................................................................................................................................
3 ......................................................................................................................................................
..................................................................................................................................................... [3]
8 (a) Apart from navigation aids, describe five features of a well-designed screen-based data input
form.
1 ...............................................................................................................................................
...................................................................................................................................................
2 ...............................................................................................................................................
...................................................................................................................................................
3 ...............................................................................................................................................
...................................................................................................................................................
4 ...............................................................................................................................................
...................................................................................................................................................
5 ...............................................................................................................................................
.............................................................................................................................................. [5]
(b) Describe four advantages of using a screen form rather than a paper-based form to collect
the data.
1 ...............................................................................................................................................
...................................................................................................................................................
2 ...............................................................................................................................................
...................................................................................................................................................
3 ...............................................................................................................................................
...................................................................................................................................................
4 ...............................................................................................................................................
.............................................................................................................................................. [4]
9 (a) Apart from those uses listed in the scenario, describe four other items which would be
contained in the user documentation, including the reason for their inclusion.
1 ...............................................................................................................................................
...................................................................................................................................................
2 ...............................................................................................................................................
...................................................................................................................................................
3 ...............................................................................................................................................
...................................................................................................................................................
4 ...............................................................................................................................................
.............................................................................................................................................. [4]
1 ...............................................................................................................................................
...................................................................................................................................................
2 ...............................................................................................................................................
...................................................................................................................................................
3 ...............................................................................................................................................
.............................................................................................................................................. [3]
10 Describe in detail, three methods of obtaining feedback from users of the new system and for
each one give a different drawback of the method.
Method 1 ..........................................................................................................................................
..........................................................................................................................................................
Drawback 1 ......................................................................................................................................
..........................................................................................................................................................
Method 2 ..........................................................................................................................................
..........................................................................................................................................................
Drawback 2 ......................................................................................................................................
..........................................................................................................................................................
Method 3 ..........................................................................................................................................
..........................................................................................................................................................
Drawback 3 ......................................................................................................................................
..................................................................................................................................................... [6]
11 (a) Give three advantages of using overseas call centres from the company’s point of view.
1 ...............................................................................................................................................
...................................................................................................................................................
2 ...............................................................................................................................................
...................................................................................................................................................
3 ...............................................................................................................................................
.............................................................................................................................................. [3]
(b) Give three advantages of using UK call centres from the point of view of the customer.
1 ...............................................................................................................................................
...................................................................................................................................................
2 ...............................................................................................................................................
...................................................................................................................................................
3 ...............................................................................................................................................
.............................................................................................................................................. [3]
Scenario 4
Question 12
Joan is a manager of a department in an examination board. She wants to introduce a multimedia ICT
qualification. Eventually, she will send multimedia files by emails to the schools taking the qualification.
She also uses the internet to search for resource materials for the qualification but sometimes cannot
obtain the required information.
12 (a) Describe what Joan has to do to prepare an email in order to send a very large attachment.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [3]
(b) A school receives the email but cannot open the attachment.
Give four reasons why this may happen.
1 ...............................................................................................................................................
...................................................................................................................................................
2 ...............................................................................................................................................
...................................................................................................................................................
3 ...............................................................................................................................................
...................................................................................................................................................
4 ...............................................................................................................................................
.............................................................................................................................................. [4]
(c) Describe, including the use of Boolean operands, five different ways Joan could better target
her searches when using the internet.
1 ...............................................................................................................................................
...................................................................................................................................................
2 ...............................................................................................................................................
...................................................................................................................................................
3 ...............................................................................................................................................
...................................................................................................................................................
4 ...............................................................................................................................................
...................................................................................................................................................
5 ...............................................................................................................................................
.............................................................................................................................................. [5]
Scenario 5
Question 13
Hightown Bank, New York, operates an online banking system. A number of customers are concerned
about the security of their accounts.
(b) This message is sent from a computer “ICT affects all aspects of our lives”.
It is converted so that when it arrives at another computer it is seen as “RXG zuuvxgh zoo
zhkvxgh lu lfi orevh”.
...................................................................................................................................... [1]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...................................................................................................................................... [2]
(c) Describe, in detail, four other safeguards that the bank could use to protect customer account
information.
1 ...............................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
2 ...............................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
3 ...............................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
4 ...............................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [4]
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable
effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will
be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.
Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of
the examination. It shows the basis on which Examiners were instructed to award marks. It does not
indicate the details of the discussions that took place at an Examiners’ meeting before marking began,
which would have considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner
Report for Teachers.
Cambridge will not enter into discussions about these mark schemes.
Cambridge is publishing the mark schemes for the October/November 2015 series for most
Cambridge IGCSE®, Cambridge International A and AS Level components and some
Cambridge O Level components.
1
Computers can monitor patients continuously.
Computers can measure more than one variable at any one time.
A computer can monitor the condition of several patients at the same time
leaving nurses free to do other tasks.
The use of computers to take readings reduces the chances of nurses being
exposed to contagious diseases.
[4]
2
Sensors store the pre-set value.
If the patient’s blood pressure is too high the sensor sends the reading to
the computer.
The sensor readings are converted from digital to analogue so the computer
can process them.
The computer compares any data fed back by a sensor to a pre-set value.
The computer cannot take readings without the nurse supervising it.
If any data is outside the pre-set range the computer sounds an alarm.
3 Three from:
Batch processing is the processing of transactions/data in sequence but monitoring is real time
Data is collected in batches and then run altogether but data needs to be collected continuously
Batch processing is only suitable for applications where results of processing is not time critical
but monitoring is time critical
Warning to nurses would have to be given without any delay [3]
5 Four from:
6 Five from:
7 Three from:
Easier to correct
Easier to duplicate data when records contain the same data
Easier to move to a particular record for editing purposes
Easier to read/clearer data in free text fields
Built in validation rules to prevent missing data in fields/making sure data is
reasonable/prevent errors [4]
The purpose of the system to give an overall description of what the system does
The input and output formats, so that you know how to enter data and know what the output
will look like
The hardware and software needed to run the system so that the user doesn’t use the wrong
hardware/software
Examples of sample runs of the system so that the user can tell if they are using the system
in the correct way.
Troubleshooting guide/a list of Frequently Asked Questions to know what to do when errors
occur [4]
The systems analyst would not have a detailed overview of the whole system
It would be difficult for programmers/systems analyst to amend the system to eliminate errors
Programmers would have difficulty fully understanding the program code that has been used
It would be difficult to develop further the system or upgrade it [3]
10 Method: Could observe users performing set tasks and record their progress using video
recording/get an user to perform a task and measure the time it takes them to carry out the task
[1]
Drawback: Description of the Hawthorne effect [1]
Method: Interview users to gather their responses about what they thought of the system and
how easy it was to use [1]
Drawback: Users have to be available at the time the analyst wants to interview them/ time
consuming as it may take a long time to interview all the users/may get answers which the user
thinks the analyst wants to hear [1]
Method: Hand out questionnaires to users to ask them about their thoughts on the new system
with regard to how easy they found it to use [1]
Drawback: They may give answers which are exaggerated as they are anonymous/question
cannot be changed once they are typed up/follow up questions cannot be asked [1]
Anti-virus software will quarantine the attachment so that you cannot open it
File could be corrupted in transmission
Might not have the software needed to open it
Might not have the software required to decompress it
The file was not attached
Might not have the password required to decompress it [4]
Use AND operator so that more than one condition must be met which will reduce the
number of hits
Use OR operator so that only one of at least two conditions needs to be met which will
increase the number of hits
Use NOT operator so that items failing to meet a condition are removed to exclude unwanted
results
Use quotes to limit the items to those that match the condition exactly which will reduce the
number of hits
Use wild cards so that any one of a number of matching items will result which will increase
the number of hits
Use a different type of search engine so that different results may be obtained [5]
Pharming [1]
Spyware [1]
Hacking [1]
Viruses [1]
Cookie [1]
[Total:80]
Write your Centre number, candidate number and name on all the work you hand in.
Write in dark blue or black pen.
Do not use staples, paper clips, glue or correction fluid.
You may use a pencil for any diagrams, graphs or rough working.
DO NOT WRITE IN ANY BARCODES.
The number of marks is given in brackets [ ] at the end of each question or part question.
DC (CW) 101353/2
© UCLES 2015 [Turn over
2
Scenario 1
Questions 1, 2, 3, 4 and 5
NewProperties are a newly formed house building company that wishes to advertise in the local area.
They could create and use:
The company carried out a trial of allowing their house designers to work from home. After the trial it
was decided that they would prefer their designers to be office-based in order to work on the design of
a new house.
However, a number of workers have asked the manager Bertrand if they can work part-time. Bertrand
has agreed providing each worker can find another worker to job share.
Bertrand uses time management software to track the progress of the building of houses at a new site.
John, a foreman, is in charge of the workers at the building site. He uses a smartphone to stay in
contact with Bertrand.
1 There are a number of advantages and disadvantages of using various advertising methods.
(a) Flyers:
You can distribute them so that they only go to the people you want to see them.
(b) Posters:
(c) Websites:
Websites are easier to update as you do not have to reprint the whole advertisement.
[1]
It would cost less to pay a company to produce this rather than produce their own flyers.
[1]
2 Tick the four statements which are benefits to the company of workers working in the office rather
than at home.
Benefit
✓
They can pay the workers lower salaries.
It is easier to get all the workers together for meetings and briefings.
Not so much money would have to be spent on the company’s utility bills.
Travelling expenses would have to be paid to employees to attend face to face conferences.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
4 (a) Describe two different types of calendar used with time management.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...............................................................................................................................................[2]
(b) Two aspects of time management software are shown on the left. Five descriptions are shown
on the right.
By drawing five lines, connect each aspect to an appropriate description.
5 Name and describe four methods of communication that John can use when contacting Bertrand
using his smartphone.
1 .......................................................................................................................................................
..........................................................................................................................................................
2 .......................................................................................................................................................
..........................................................................................................................................................
3 .......................................................................................................................................................
..........................................................................................................................................................
4 .......................................................................................................................................................
......................................................................................................................................................[4]
Scenario 2
Questions 6, 7 and 8
Grafton Mail Order Catalogue Company currently operates by receiving orders from its customers by
phone. They have a large call centre for this purpose. Due to the prolonged use of computers there are
a number of health and safety issues.
They are going to extend the way they receive orders by having an online system.
The company has a database of customer orders and personal details.
Grafton has employed Oscar to supervise the development of the new system. Oscar has already ruled
out using parallel running to implement the new system but is not sure which of the other methods to
use.
After the system is implemented Oscar will provide documentation to go with it.
6 (a) Identify two items of ICT hardware that an operator in the call centre would have at their desk
including a description of the purpose of each.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...............................................................................................................................................[2]
(b) Name the two different types of call control and describe the type that would be best suited
for use in the call centre. Within your description give a reason.
1 ................................................................................................................................................
2 ................................................................................................................................................
Description ................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[5]
(c) Using examples, describe the difference between health risks and safety risks.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[5]
7 (a) Other than security issues, describe four drawbacks to the customer of on-line shopping.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
3 ................................................................................................................................................
...................................................................................................................................................
4 ................................................................................................................................................
...............................................................................................................................................[4]
(b) Other than security issues, describe four drawbacks to the company of introducing on-line
shopping.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
3 ................................................................................................................................................
...................................................................................................................................................
4 ................................................................................................................................................
...............................................................................................................................................[4]
(c) Apart from not having to travel, describe four benefits to the customer of introducing on-line
shopping.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
3 ................................................................................................................................................
...................................................................................................................................................
4 ................................................................................................................................................
...............................................................................................................................................[4]
8 (a) When introducing a new computer system, phased implementation or direct changeover can
be used.
Describe each method and for each method, give one different advantage and disadvantage
compared with parallel running.
Phased
implementation .........................................................................................................................
...................................................................................................................................................
Advantage .................................................................................................................................
...................................................................................................................................................
Disadvantage ............................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Advantage .................................................................................................................................
...................................................................................................................................................
Disadvantage ............................................................................................................................
...............................................................................................................................................[6]
(b) Describe four items of program documentation that Oscar will provide.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
3 ................................................................................................................................................
...................................................................................................................................................
4 ................................................................................................................................................
...............................................................................................................................................[4]
Scenario 3
Questions 9 and 10
Omar is the owner of a small company which manufactures computers. He wishes to computerise the
stock control of his business.
He needs a system which will store records of all the computers his company makes. From time to time
he will need database reports to give him information about the computers he has in stock.
Examples of serial numbers for the computers are T123456, L342167, and P789456. The first letter in
the serial number is the type of computer and the first digit in the serial number is the manufacturer’s
number.
A B C
Manufacturer’s
1 Serial Number Type
number
2
3 T123456 T 1
4 L342167 L 3
5 P789456 P 7
Formulas are used in columns B and C to extract the data from the serial number.
As well as the serial number, the new system will store the price of each computer. His basic model,
which is the cheapest, sells for $300. The Impressor, which is the most expensive, sells for $1500.
He only sells tablet computers, laptops and PCs.
He has asked Louisa, a systems analyst, to analyse the current system and then design a new one.
9 (a) Write down the formula which Omar has used in cell B3.
...............................................................................................................................................[2]
(b) Write down the formula which Omar has used in cell C3.
...............................................................................................................................................[3]
10 (a) Using the data given in the scenario, describe three validation rules which would be designed
to check whether the data is acceptable or not.
Rule 1 .......................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Rule 2 .......................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Rule 3 .......................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[6]
(b) Discuss the benefits and drawbacks of interviews, questionnaires and observation for
collecting information about the existing system.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[6]
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
3 ................................................................................................................................................
...................................................................................................................................................
4 ................................................................................................................................................
...............................................................................................................................................[4]
(d) Louisa is recommending the use of an inkjet printer for printing the reports. Give two reasons,
compared to other printers, why she has done this.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...............................................................................................................................................[2]
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable
effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will
be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.
Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of
the examination. It shows the basis on which Examiners were instructed to award marks. It does not
indicate the details of the discussions that took place at an Examiners’ meeting before marking began,
which would have considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner
Report for Teachers.
Cambridge will not enter into discussions about these mark schemes.
Cambridge is publishing the mark schemes for the October/November 2015 series for most
Cambridge IGCSE®, Cambridge International A and AS Level components and some
Cambridge O Level components.
1 (a)
Flyers are usually produced using presentation software.
You can distribute them so that they only go to the people you want to see
them.
(b)
Posters are never defaced.
(c)
A small potential customer base is covered by using a website.
Websites are easier to update as you do not have to reprint the whole
advertisement.
[1]
(d)
Uses sound and video unlike flyers.
It would cost less to pay a company to produce this rather than produce
their own flyers.
[1]
2
They can pay the workers lower salaries.
It is easier to get all the workers together for meetings and briefings. [1]
Not so much money would have to be spent on the company’s utility bills.
Working less than the normal working hours of a full time employee
Working mornings or afternoons only, rather than a whole day
Working fewer days, rather than a full working week [2]
4 (a) Public calendars keep a record of meetings and appointments of all workers so that they can
all access it to arrange meetings [1]
Private calendar keeps a detailed record of meetings and appointments of a worker so that
only he/she can see these [1]
(b)
software advises when
clashes occur
Send emails
Send texts
Phone call
Instant messaging
Video call [4]
Two from:
Requires a dedicated telephony server (to connect the telephone network and the
computer network)
Operator’s phone communicates directly with the server
Operator’s phone is not directly connected to their computer
The server controls all the phones
The server can direct a call to the appropriate operator
Any computer in the system can control any phone [2]
Third party: Reason is because it is suitable for large call centres [1]
(c) Health risks arise from long term use of computers [1]
Two from:
Staring at a computer screen continuously can cause problems with one’s sight
Typing at a keyboard continuously can cause RSI
Gripping a mouse and repetitive clicking can cause carpal tunnel syndrome/RSI
Sitting in the same position/with wrong posture all day can cause lower back pain
Staring at a computer screen all day can cause eye strain/headaches
Poor positioning of screen can cause upper back/neck/shoulder pain/eyestrain/headaches
Glare from screen can cause eye strain/headaches [2 max]
Two from:
Do not have to spend time queuing in online shopping/going around different shops
Can shop at any time of day or night/at a convenient time for them
Can compare products and prices at their leisure/more easily
There will be a greater choice of goods
Items are usually cheaper as staff costs are lower/rental/running costs are lower than
shopping malls [4]
Phased implementation – implementing one part of the system while rest of system remains
unchanged/implementing system part by part
Advantage – Cheaper than parallel running as you do not employ two complete
sets of workers
Disadvantage – If there is a problem with the new system, only have bulk of old
system to fall back on/parallel running has whole system
Direct changeover – involves replacing the old system with the new system all in one
go/immediately/overnight
Advantage – Cheaper than parallel running as you don’t have to employ two
sets of workers (if not mentioned before)/quicker method of
implementation as there is no delay waiting for bugs to be fixed
/benefits of the new system become apparent immediately
Disadvantage – If there is a problem with the new system do not have old system
to fall back on [6]
9 (a) LEFT(A3,1)
LEFT – 1 mark
(A3,1) – 1 mark [2]
(b) MID(A3,2,1)
MID – 1 mark
(A3,2 – 1 mark
,1) – 1 mark [3]
Observation
Benefit –enables the systems analyst to see the process as a whole
Drawback – Description of the ‘Hawthorne effect’
Interviews
Benefits –
Interviewer can move away from their ‘script’ and ask a more in-depth question if a particular
response is given
Can interpret body language
Drawbacks –
Users have to be available at the time the systems analyst wants to interview them
May not have the time/can take a long time to interview all the users
Interviewees might try and provide answers which they think the interviewer wants to hear
Questionnaires
Benefits –
Answers tend to be, on the whole, more accurate
Everyone can complete the questionnaire at the same time instead of one after the other (as
with interviews)/can complete it at their leisure
Drawbacks -
They may give answers which are exaggerated as they are anonymous
Questions cannot be changed once they are typed up
Follow up questions cannot be asked
Inkjet printer produces higher quality printout than a dot matrix printer
They are faster for printing documents than dot matrix printers’
(They are easier to move than dot matrix printers)
Small company, so changing cartridges, which is not so necessary with laser printers and dot
matrix printers, is not an issue [2]
[Total:80]
Write your Centre number, candidate number and name on all the work you hand in.
Write in dark blue or black pen.
Do not use staples, paper clips, glue or correction fluid.
You may use an HB pencil for any diagrams, graphs or rough working.
DO NOT WRITE IN ANY BARCODES.
The number of marks is given in brackets [ ] at the end of each question or part question.
DC (KN) 114996/2
© UCLES 2016 [Turn over
2
Scenario 1
Questions 1, 2 and 3.
Individuals and businesses use different types of internet auctions to buy and sell goods.
Buyers can use the auction website to search, look at and buy items that are offered for sale by
individuals or businesses.
Buyers can pay sellers for the items using credit cards.
Buyers can also use other ways of paying for the goods.
1 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
3 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[6]
(b) Explain why buyers might be worried about using internet auctions to buy goods.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[4]
2 (a) Explain the advantages to a buyer of using a credit card to pay for goods purchased using
an internet auction.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[5]
(b) Explain the disadvantages to a seller of allowing buyers to use a credit card to pay for goods
purchased using an internet auction.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[4]
3 Describe other ways that a buyer can safely pay for goods purchased using an internet auction.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[4]
BLANK PAGE
Scenario 2
Questions 4, 5 and 6.
A supermarket uses a computerised stock control system to try to ensure that it has enough items to
sell. Each item stocked by the supermarket has its own linear (one-dimensional) barcode, for example:
The supermarket is considering adding matrix (2D or two-dimensional) barcodes to the items, for
example:
Customers may use a manned POS checkout to pay for the items when they have finished their
shopping. The supermarket also provides a facility for customers who wish to scan the items themselves
before paying at a self-service kiosk.
Customers can use a hand-held ‘scan and go’ device or a mobile phone for self-service scanning.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[5]
(b) Describe the benefits of adding matrix barcodes on the items in the supermarket.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[4]
5 Describe how a customer would make use of the hand-held ‘scan and go’ system in order to be
able to pay for items at a self-service kiosk.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[4]
6 Describe the benefits and drawbacks of the use of self-service systems in supermarkets.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[6]
BLANK PAGE
Scenario 3
Questions 7 and 8.
A group of scientists are studying the plant life found in a remote area of rain forest.
The scientists have access to an expert system created especially to assist them when identifying the
plants.
7 (a) Explain four benefits to the scientists of using the expert system to assist them in identifying
the plants.
1 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
3 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
4 ................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[4]
(b) Explain four drawbacks to the scientists of using the expert system to assist them in
identifying the plants.
1 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
3 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
4 ................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[4]
8 (a) Describe how the knowledge base is set up with the facts required to identify plants.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[4]
(b) Explain how each of the following is used by the inference engine to identify a plant.
(i) forward-chaining
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[3]
(ii) backward-chaining
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[3]
BLANK PAGE
Scenario 4
A school has a computer network for use by the staff and students. A file server stores the details of the
students and their academic progress. The staff are issued with a user name (user ID) and a password
so that they can access the student details over the network and over the internet.
The school network, protected by a firewall, allows internet access and the staff and students can use
the World Wide Web via a proxy server.
The geography teachers at the school use information and communication technology (ICT) in their
teaching.
9 Discuss the benefits and drawbacks to the students of being taught geography by the use of ICT.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[8]
10 Explain how each of the following helps to keep student data held on the school network, from
being accessed by unauthorised users.
(a) a firewall
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[3]
(b) encryption
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[3]
11 Explain why the school’s internet access is routed via a proxy server.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[6]
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable
effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will
be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.
Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.
Published
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.
Cambridge will not enter into discussions about these mark schemes.
Cambridge is publishing the mark schemes for the May/June 2016 series for most Cambridge IGCSE®,
Cambridge International A and AS Level components and some Cambridge O Level components.
Ascending bid auction with all bids open for all bidders to see
…time limitation on bidding process
…buyers bid on item and highest bid gets the item
…bid (usually) has to meet reserved price
Descending bid auction price starts high but is lowered until a bid is accepted by seller
Single/first-price sealed bid auction where bids not viewable by all buyers
…highest bid gets the item
Second price sealed bid auction where highest bidder pays price bid by the second highest
bid
Reverse auction which has multiple sellers competing…
…on prices to attract buyers
Bidding fee auction where buyers pay to bid on items
…lowest unique bid wins
Business-to-individual auctions where businesses auction items to individuals
Individual-to-individual auctions where individuals sell to other individuals
…buy it now option
There is no need to send cash in the postal system so it can’t get lost/stolen in transit
Currency transactions are done by the company so no need for exchange by buyer/no need
to worry about changing currencies
Credit card details are often stored on the auction site so cannot be intercepted during
payment
Seller is guaranteed payment by credit card company so there is no delay before goods are
sent/seller receives money quickly
Buyer does not have to pay the full amount at once/can spread payments
Consumer protection in many countries means that if goods faulty/do not arrive then money
can be claimed from credit card company.
Credit card company will make a charge for each transaction so increased costs to seller
Cost of equipment/administration fees to process credit card transactions
Buyers can request a chargeback if dissatisfied up to six months after the transaction
…seller has to spend time/money proving that the purchase was legitimate
Credit card might be stolen/cloned so payment is refused/ reclaimed after the goods sent out
Third-party/escrow:
Buyer orders/buys goods and securely pays third-party
Third-party holds the payment
Third-party tells seller that payment has been received and goods can be despatched
Buyer receives goods and inspects to ensure that the goods are satisfactory
Third-party releases payment to seller
Debit cards:
Use of debit cards to immediately transfer cost from buyer account to seller account
Online banking to directly transfer of funds from buyer to seller bank account
Use of vouchers:
Use of vouchers/tokens purchased from auction site to pay for goods
Use of cheques (which is a promise to pay) to pay before shipping/wait for clearance of cheque
before shipping
Cash with payment on delivery
Information represents:
Manufacturer code to identify the manufacturer of the item
Country of origin code to identify the country of origin of item
Universal Product Code (UPC) with a number of digits (12) that uniquely identify the item
Product code to uniquely identify the item
Checksum/check digits to ensure data integrity
Benefits:
Less staff required at checkout so reduced labour costs
… one staff member can look after 4 self-service kiosks
Reduced floor space taken up by kiosk so more space for goods
… one self-service kiosk takes up 20% of normal checkout space
Customers with few items can check out more quickly since reduced queuing time/more
checkouts…
… more customers can be served in given time leading to greater profits
Customers are not embarrassed when buying personal items/do not have enough money to pay
for all the goods
Drawbacks:
Increased incidence of theft from store leading to increased prices
Loss of personal touch/contact by customers with checkout staff
Customers can be irritated by failure to scan/identify the item being purchased/need to check age
of customer…
…staff member is required
…time taken to remove security tags on expensive items can slow the process of checkout
Spot checks of users required
…triggered by too few items/previous history/unusual purchases/first use
Disabled customers may have difficulties using the system
Expert system does not identify new species of plant/plants not known to science
Expert system needs to be up-to-date to provide the most useful information for the scientists
to use
Scientists need to be trained to use the system
Expert system follows rules while scientists might have “insight”/use common sense
Can lead to demotivation/less thought process by scientists
Updating may take the system offline and make it unavailable
Expert system may not function/may fail in remote area so become unavailable
[Total: 80]
Write your Centre number, candidate number and name on all the work you hand in.
Write in dark blue or black pen.
Do not use staples, paper clips, glue or correction fluid.
You may use an HB pencil for any diagrams, graphs or rough working.
DO NOT WRITE IN ANY BARCODES.
The number of marks is given in brackets [ ] at the end of each question or part question.
DC (NF/CGW) 126909/1 R
© UCLES 2016 [Turn over
2
Scenario 1
Questions 1, 2, 3, 4, 5, 6 and 7
A2Z is a company which specialises in developing new drugs for treating human illnesses.
They use a supercomputer in their research.
Daniel works as a publisher for the company and produces a monthly magazine.
The magazine contains articles about the research being carried out both in the laboratories and at
research sites around the world.
Daniel employs a number of reporters to write the articles for the magazine. The reporters are expected
to gather information from the scientists.
Articles may be produced in the offices or while travelling but have to be sent to Daniel in time for
publication in both hardcopy and electronic formats.
1 Give reasons why a reporter would use each of these input devices when preparing their articles.
(i) A4 scanner
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
(ii) microphone
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
2 Describe the limitations of using a laptop for creating an article and sending it to Daniel.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[4]
3 The resources gathered by the reporters are used by Daniel to produce the article as an automated
document.
Describe how Daniel would do this.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[4]
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[4]
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[4]
6 A reporter, Victoria, wants to gather information by interviewing some of the scientists by telephone.
Victoria will also use email to ask questions of other scientists.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[6]
(b) Discuss the advantages and disadvantages of using email rather than face-to-face interviewing
to gather information from the scientists.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[6]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[4]
BLANK PAGE
Scenario 2
Questions 8 and 9
SRCo is a scientific research company that employs a number of skilled technicians to support the
scientists in its laboratories. The technicians may work in more than one laboratory depending on the
needs of the scientists.
The company has a human resources department that keeps a database. The database stores details
of the technicians. The human resources department issues each technician with an identity badge.
Jasmine works in the human resources department where her job is to create a new record in the
database and issue a badge to a technician when they join the company.
8 (a) Explain why Jasmine would need to use each of the input devices below when she creates a
new record in the database.
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[1]
(ii) keyboard
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[1]
(b) (i) When a database is created, the fields in the database are usually assigned a data type.
Explain why it is necessary to assign a data type to a field.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[2]
(ii) The details of each technician are stored in fields in the database. For each of the fields
shown, complete the table to give the most appropriate data type and a reason for
using that type.
Details stored in the Most appropriate data type Reason for using the
field in the database used for that field chosen type
Technician’s last
name
Technician’s gender
[2]
(iii) Explain why it is not appropriate to use a ‘numeric’ data type for the field in the database
that stores the telephone number of the technician.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[2]
9 Part of the database used by the human resources department is shown in the diagram below.
(a) Explain why the human resources department uses a relational database rather than a flat
file database for storing the technician details.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[4]
(b) Explain the relationship between the Technician table and the JobRole table.
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[1]
(c) Explain the relationship between the JobRole and the JobTitle table.
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[1]
(d) When Jasmine enters the details of a newly employed technician, the details are verified and
validated. Explain, with examples from the database, why both validation and verification of
the details are necessary.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[6]
BLANK PAGE
Scenario 3
KemCo is a chemical company that develops, manufactures and markets fertilizers for growing crops.
Colin, the marketing manager, uses computer-based financial models to assess whether or not the
company should develop, manufacture and market a new fertilizer.
Once the fertilizer is ready to sell, Colin uses primary and secondary marketing techniques to help him
market the fertilizer.
10 Describe how Colin could use a financial model to assess whether or not it would be profitable to
produce a new fertilizer.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[6]
11 The fertilizer manufacturing process is dependent on temperature and pH. Alkali is used to raise
the pH of the fertilizer in the vessel. A diagram of the process is shown below. A microprocessor is
connected to the sensors, valve and heater.
Vessel with
Temperature fertilizer
sensor
pH sensor
Heater
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[8]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
(b) Describe how Colin could use computer-based research techniques to carry out primary
research.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[6]
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable
effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will
be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.
Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.
Published
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.
Cambridge will not enter into discussions about these mark schemes.
Cambridge is publishing the mark schemes for the May/June 2016 series for most Cambridge IGCSE®,
Cambridge International A and AS Level components and some Cambridge O Level components.
Difficulties when viewing/creating the article on laptops which generally have smaller screens and
keyboards presenting
Image processing can be slower on laptops which usually have lower specification/ slower
processors / less memory (RAM)/ smaller hard drive with slower access times for the same cost
as e.g. desktop computer
Laptops are inherently more vulnerable to damage and theft so more risk of loss of article
Power management issues e.g. limited battery life so more difficult to manage when away from
office
Connecting to outside networks may require configuration skills/more technical skill to connect
when away from office
Repairs are more difficult than when away from office/traveling
Benefits:
Reduction in time taken from conception to publication
Storage space for the product/assets is virtually unlimited
Fewer overheads e.g. distribution costs means lower cost of production
Distribution of electronic publications is faster than printed/hardcopy
Can include links/multimedia to illustrate/enhance the content
Drawbacks:
Different formats exist so magazine has to be made available in several formats
Content is not secure compared to printed format/content can be copied more easily
Perceived lack of ‘quality’ in electronic publications
Benefits:
There is no significant time delay between question and answer
Interviewer can more easily ask extension questions based on answers
…that can add to the verbal answer from the interviewee/scientist
People from all over the globe can be interviewed
Enables interviewers/reporters to contact people in restricted areas e.g. laboratories for
medical research
No need to travel/no travel costs for reporter
No time wasted by reporter in travelling to interview
Interview can easily be recorded for later transcription/reference
Drawbacks:
The reduction of social cues/cannot see interviewee so e.g. body language/eye contact
cannot be used as a source of extra information
The interviewer has no knowledge of the situation in which the interviewee is situated
…so less able to create a good interview ambience
Telephone line quality can affect responses
Easier for interviewee/scientist to find excuse/make up excuse/find reasons to terminate the
interview
Advantages:
Can interview scientists that are not easy to access e.g. in restricted areas
Easier to ask lengthy questions that require a detailed response
Can use emoticons
The lack of nonverbal and social cues can reduce miscommunication due to cultural diversity
Reporter/scientist has some degree of anonymity so reporter may get more information from
scientist
Reporter has time to formulate questions/scientist has time to construct reply
No need to travel/no travel costs for reporter
No time wasted by reporter in travelling to interview
Interview dialogue/exchange/emails easily kept for reference
Can use translating tools to interview in different/foreign languages
Disadvantages:
The reduction of social cues/cannot see interviewee so e.g. body language/eye contact
cannot be used as a source of extra information
The interviewer has no knowledge of the situation in which the interviewee is situated
…so less able to create a good interview ambience
Reporter has to adapt to email style of scientist
Reporter has to wait for reply which might be a long time
Scientist may never reply/may terminate the contact without notice
Reporter may have to send reminders
Needed to type/enter characters to input details of new technician into the database
…not practical to have the computer spend time processing the data to determine how
best to store it
Allows validation rules to be easily applied to the data
…determines/places constraints on the values that are possible in a field
…to ensure the integrity of the data
Makes it easier to determine other properties of the field
…e.g. format of data within the field/maximum size of a field value/use of the field data in
expressions/ whether or not the field can be indexed/size of the database
Allows use of storage space to be optimised
(ii) Two from (one mark for a matching data type and a valid reason): [2]
Telephone numbers may contain spaces; spaces are not numbers so could not be
entered
Telephone numbers may contain letters, letters are not numbers so could not be entered
There is no need/requirement for mathematical calculations on telephone numbers
Some telephone numbers have a leading zero which makes it text
Some telephone numbers have a leading plus/+ which makes it text
Data is stored only once/one record per technician/avoids data duplication so less storage
space is needed
Data is stored only once/one record per technician no need to update multiple
records/deletion or modification of data is simpler/quicker
…changes are cascaded to other tables
Complex queries can be carried out by extracting data from multiple tables
Enhanced security access to tables can be restricted on individual table basis
Database can be expanded easier than a flat file database by adding new tables and
creating new links
Ensures referential data integrity
(b) One-to-many because each technician has more than job role [1]
(c) one-to-one each job role has only one title [1]
Data may be invalid although it has been copied correctly e.g. wrong number of characters in
post_code
Data may not have been copied correctly but may be valid e.g. telephone number/area code
copied incorrectly
The stored data on the technician has to be accurate so that decisions based on the data are
appropriate/use of the data is appropriate.
Sensors collect analogue data about the temperature and pH in the vessel/vat
Data from sensors is converted from analogue to digital using ADC
Microprocessor continuously monitors data from sensors/process is repeated/continues until
fertiliser is made
Microprocessor compares data from temperature sensor with pre-set value
…if temperature in vessel/vat is lower than pre-set value microprocessor sends signal to turn on
heater
…if temperature in vessel/vat is higher than pre-set value microprocessor sends signal to turn off
heater
Microprocessor uses actuators to turn heater on/off
Microprocessor uses actuators to open/close valve
Data from sensors is converted to analogue from digital using DAC
Microprocessor compares data from pH sensor with pre-set value
…if pH in vessel/vat is lower than pre-set value microprocessor sends signal to motor to open
valve to allow in more alkali
…if pH in vat is higher than pre-set value microprocessor sends signal to motor to close valve to
stop flow of alkali
Primary research is gathering new data that has not been collected before.
Secondary research is the use of existing data that has already been produced.
[Total: 80]
Write your Centre number, candidate number and name on all the work you hand in.
Write in blue or black pen.
Do not use staples, paper clips, glue or correction fluid.
You may use an HB pencil for any diagrams, graphs or rough working.
DO NOT WRITE IN ANY BARCODES.
The number of marks is given in brackets [ ] at the end of each question or part question.
DC (NF/FD) 114998/3
© UCLES 2016 [Turn over
2
Scenario 1
Questions 1 and 2
Mytoy is a manufacturing company that specialises in making toys for young children.
Mytoy has a number of sales personnel who take orders for toys from shops which they visit.
Each sales person uses a laptop computer which is loaded with word processing software.
When a sales person takes an order from a shop, a large amount of sensitive information such as details
of the shop’s bank account is collected. The sales personnel have social and ethical responsibilities
when collecting this information.
Mytoy have decided to expand its business by selling direct to the public. Members of the public will
be able to telephone their orders to Mytoy’s large call centre. Customers will have the option to leave a
telephone message stating their requirements. Mytoy may ring back or send an email message if that
would be more appropriate.
1 (a) Describe each of the following portable devices which a sales person could use and for each
one give a different use to which it could be put.
Mobile phone:
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
DVD player:
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [6]
(b) Describe three social or ethical implications that the sales personnel should be aware of
when collecting information from the shops.
1 ...............................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
2 ...............................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
3 ...............................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [6]
(c) Apart from a word processor, give three other types of application software which you would
expect to be loaded onto each laptop, describing two uses of each. Each use must be
different.
1 ...............................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
2 ...............................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
3 ...............................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [6]
2 (a) The call centre system for dealing with customer calls uses third party control with CTI
software on its telephony server. Describe this system and how it would deal with customer
calls.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [6]
(b) (i) Explain why a customer needs to take care before opening an email.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...................................................................................................................................... [3]
(ii) Describe how the customer may be able to tell if there is a potential problem with the
email.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...................................................................................................................................... [3]
Scenario 2
Question 3
For many years, the bank has been very successful, but it has recently been losing customers to banks
that offer online banking.
Townbank decide to employ Hardeep, a systems analyst, to oversee the introduction of a new system
to their business.
3 (a) Hardeep uses the following methods of data collection to research the present situation.
Describe a benefit and a drawback of each method for finding out information in this scenario.
(i) Observation:
Benefit: ..............................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
Drawback: ..........................................................................................................................
...........................................................................................................................................
...................................................................................................................................... [2]
(ii) Questionnaires:
Benefit: ..............................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
Drawback: ..........................................................................................................................
...........................................................................................................................................
...................................................................................................................................... [2]
(iii) Interviews:
Benefit: ..............................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
Drawback: ..........................................................................................................................
...........................................................................................................................................
...................................................................................................................................... [2]
(b) Hardeep produces the following system flowchart to describe one of the processes.
Deduct amount
Cheque from customer Store
account transaction
on
customer
Add amount to file
recipient
account
Statement
Describe the uses of the different symbols and explain the process that is represented.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [6]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...................................................................................................................................... [3]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...................................................................................................................................... [3]
Scenario 3
Questions 4 and 5
Webuild is a building company which specialises in building blocks of apartments for people to live in.
Each apartment has a computer-controlled central heating system installed.
Workers are paid weekly. Webuild’s financial department uses a batch processing system to produce
the payroll each week.
Webuild keeps stocks of various building materials in its warehouse. It is Cenko’s job to ensure that
Webuild do not run out of materials. To help her in this task she uses a database. The database contains
a number of files, one of which is the ITEM file and another is the SUPPLIER file.
4 (a) Explain how the temperature in an apartment is controlled by the computer-controlled central
heating system.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [6]
(b) (i) Explain why the finance department use a set of sequential files rather than random
access files to produce the payroll.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...................................................................................................................................... [4]
(ii) Describe two problems that may arise because of the use of sequential access files.
1 .......................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
2 .......................................................................................................................................
...........................................................................................................................................
...................................................................................................................................... [2]
ItemName Boiler
NumberInStock 236
Price $499.95
ItemLocation 06:71:03
MinimumStock 100
SupplierName
SupplierAddress
SupplierEmail
DiscountOnPrice
OrderPlaced
(a) Complete both tables with the most appropriate data types for each field. For each numeric
field, specify the numeric type. [5]
(b) In order for the database to work as a relational database at least one more field needs to be
added.
Describe this field and explain why this is necessary.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [4]
(c) State and describe appropriate validation checks that would be carried out on the ITEM file
data as it is entered. You can describe different validation checks for the same field.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [5]
Scenario 4
Question 6
The government department responsible for education in a particular country is called Edmin.
A group of college teachers has been commissioned by Edmin to produce a detailed report on the
teaching of ICT in colleges. The secretary of the group has been asked to type the first draft of the
report.
6 Explain how the secretary can allow other members of the group to add comments to the first draft
of the report while maintaining control over the final content.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..................................................................................................................................................... [6]
BLANK PAGE
BLANK PAGE
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable
effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will
be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.
Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.
Published
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.
Cambridge will not enter into discussions about these mark schemes.
Cambridge is publishing the mark schemes for the May/June 2016 series for most Cambridge IGCSE®,
Cambridge International A and AS Level components and some Cambridge O Level components.
1 (a) [6]
Mobile phone:
A phone that can make/receive calls/messages while the user is on the move
To stay in contact with head office/shops/ to store his appointments/store phone numbers of
shops/colleagues/to phone shop if going to be late for an appointment
DVD player:
Two from:
Salesperson should have a duty of confidence
Salesperson should sign a confidentiality agreement
Must keep the details of orders confidential
Must not share data collected with any other person or organisation
Must treat the information as confidential/it must be obvious to them that the information is
given in confidence
Two from:
Salesperson should have a duty of fidelity
Must be loyal to Mytoy…
…for as long as they are employed
Must not give information (about new toys/customers) to a rival company
Employee is free to use skills and knowledge acquired from company after they leave them
Two from:
MyToy should anonymise information wherever possible
MyToy should aggregate information wherever possible
Limited amount of information should be collected/transmitted
Two from:
MyToy and its employees must abide by the Data Protection Act
Any 2 examples of a DPA principle
Database
Two from:
Used to store customer/toy shop data
Used to store customer orders
Salesperson can prepare for visit with knowledge of customer details
Sales/orders can be added to/edited during the course of a visit
Customer details can be added to/edited during the course of the visit
Charts produced showing sales per shop
Spreadsheet
Two from:
When an order is taken the salesperson will use the spreadsheet to calculate the cost of the
order
Can be used to provide an invoice for the customer
Can be used to show trends of customer sales
Web browser
Two from:
Allows the salesperson to show the customer information/images that will answer questions
about toys
Can be used by salesperson to look up customer’s web site to prepare for visit
Email software
Two from:
Allows salesperson to send emails to head office
Can email customer/store to confirm planned visit
Can email customer/store to confirm orders
Presentation software
Two from:
To advertise new products to customers/stores
To show details of all the products to customers/stores
To show potential earnings to customers/stores
To enable salespeople to be kept up to date with training presentations
To create slideshows of products to show customers/shops
To create slideshows to show sales progress to managers
Benefit
Enables the systems analyst to see the process as a whole
Drawback
Explanation of the ‘Hawthorne effect’
Benefit
Answers tend to be, on the whole, more accurate/everyone can complete the
questionnaire at the same time instead of one after the other (as with interviews)/can
complete it at their leisure
Drawback
It is very difficult to ask further questions based on the response to another question/can
be anonymous and so may not be taken seriously by user
Benefit
Interviewer can move away from their ‘script’ and ask a more in-depth question if a
particular response is given/can interpret body language
Drawback
Users have to be available at the time the systems analyst wants to interview them/may
not have the time/can take a long time to interview all the users
Interviewees might try and provide answers which they think the interviewer wants to
hear
All records will be processed when the payroll is run/no records will be missed
They need to be in same order as master file
Processing time will be reduced
Payroll uses batch processing and sequential files are better suited to batch processing
5 (a)
Field Name Data Type Example data
ItemName Text Boiler
NumberInStock Integer 236
Price Currency $14.95
ItemLocation Text 06:71:03
MinimumStock Integer 100
A field that will be common to both the ITEM table and the SUPPLIER table
A field which will contain unique data
Needed to act as the link field between the tables
Acts as the key field in the Item/Supplier table
Acts as foreign key in the Supplier/Item table
Published
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.
Cambridge will not enter into discussions about these mark schemes.
Cambridge is publishing the mark schemes for the May/June 2016 series for most Cambridge IGCSE®,
Cambridge International A and AS Level components and some Cambridge O Level components.
1 (a) [6]
Mobile phone:
A phone that can make/receive calls/messages while the user is on the move
To stay in contact with head office/shops/ to store his appointments/store phone numbers of
shops/colleagues/to phone shop if going to be late for an appointment
DVD player:
Two from:
Salesperson should have a duty of confidence
Salesperson should sign a confidentiality agreement
Must keep the details of orders confidential
Must not share data collected with any other person or organisation
Must treat the information as confidential/it must be obvious to them that the information is
given in confidence
Two from:
Salesperson should have a duty of fidelity
Must be loyal to Mytoy…
…for as long as they are employed
Must not give information (about new toys/customers) to a rival company
Employee is free to use skills and knowledge acquired from company after they leave them
Two from:
MyToy should anonymise information wherever possible
MyToy should aggregate information wherever possible
Limited amount of information should be collected/transmitted
Two from:
MyToy and its employees must abide by the Data Protection Act
Any 2 examples of a DPA principle
Database
Two from:
Used to store customer/toy shop data
Used to store customer orders
Salesperson can prepare for visit with knowledge of customer details
Sales/orders can be added to/edited during the course of a visit
Customer details can be added to/edited during the course of the visit
Charts produced showing sales per shop
Spreadsheet
Two from:
When an order is taken the salesperson will use the spreadsheet to calculate the cost of the
order
Can be used to provide an invoice for the customer
Can be used to show trends of customer sales
Web browser
Two from:
Allows the salesperson to show the customer information/images that will answer questions
about toys
Can be used by salesperson to look up customer’s web site to prepare for visit
Email software
Two from:
Allows salesperson to send emails to head office
Can email customer/store to confirm planned visit
Can email customer/store to confirm orders
Presentation software
Two from:
To advertise new products to customers/stores
To show details of all the products to customers/stores
To show potential earnings to customers/stores
To enable salespeople to be kept up to date with training presentations
To create slideshows of products to show customers/shops
To create slideshows to show sales progress to managers
Benefit
Enables the systems analyst to see the process as a whole
Drawback
Explanation of the ‘Hawthorne effect’
Benefit
Answers tend to be, on the whole, more accurate/everyone can complete the
questionnaire at the same time instead of one after the other (as with interviews)/can
complete it at their leisure
Drawback
It is very difficult to ask further questions based on the response to another question/can
be anonymous and so may not be taken seriously by user
Benefit
Interviewer can move away from their ‘script’ and ask a more in-depth question if a
particular response is given/can interpret body language
Drawback
Users have to be available at the time the systems analyst wants to interview them/may
not have the time/can take a long time to interview all the users
Interviewees might try and provide answers which they think the interviewer wants to
hear
All records will be processed when the payroll is run/no records will be missed
They need to be in same order as master file
Processing time will be reduced
Payroll uses batch processing and sequential files are better suited to batch processing
5 (a)
Field Name Data Type Example data
ItemName Text Boiler
NumberInStock Integer 236
Price Currency $14.95
ItemLocation Text 06:71:03
MinimumStock Integer 100
A field that will be common to both the ITEM table and the SUPPLIER table
A field which will contain unique data
Needed to act as the link field between the tables
Acts as the key field in the Item/Supplier table
Acts as foreign key in the Supplier/Item table
Write your Centre number, candidate number and name on all the work you hand in.
Write in blue or black pen.
Do not use staples, paper clips, glue or correction fluid.
You may use an HB pencil for any diagrams, graphs or rough working.
DO NOT WRITE IN ANY BARCODES.
The number of marks is given in brackets [ ] at the end of each question or part question.
DC (SG/FD) 126927
© UCLES 2016 [Turn over
2
Scenario 1
Questions 1 and 2
Mytoy is a manufacturing company that specialises in making toys for young children.
Mytoy has a number of sales personnel who take orders for toys from shops which they visit.
Each sales person uses a laptop computer which is loaded with word processing software.
When a sales person takes an order from a shop, a large amount of sensitive information such as details
of the shop’s bank account is collected. The sales personnel have social and ethical responsibilities
when collecting this information.
Mytoy have decided to expand its business by selling direct to the public. Members of the public will
be able to telephone their orders to Mytoy’s large call centre. Customers will have the option to leave a
telephone message stating their requirements. Mytoy may ring back or send an email message if that
would be more appropriate.
1 (a) Describe each of the following portable devices which a sales person could use and for each
one give a different use to which it could be put.
Mobile phone:
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
DVD player:
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [6]
(b) Describe three social or ethical implications that the sales personnel should be aware of
when collecting information from the shops.
1 ...............................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
2 ...............................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
3 ...............................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [6]
(c) Apart from a word processor, give three other types of application software which you would
expect to be loaded onto each laptop, describing two uses of each. Each use must be
different.
1 ...............................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
2 ...............................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
3 ...............................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [6]
2 (a) The call centre system for dealing with customer calls uses third party control with CTI
software on its telephony server. Describe this system and how it would deal with customer
calls.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [6]
(b) (i) Explain why a customer needs to take care before opening an email.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...................................................................................................................................... [3]
(ii) Describe how the customer may be able to tell if there is a potential problem with the
email.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...................................................................................................................................... [3]
Scenario 2
Question 3
For many years, the bank has been very successful, but it has recently been losing customers to banks
that offer online banking.
Townbank decide to employ Hardeep, a systems analyst, to oversee the introduction of a new system
to their business.
3 (a) Hardeep uses the following methods of data collection to research the present situation.
Describe a benefit and a drawback of each method for finding out information in this scenario.
(i) Observation:
Benefit: ..............................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
Drawback: ..........................................................................................................................
...........................................................................................................................................
...................................................................................................................................... [2]
(ii) Questionnaires:
Benefit: ..............................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
Drawback: ..........................................................................................................................
...........................................................................................................................................
...................................................................................................................................... [2]
(iii) Interviews:
Benefit: ..............................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
Drawback: ..........................................................................................................................
...........................................................................................................................................
...................................................................................................................................... [2]
(b) Hardeep produces the following system flowchart to describe one of the processes.
Deduct amount
Cheque from customer Store
account transaction
on
customer
Add amount to file
recipient
account
Statement
Describe the uses of the different symbols and explain the process that is represented.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [6]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...................................................................................................................................... [3]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...................................................................................................................................... [3]
Scenario 3
Questions 4 and 5
Webuild is a building company which specialises in building blocks of apartments for people to live in.
Each apartment has a computer-controlled central heating system installed.
Workers are paid weekly. Webuild’s financial department uses a batch processing system to produce
the payroll each week.
Webuild keeps stocks of various building materials in its warehouse. It is Cenko’s job to ensure that
Webuild do not run out of materials. To help her in this task she uses a database. The database contains
a number of files, one of which is the ITEM file and another is the SUPPLIER file.
4 (a) Explain how the temperature in an apartment is controlled by the computer-controlled central
heating system.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [6]
(b) (i) Explain why the finance department use a set of sequential files rather than random
access files to produce the payroll.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...................................................................................................................................... [4]
(ii) Describe two problems that may arise because of the use of sequential access files.
1 .......................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
2 .......................................................................................................................................
...........................................................................................................................................
...................................................................................................................................... [2]
ItemName Boiler
NumberInStock 236
Price $499.95
ItemLocation 06:71:03
MinimumStock 100
SupplierName
SupplierAddress
SupplierEmail
DiscountOnPrice
OrderPlaced
(a) Complete both tables with the most appropriate data types for each field. For each numeric
field, specify the numeric type. [5]
(b) In order for the database to work as a relational database at least one more field needs to be
added.
Describe this field and explain why this is necessary.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [4]
(c) State and describe appropriate validation checks that would be carried out on the ITEM file
data as it is entered. You can describe different validation checks for the same field.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [5]
Scenario 4
Question 6
The government department responsible for education in a particular country is called Edmin.
A group of college teachers has been commissioned by Edmin to produce a detailed report on the
teaching of ICT in colleges. The secretary of the group has been asked to type the first draft of the
report.
6 Explain how the secretary can allow other members of the group to add comments to the first draft
of the report while maintaining control over the final content.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..................................................................................................................................................... [6]
BLANK PAGE
BLANK PAGE
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable
effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will
be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.
Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.
Published
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.
Cambridge will not enter into discussions about these mark schemes.
Cambridge is publishing the mark schemes for the May/June 2016 series for most Cambridge IGCSE®,
Cambridge International A and AS Level components and some Cambridge O Level components.
2 (a)
Field Name Data Type
IngredientName Alphanumeric
NumberInStock Integer
Price Currency
UseBy Date
InStock Boolean
IngredientName: The items stored will use letters of the alphabet and possibly include
numbers in the name
NumberInStock: Will always be a whole number/no decimals involved/will need to do
calculations on the field
Price: Will be a numeric value with a currency symbol/ will need to do calculations on the
field but result will always need a currency symbol
UseBy: Will always need to be in a date format/to make it easier to identify/can calculate
when a product is out of date
InStock: Only two possible answers, Yes or No
Sensors used to input values from experiments e.g. temperature sensor when experimenting
with hot liquids
Safer than student doing this in hazardous situation/will take readings more
regularly/accurately
Data held shall be adequate and relevant for the purpose though not excessive
To protect Rose in that the data held is sufficient for the purpose it is being held for/a greater
amount of information than needed for the purpose is not being held
Not transferred to countries outside that country unless it has adequate protection for the
individual interests of the individual or another person
So Rose is not exposed to more liberal interpretation of data protection
Attach files to email messages so that students can send their work
Compress files so that large files like videos of experiments can be sent
Use of anti-virus software to check attachments
Use CC to allow student to send same message to other students
Use BCC to allow a copy to be sent to a teacher without the other members of the group knowing
Use forward to allow work received to be sent on to others
Use groups so that the student could write the name of the group and the message is sent to all
in the group/how to send emails to groups/set up groups
Invoice
Order of cream
Diagram represents the flow of data through the Creamclot ordering system
7 (a) (i) Tape only allows records to be read one after the other/serially [1]
(ii) The read/write head can access records in any order [1]
Write your Centre number, candidate number and name on all the work you hand in.
Write in dark blue or black pen.
Do not use staples, paper clips, glue or correction fluid.
You may use an HB pencil for any diagrams, graphs or rough working.
DO NOT WRITE IN ANY BARCODES.
The number of marks is given in brackets [ ] at the end of each question or part question.
DC (NF/FD) 114999/3
© UCLES 2016 [Turn over
2
Scenario 1
Questions 1, 2 and 3
Vegburger is a chain of fast-food restaurants. The management of the chain has decided that it is
necessary to update its image.
As part of the update it has been decided to rebrand all stationery used by the chain. A master
document using a corporate house style is to be designed from which all hard copy communications
will be printed.
Vegburger keep stocks of various ingredients for the food used in the restaurants, in their warehouse.
It is Li’s job to ensure that the warehouse does not run out of ingredients. To help her in this task she
uses two files, one of which is the INGREDIENT file and the other is the SUPPLIER file.
Li stores alterations to the files on a transaction file which she uses to update the other two files at
the end of each day. After updating the files the INGREDIENT file is printed in alphabetic order of
IngredientName. Sometimes Li needs to find the details about a particular ingredient quickly.
1 Describe the features of the master document that would help project the corporate image.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..................................................................................................................................................... [6]
Give a reason for the choice of data type for each of the fields.
IngredientName:
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
NumberInStock:
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Price:
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
UseBy:
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
InStock:
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [5]
(b) Li wishes to use the INGREDIENT and SUPPLIER files to find the contact details of the
supplier for a specific ingredient.
Describe how the files can be used to create a relational database which would enable her to
do this.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [5]
3 (a) Explain why the INGREDIENT file is stored as an indexed sequential file.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [4]
(b) Describe the type of file access the transaction file uses and give a reason for your answer.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [2]
Scenario 2
Questions 4 and 5
Rose is a teacher in a college. She specialises in teaching science. The students in her classes use
computers, each with a keyboard and a mouse.
Rose needs to be aware of safety issues when her students are using computers in the science
laboratory.
As part of her job, it is necessary for Rose to store a large amount of personal data about her students.
In addition, the college authorities store data about Rose. Both Rose and the college authorities are
covered by the data protection legislation in the country.
Rose needs to teach her students to use email so that they can communicate with teachers and other
students when doing project work at home.
4 (a) Apart from a keyboard and mouse, describe other input devices which Rose could encourage
her students to use in their science lessons and for each one give a reason why it would be
used.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [6]
(b) Describe four measures that Rose could take to minimise safety issues in the science
laboratory when her students are using computers.
1 ...............................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
2 ...............................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
3 ...............................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
4 ...............................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [4]
(c) Describe three principles that could be included in the data protection legislation and for each
one explain why it is necessary.
1 ...............................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
2 ...............................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
3 ...............................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [6]
Describe other ICT skills that her students should understand in order to be able to use email
appropriately.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..................................................................................................................................................... [6]
Scenario 3
Questions 6 and 7
Creamclot is a small company that produces cream for sale through a number of shops in local towns.
Jose has employed Juanita, a systems analyst, to oversee the introduction of the new system. Juanita
has decided that customers will telephone their orders to the company.
6 (a) Juanita has produced a level 0 DFD for the new system.
Order and
Customers Order of cream
invoice sent
Order details
Order phoned
Order processed
Invoice
With reference to the symbols and the labelling explain what the diagram represents.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [5]
(b) Before creating the new system, Juanita will need to design it. One element of the design will
be specifying the required hardware and software.
Describe four other sections that will be found in the design and for each one explain why it is
necessary.
1 ...............................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
2 ...............................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
3 ...............................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
4 ...............................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [8]
(c) Describe four different types of software which would be used to produce different aspects of
the new system. For each one state what it would be used for.
1 ...............................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
2 ...............................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
3 ...............................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
4 ...............................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [8]
7 Creamclot’s management have decided to computerise the payroll system. A choice needs to be
made between using a sequential filing system and a random access filing system for producing
the payroll.
(a) (i) Explain why magnetic tape is used for a sequential filing system.
...........................................................................................................................................
...........................................................................................................................................
...................................................................................................................................... [1]
(ii) Explain why hard disk storage is used for a random access filing system.
...........................................................................................................................................
...........................................................................................................................................
...................................................................................................................................... [1]
(b) Explain the advantages and disadvantages to Creamclot of using each of these systems.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [5]
Scenario 4
Question 8
The Seaside hotel company owns hotels at many resorts along the coast. Because many of the rooms
face the sun they can get very hot during the summer.
Each hotel room has an air conditioning system which is controllable by the guest who is staying in the
room. The guest sets the temperature that they require. Each air conditioning unit is microprocessor
controlled.
Enrico is the manager of one of the hotels. He decides to try to save money on the electricity bill. He
plans to set the temperature for the whole hotel centrally so that guest rooms are always at the same
temperature. The system will be controlled by a computer.
8 (a) Explain how each room’s air conditioning system maintains the required temperature.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [6]
(b) Describe the problems that could arise with maintaining a single temperature for the whole
hotel centrally.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [2]
BLANK PAGE
BLANK PAGE
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable
effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will
be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.
Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.
Write your Centre number, candidate number and name on all the work you hand in.
Write in dark blue or black pen.
Do not use staples, paper clips, glue or correction fluid.
You may use an HB pencil for any diagrams, graphs or rough working.
DO NOT WRITE IN ANY BARCODES.
The number of marks is given in brackets [ ] at the end of each question or part question.
DC (RW/CGW) 126908/3 R
© UCLES 2016 [Turn over
2
Scenario 1
Questions 1, 2, 3, 4, 5, 6 and 7
A2Z is a company which specialises in developing new drugs for treating human illnesses.
They use a supercomputer in their research.
Daniel works as a publisher for the company and produces a monthly magazine.
The magazine contains articles about the research being carried out both in the laboratories and at
research sites around the world.
Daniel employs a number of reporters to write the articles for the magazine. The reporters are expected
to gather information from the scientists.
Articles may be produced in the offices or while travelling but have to be sent to Daniel in time for
publication in both hardcopy and electronic formats.
1 Give reasons why a reporter would use each of these input devices when preparing their articles.
(i) A4 scanner
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
(ii) microphone
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
2 Describe the limitations of using a laptop for creating an article and sending it to Daniel.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[4]
3 The resources gathered by the reporters are used by Daniel to produce the article as an automated
document.
Describe how Daniel would do this.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[4]
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[4]
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[4]
6 A reporter, Victoria, wants to gather information by interviewing some of the scientists by telephone.
Victoria will also use email to ask questions of other scientists.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[6]
(b) Discuss the advantages and disadvantages of using email rather than face-to-face interviewing
to gather information from the scientists.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[6]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[4]
BLANK PAGE
Scenario 2
Questions 8 and 9
SRCo is a scientific research company that employs a number of skilled technicians to support the
scientists in its laboratories. The technicians may work in more than one laboratory depending on the
needs of the scientists.
The company has a human resources department that keeps a database. The database stores details
of the technicians. The human resources department issues each technician with an identity badge.
Jasmine works in the human resources department where her job is to create a new record in the
database and issue a badge to a technician when they join the company.
8 (a) Explain why Jasmine would need to use each of the input devices below when she creates a
new record in the database.
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[1]
(ii) keyboard
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[1]
(b) (i) When a database is created, the fields in the database are usually assigned a data type.
Explain why it is necessary to assign a data type to a field.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[2]
(ii) The details of each technician are stored in fields in the database. For each of the fields
shown, complete the table to give the most appropriate data type and a reason for
using that type.
Details stored in the Most appropriate data type Reason for using the
field in the database used for that field chosen type
Technician’s last
name
Technician’s gender
[2]
(iii) Explain why it is not appropriate to use a ‘numeric’ data type for the field in the database
that stores the telephone number of the technician.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[2]
9 Part of the database used by the human resources department is shown in the diagram below.
(a) Explain why the human resources department uses a relational database rather than a flat
file database for storing the technician details.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[4]
(b) Explain the relationship between the Technician table and the JobRole table.
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[1]
(c) Explain the relationship between the JobRole and the JobTitle table.
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[1]
(d) When Jasmine enters the details of a newly employed technician, the details are verified and
validated. Explain, with examples from the database, why both validation and verification of
the details are necessary.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[6]
BLANK PAGE
Scenario 3
KemCo is a chemical company that develops, manufactures and markets fertilizers for growing crops.
Colin, the marketing manager, uses computer-based financial models to assess whether or not the
company should develop, manufacture and market a new fertilizer.
Once the fertilizer is ready to sell, Colin uses primary and secondary marketing techniques to help him
market the fertilizer.
10 Describe how Colin could use a financial model to assess whether or not it would be profitable to
produce a new fertilizer.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[6]
11 The fertilizer manufacturing process is dependent on temperature and pH. Alkali is used to raise
the pH of the fertilizer in the vessel. A diagram of the process is shown below. A microprocessor is
connected to the sensors, valve and heater.
Vessel with
Temperature fertilizer
sensor
pH sensor
Heater
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[8]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
(b) Describe how Colin could use computer-based research techniques to carry out primary
research.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[6]
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable
effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will
be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.
Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.
Published
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.
Cambridge will not enter into discussions about these mark schemes.
Cambridge is publishing the mark schemes for the May/June 2016 series for most Cambridge IGCSE®,
Cambridge International A and AS Level components and some Cambridge O Level components.
Difficulties when viewing/creating the article on laptops which generally have smaller screens and
keyboards presenting
Image processing can be slower on laptops which usually have lower specification/ slower
processors / less memory (RAM)/ smaller hard drive with slower access times for the same cost
as e.g. desktop computer
Laptops are inherently more vulnerable to damage and theft so more risk of loss of article
Power management issues e.g. limited battery life so more difficult to manage when away from
office
Connecting to outside networks may require configuration skills/more technical skill to connect
when away from office
Repairs are more difficult than when away from office/traveling
Benefits:
Reduction in time taken from conception to publication
Storage space for the product/assets is virtually unlimited
Fewer overheads e.g. distribution costs means lower cost of production
Distribution of electronic publications is faster than printed/hardcopy
Can include links/multimedia to illustrate/enhance the content
Drawbacks:
Different formats exist so magazine has to be made available in several formats
Content is not secure compared to printed format/content can be copied more easily
Perceived lack of ‘quality’ in electronic publications
Benefits:
There is no significant time delay between question and answer
Interviewer can more easily ask extension questions based on answers
…that can add to the verbal answer from the interviewee/scientist
People from all over the globe can be interviewed
Enables interviewers/reporters to contact people in restricted areas e.g. laboratories for
medical research
No need to travel/no travel costs for reporter
No time wasted by reporter in travelling to interview
Interview can easily be recorded for later transcription/reference
Drawbacks:
The reduction of social cues/cannot see interviewee so e.g. body language/eye contact
cannot be used as a source of extra information
The interviewer has no knowledge of the situation in which the interviewee is situated
…so less able to create a good interview ambience
Telephone line quality can affect responses
Easier for interviewee/scientist to find excuse/make up excuse/find reasons to terminate the
interview
Advantages:
Can interview scientists that are not easy to access e.g. in restricted areas
Easier to ask lengthy questions that require a detailed response
Can use emoticons
The lack of nonverbal and social cues can reduce miscommunication due to cultural diversity
Reporter/scientist has some degree of anonymity so reporter may get more information from
scientist
Reporter has time to formulate questions/scientist has time to construct reply
No need to travel/no travel costs for reporter
No time wasted by reporter in travelling to interview
Interview dialogue/exchange/emails easily kept for reference
Can use translating tools to interview in different/foreign languages
Disadvantages:
The reduction of social cues/cannot see interviewee so e.g. body language/eye contact
cannot be used as a source of extra information
The interviewer has no knowledge of the situation in which the interviewee is situated
…so less able to create a good interview ambience
Reporter has to adapt to email style of scientist
Reporter has to wait for reply which might be a long time
Scientist may never reply/may terminate the contact without notice
Reporter may have to send reminders
Needed to type/enter characters to input details of new technician into the database
…not practical to have the computer spend time processing the data to determine how
best to store it
Allows validation rules to be easily applied to the data
…determines/places constraints on the values that are possible in a field
…to ensure the integrity of the data
Makes it easier to determine other properties of the field
…e.g. format of data within the field/maximum size of a field value/use of the field data in
expressions/ whether or not the field can be indexed/size of the database
Allows use of storage space to be optimised
(ii) Two from (one mark for a matching data type and a valid reason): [2]
Telephone numbers may contain spaces; spaces are not numbers so could not be
entered
Telephone numbers may contain letters, letters are not numbers so could not be entered
There is no need/requirement for mathematical calculations on telephone numbers
Some telephone numbers have a leading zero which makes it text
Some telephone numbers have a leading plus/+ which makes it text
Data is stored only once/one record per technician/avoids data duplication so less storage
space is needed
Data is stored only once/one record per technician no need to update multiple
records/deletion or modification of data is simpler/quicker
…changes are cascaded to other tables
Complex queries can be carried out by extracting data from multiple tables
Enhanced security access to tables can be restricted on individual table basis
Database can be expanded easier than a flat file database by adding new tables and
creating new links
Ensures referential data integrity
(b) One-to-many because each technician has more than job role [1]
(c) one-to-one each job role has only one title [1]
Data may be invalid although it has been copied correctly e.g. wrong number of characters in
post_code
Data may not have been copied correctly but may be valid e.g. telephone number/area code
copied incorrectly
The stored data on the technician has to be accurate so that decisions based on the data are
appropriate/use of the data is appropriate.
Sensors collect analogue data about the temperature and pH in the vessel/vat
Data from sensors is converted from analogue to digital using ADC
Microprocessor continuously monitors data from sensors/process is repeated/continues until
fertiliser is made
Microprocessor compares data from temperature sensor with pre-set value
…if temperature in vessel/vat is lower than pre-set value microprocessor sends signal to turn on
heater
…if temperature in vessel/vat is higher than pre-set value microprocessor sends signal to turn off
heater
Microprocessor uses actuators to turn heater on/off
Microprocessor uses actuators to open/close valve
Data from sensors is converted to analogue from digital using DAC
Microprocessor compares data from pH sensor with pre-set value
…if pH in vessel/vat is lower than pre-set value microprocessor sends signal to motor to open
valve to allow in more alkali
…if pH in vat is higher than pre-set value microprocessor sends signal to motor to close valve to
stop flow of alkali
Primary research is gathering new data that has not been collected before.
Secondary research is the use of existing data that has already been produced.
[Total: 80]
Write your Centre number, candidate number and name on all the work you hand in.
Write in dark blue or black pen.
Do not use staples, paper clips, glue or correction fluid.
You may use an HB pencil for any diagrams, graphs or rough working.
DO NOT WRITE IN ANY BARCODES.
The number of marks is given in brackets [ ] at the end of each question or part question.
DC (NH) 113352/2
© UCLES 2016 [Turn over
2
Scenario 1
Questions 1 and 2
The staff in the offices are in regular contact with each other by email and telephone in order to share
and discuss company business.
The staff can use the company network for remote storage of files, for access to the World Wide Web
and for use with telephone handsets that use VoIP.
Each member of staff is provided with a company email address. The address is based on the name of
the member of staff and the name of the company.
1 (a) Discuss the benefits and drawbacks of using VoIP for voice calls.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[6]
(b) Explain how VoIP software enables company staff to talk to each other.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[6]
© UCLES 2016 9713/32/F/M/16 [Turn over
4
2 Sanjit, a sales manager, uses the company email and has this email address:
sanjit.sales@company.com
A B
(a) Describe the purpose of the parts of an email address. You may use the labels A and B to
help you.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[4]
(b) Describe, in detail, how an email is sent by Sanjit and delivered to a sales representative in
another office.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[6]
Scenario 2
Questions 3, 4 and 5
The authorities at an international airport have introduced a range of measures to try and improve the
process of identifying passengers and improve the security of the airport and aircraft.
The airport now requires all passengers to use electronic tickets (e-tickets) and to use an electronic
passport (e-passport) containing an embedded chip which holds the personal details of the passenger.
Some airlines send boarding passes to the passenger’s mobile phone. They often refer to this as a
mobile boarding pass.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[4]
(b) Describe how the airport computer system is used to match an e-ticket to a specific passenger
at check-in.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[4]
(c) State one way that a boarding pass may be sent to the mobile device of a passenger.
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[1]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[2]
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[1]
4 E-tickets have to be purchased online. Explain why passengers may be worried about purchasing
e-tickets online.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[4]
5 Discuss the benefits and drawbacks of the airport requiring all passengers to use an electronic
passport.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[8]
Scenario 3
Questions 6, 7 and 8
A supermarket buys the goods that it sells, from a wholesaler who keeps goods in a warehouse ready
for delivery to the supermarket when they are needed.
Operators of the POS terminals use a variety of hardware devices to enter data about the goods being
sold.
The supermarket has a stock control database containing details of all the goods that it sells. The stock
control database is linked to the computer system at the wholesaler’s warehouse.
The supermarket uses a ‘just-in-time’ (JIT) strategy to ensure that it always has enough goods to sell to
its customers.
6 (a) Give the advantages and disadvantages of a checkout operator using each of the following
items of hardware at a POS terminal.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[3]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[3]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[3]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[3]
© UCLES 2016 9713/32/F/M/16 [Turn over
12
(b) Describe, in detail, the computer processing that occurs to ensure that goods are re-ordered
to replace those sold.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[6]
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[8]
8 The supermarket is considering replacing its ‘off-the-shelf’ database software with purpose-written
(bespoke) stock control software.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[8]
BLANK PAGE
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable
effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will
be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.
Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of
the examination. It shows the basis on which Examiners were instructed to award marks. It does not
indicate the details of the discussions that took place at an Examiners’ meeting before marking began,
which would have considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner
Report for Teachers.
Cambridge will not enter into discussions about these mark schemes.
Cambridge is publishing the mark schemes for the March 2016 series for most Cambridge IGCSE®
and Cambridge International A and AS Level components.
Benefits:
No direct calling costs when using VoIP handsets over company network
Can be used from smartphone/PC and tablets
Can support additional services e.g. Caller ID, anonymous call blocking, call diversion, call
waiting, do not disturb, ring back, voicemail
Can support encryption of conversations
Can support telephone conferences/more than two participants
Easily expandable compared to traditional telephone networks
Staff can have location independent telephone numbers which are assigned so staff login to
services
Drawbacks:
A: local address
…used to identify holder of email inbox/used as username of the holder of email inbox
Account name cannot be longer than 64 characters and domain name cannot be, practically,
longer than 254 characters. [4]
Mobile app may not cope with more than one per person per reservation
Mobile device may not work/battery may fail on device
E-boarding pass may not be readable from the screen of the device [1]
4 Four from:
5 Eight from:
Benefits:
Drawbacks:
Advantages:
Disadvantages:
Advantages:
Disadvantages:
Misidentification of the actual item being weighed can lead to inaccurate pricings
Poor calibration of the scales can lead to inaccurate weights/pricings being recorded
Advantages:
Disadvantages:
Advantages:
Disadvantages
7 Eight from:
Advantages:
Disadvantages:
8 Eight from:
Benefits:
Drawbacks:
Write your Centre number, candidate number and name on all the work you hand in.
Write in blue or black pen.
Do not use staples, paper clips, glue or correction fluid.
You may use an HB pencil for any diagrams, graphs or rough working.
DO NOT WRITE IN ANY BARCODES.
The number of marks is given in brackets [ ] at the end of each question or part question.
DC (NF) 115000/4
© UCLES 2016 [Turn over
2
Scenario 1
Questions 1 and 2
A large supermarket, located in Delhi, uses a computer system for a number of purposes.
The manager of the supermarket, Surinder, has introduced a service allowing customers to order their
groceries online for later delivery.
Surinder decides to employ Rafat, a systems analyst, to investigate how the online system could be
improved.
The supermarket has recently introduced a customer loyalty card. Customers who have a card, have it
scanned when they pay for goods. Details of the purchases are stored on the supermarket’s computer
system and discounts which the customer is entitled to are deducted from the bill.
1 (a) The supermarket uses laser, inkjet and dot matrix printers.
Describe a benefit and give an appropriate use for each printer in the supermarket.
Each benefit must be different.
Laser .........................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Inkjet .........................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [6]
(b) Rafat needs to research the present system. Describe each of the following methods and
indicate how they would be used by Rafat.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...................................................................................................................................... [2]
(ii) Questionnaires
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...................................................................................................................................... [2]
(iii) Interviews
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...................................................................................................................................... [2]
(c) Part of Rafat’s job is to produce technical documentation for the updated system.
Describe the contents of the technical documentation.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [6]
2 (a) Only a small number of customers have applied for a loyalty card.
Give three reasons why customers may not want to use such a card. For each reason, explain
one measure that Surinder can take to overcome the reluctance of the customers.
Reason 1 ..................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Measure 1 .................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Reason 2 ..................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Measure 2 .................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Reason 3 ..................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Measure 3 .................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [6]
(b) A large amount of data is created by the computer system used in the supermarket.
Explain how this data can be used to help Surinder manage the store.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [6]
BLANK PAGE
Scenario 2
Question 3
Johannus is writing a report for the management of the publishing company which he works for.
The information he produces needs to be wide-ranging and presented in such a way that it is easily
understood.
When Johannus has finished his report he decides to send it to his department manager for her
comments before submitting it to the management of the company.
1. .......................................................................................................................................
...........................................................................................................................................
2. .......................................................................................................................................
...................................................................................................................................... [2]
(ii) Explain how his manager can use word processing software features to make any
necessary amendments clear to Johannus when the report is returned to him.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...................................................................................................................................... [3]
(b) The management are very impressed with the report that Johannus has produced. They
decide that a copy should be given to each employee of the company. The report is produced
on a monochrome (black and white) printer.
Explain how the clarity of the graphs and charts in the report can be maintained.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [3]
(c) The publishing company use computerised plate making to produce the printing plates
necessary to print magazines.
(i) Describe how computerised plate making is used to print a page in a magazine.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...................................................................................................................................... [3]
1. .......................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
2. .......................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
3. .......................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
4. .......................................................................................................................................
...........................................................................................................................................
...................................................................................................................................... [4]
BLANK PAGE
Scenario 3
Questions 4 and 5
There are many hundreds of different tyres which vary in a number of ways, including price.
Each tyre has an ID code consisting of two letters followed by three digits. The letters are the first two
letters of the make of car for which the tyre was designed and the three digits are added to make the ID
code unique for that tyre type.
4 (a) Details of the tyres are kept in a flat file with the following structure:
(b) When the data of a new tyre is entered into the file it must be checked for accuracy.
(i) Explain what is meant by verification of data and describe how data input to the Tyre_ID
and Price fields should be verified.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...................................................................................................................................... [3]
(ii) Explain what is meant by validation of data and describe how data input to the Tyre_ID
and Price fields should be validated.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...................................................................................................................................... [3]
5 (a) Describe the use of two end effectors which would be used by the robot.
1 ...............................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
2 ...............................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [2]
1 ...............................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
2 ...............................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
3 ...............................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
4 ...............................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [4]
BLANK PAGE
Scenario 4
Question 6
Soydelight is a restaurant which has a small range of dishes made from soya beans.
Customers order their food at the counter where an assistant uses a touchscreen to input each order.
6 (a) Explain why the assistant enters customer orders using a touchscreen instead of other input
devices.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [6]
(b) A spreadsheet is designed to show when a supplier should be contacted so that more of a
particular item can be ordered.
A B C D E F G H
1 Item Number_In_Stock Minimum Supplier Contact Supplier
2 Soyburger 975 400 105 =IF(B2<C2,VLOOKUP(D2,G$2:H$4,2,FALSE),“No order”) 105 Soyplies
3 Soyfish 269 200 105 245 Veggie Ltd
4 Bread rolls 1284 600 361 361 Breadisus
5 Tomato 432 150 245
6 Lettuce 95 50 245
Explain the purpose of the different parts of the formula in cell E2.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [6]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [8]
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable
effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will
be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.
Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of
the examination. It shows the basis on which Examiners were instructed to award marks. It does not
indicate the details of the discussions that took place at an Examiners’ meeting before marking began,
which would have considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner
Report for Teachers.
Cambridge will not enter into discussions about these mark schemes.
Cambridge is publishing the mark schemes for the March 2016 series for most Cambridge IGCSE®
and Cambridge International A and AS Level components.
1 (a) Laser
Fast output for large volume jobs/high quality printout [1]
For sending communications to suppliers in order to give a good impression/letters to loyalty
card holders/flyers/bar codes of products/to print out daily sales figures/invoices [1]
Inkjet
High quality, glossy colour printouts/cheaper to run than colour laser printer [1]
To print out posters/information to customers about special offers [1]
Dot matrix
They produce multiple copies simultaneously/can print continuously [1]
Used to print out orders to suppliers so that different copies can be stored in different
departments (accounts/manager/grocery)/print payslips/receipts at checkouts [1]
(ii) Questionnaires
Asking users of the current system questions about the current system in the form of
hard copy/complete form on paper/on-screen [1]
Collect data directly from a large number of system users [1]
(iii) Interviews
Asking users of the current system questions about the current system face to face/in
person [1]
To get more in depth answers from management/users of current system regarding the
current system/eliciting answers by asking follow up questions dependent on the replies
given [1]
Systems documentation:
A detailed overview of the whole system
What is expected of the system/purpose of the system
Data Flow Diagrams/systems flowcharts
The results of systems analysis
Test plan and test results
Overall design decisions…
…the choice of hardware and software
…file, input and output structures
Systems flowcharts
Program documentation:
Description of the software/purpose of the software
What the software does and its features
Program listing - a complete copy of the code used
Annotation explaining what each module of code does
Reasons for choosing those pieces of existing software that were used instead of the
programmer having to write code
Input and output data formats
Program flowcharts/algorithms
Notes that will help any future programmer to make modifications to the system [6]
Afraid that a lot of staff will see customers’ personal information and that it will become public
knowledge/given to the wrong sort of people
Explain that access to the information is restricted to just a few staff/staff are trustworthy and
know their responsibilities to the customer
Customers may intend to use the new online shopping method only, which may not allow
them to scan loyalty cards
Amend the online shopping system to enable customers to type in their loyalty card
number/enable it to be scanned by delivery driver
4 (a)
Field Name Data Type
Tyre_ID Text/alphanumeric
Mix Boolean
Manufacturer Text/alphanumeric
(b) (i) To ensure data is copied accurately from one medium to another [1]
Two from:
Visual verification
Visually compare data on screen/printout with original/source document
Double data entry
Two people type in data/one person types in data twice
Computer compares two versions
Keyboard freezes/sound made/data flagged if differences occur
Decide which version is correct if differences are spotted [2]
Validation is to make sure that data entered is sensible for that field [1]
Tyre_ID field would be subject to a format check/input mask to ensure it consists of two
letters followed by three digits [1]
Price field would be subject to a range check of…(any sensible range of rupees) [1]
Has a limited menu so all the options can be clearly shown on a single screen
The use of a touchscreen will reduce the number of input errors compared to using a
keyboard
Selecting an item on screen is easier than controlling a mouse
Entry of data is quicker than with a keyboard/mouse
Needs less room than a screen and keyboard/mouse
Amount of training required is less than with other devices
Touchscreen is more robust than keyboard/mouse for use in greasy/dirty conditions
More suitable for disabled cashiers [6]
( ) Six
(b) S x fro
om
m:
Deccides wh
D hettheer a supplie er ssho
oulld be
b coontaactted
d…
… if so, givvess thhe name e off th
he supplierr
U es the
Use e IFF fu
uncctioon to comp parre the
t e nuummbe o item
er of ms in sto ockk/c
con ntennts off B22w
with
h th
he
m nim
min mumm stoc
s ck lev vel//co
onteentts of
o C2
C2…
…and
…a d if low
wer, d disppla
ayss th
he ssuppplierr na
amme/cconnte
entsso of H2
H
… if not, looweer itt disp
playys “No ord
o der””
V OO
VLO OKU UPP is ussed d to
o search h th
he loookuup tabble off su
uppplie
ers//G22:H
H4
Am mattch too the vvalue in ce ell D
D2 is seearche ed for in
n coolu
umn G
N eds
Nee s to
o be
b ana ex xacct mat
m tch h beecaausse of thee ‘F
FALS SE’ pa art of
o the
t e foormmula
T e ‘2
The 2’ in
nsttrucctss th
hat whhenn a matc
m ch is ma adee th
henn th
he ap pprooprriatte vvallue
e is
s re
ead
d from
m th
he
s con
sec nd col
c um mn//colum mn H of the lo ookup p taable
T e $ is us
The sedd too ensu ure
e th
hatt the refe
r ere encces
s to
o th
he loo
l oku up tab
t ble//G2 2:H
H4 are e mai
m ntaained when
th
he formula a is
s reeplicaatedd 6]
[6
(
(c) E ght fro
Eig om:
Coils of
C o tub
t bing g ffille w h a re
ed wit efriige
erannt…
…
…one
…o e cooil is ins
i side e thhe rooom
m an nd thee oth
o er is outsid de
C mp
Com presssoor con
c nve erts
s coo
c ol lo
ow--prressure ga as intoo hot higgh--pre
esssurre gas
g s
T e gas flo
The ows s to
o a co ondden
nsing un nit outsidde the bui
b ldinng
C nde
Con enssing uni
u t allow
a ws s re
efrig
gerrannt to coo
c ol/ccoools ga
as tto form
f m liqu
l uid
d
B ck in the
Bac t e build dinng it pas
p sses thro ouggh a vvalve…
…wwhich h ca aussess th he liquid
d to
o evaporatte into o cold
c d loow--press surre gas
E apora
Ev atin
ng un nit is situ
s uate ed insside the
t e re
estaaurrannt…
…
…abs
…a sorbbs he eat fro om su urro
oun ndss th
herrebby ccoo
olin
ng resstauraantt
C rrec
Cor ctly
y pos
p sitio one ed evapora atin
ng unit des
d scrribeed/shoowwn on
o dia agrram
m
C rrec
Cor ctly
y pos
p sitio one ed condensin ng unu it des
d scriibe
ed/sshoow
wn ono dia agrram
m
C rrec
Cor ctly
y pos
p sitio one ed valve e deesccribbed
d/ssho
own n on a diag gra
am
C rrec
Cor ctly
y pos
p sitio one ed comp preessor de escribed/sh howwn onn diaggram
C rrec
Cor ct ind
i dica atio
on of wa armma air des
d scrribeed//showwn on
o a dia agrramm
C rrec
Cor ct ind
i dica atio
on of cold airr de esccrib
bedd/show wn
n onn a diiag
gram
6m
max
x iff no
o dia
d gra
am
m
V
Valv
ve
C
Cold air
a
C nden
Con ng Un
nsin nit E
Eva
apo
ora
atin
ng Un
nit
W ma
Warm air
Co
ommprresso
or
[8
8]
© Ca
amb
brid
dge
e In
nterrnattion
nal Ex
xam
mina
atio
ons
s 20
016
6
Cambridge International Examinations
Cambridge International Advanced Subsidiary and Advanced Level
Published
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.
Cambridge will not enter into discussions about these mark schemes.
Cambridge is publishing the mark schemes for the October/November 2016 series for most
Cambridge IGCSE®, Cambridge International A and AS Level components and some Cambridge O Level
components.
(ii) Database:
Two from:
© UCLES 2016
Page 3 Mark Scheme Syllabus Paper
Cambridge International AS/A Level – October/November 2016 9713 12
2
File contains no formatting information
.csv file
Allows user to choose different fonts and effects
© UCLES 2016
Page 4 Mark Scheme Syllabus Paper
Cambridge International AS/A Level – October/November 2016 9713 12
Parallel running:
The old and new systems are run at the same time [1]
Both the chip and pin payment system and the contactless system are run together until the
contactless system has no bugs [1]
Direct changeover:
The new system replaces the old system immediately [1]
All the chip and pin machines are removed in one go and the new contactless system is
installed ready for the store to open the following day [1]
Pilot running
The new system is run in one branch of the organisation [1]
The contactless system is used in only one supermarket until it has been fully tested/before
being rolled out to other supermarkets [1]
© UCLES 2016
Page 5 Mark Scheme Syllabus Paper
Cambridge International AS/A Level – October/November 2016 9713 12
The users will not be familiar with the new technology and must therefore be given
instructions
User documentation is less time consuming/expensive than Rosef training them
The staff will need to be able to give assistance to customers and explain how to use it
Staff may need to consult FAQs/documentation if they/customers have problems
The documentation is permanently available meaning that Rosef will not need to be
consulted every time a problem occurs
The documentation will include a troubleshooting guide for future reference
May need to be able to restart the system if there is a system crash
Benefits:
Drawbacks:
© UCLES 2016
Page 6 Mark Scheme Syllabus Paper
Cambridge International AS/A Level – October/November 2016 9713 12
RSI – carpal tunnel syndrome – ensure that regular finger exercises are practised/take
regular breaks/use wrist supports/use trackerballs/ergonomic keyboard
RSI – cubital tunnel syndrome – keep forearms horizontal when using keyboard/take
regular breaks/place arms at your side straight down from time to time
Deep vein thrombosis – take regular breaks and walk around [3]
Duty of confidence:
Workers must not disclose/share personal/customer data to a third party [1]
© UCLES 2016
Page 7 Mark Scheme Syllabus Paper
Cambridge International AS/A Level – October/November 2016 9713 12
Buzzer/Sound/light alarm…
…in order to instantly attract attention if patient change may need immediate action/to alert
doctors/nurses if preset values exceeded
Job sharing – Two (or more) workers doing the job of one worker (working full time)
Allows workers to accept other commitments/can spend more time with family
Part time working – Working a limited number of hours/ working less than the normal working
hours of a full time employee
Allows workers to accept other commitments/can spend more time with family
Flexible working hours – Workers choose the time of day they want to work (but work the
same number of hours every week)
Can organise their working lives to suit their personal needs/Can choose to work off peak
hours as travelling to work outside peak times is easier and cheaper/If workers stay late to
finish a job, they can take time off at a later date/If the job requires great concentration, it can
be done at quiet times of day
Compressed hours – Working for same number of hours as a normal working week but over
fewer days
Earn the same amount of money but work fewer days/They can have long weekends by
finishing early on Fridays or not working Fridays/Travel to work fewer days so less time spent
travelling/Travel to work fewer days so less money spent travelling
[6]
Calculates the final wage after applying a bonus for each worker
Multiplies the number of hours worked/B2 by the pay per hour/C2…
… and adds the bonus to be paid
VLOOKUP is used to search the lookup table of bonuses/check which bonus is to be paid/in
the range G2 to G4/I4…
…until a match to the value in cell D2 is found…
…the resulting value is added
Needs to be an exact match because of the ‘FALSE’ part of the formula
The ‘3’ instructs that when a match is made then the appropriate value is read from the third
column of the lookup table
Contents of E2 = 377 [6]
© UCLES 2016
Page 8 Mark Scheme Syllabus Paper
Cambridge International AS/A Level – October/November 2016 9713 12
E-mail to customers
Use of attachments may dissuade customers from reading the advertisement
Customers may treat it as junk mail and so not read it
Specific customers can be targeted
Attachment can be created easily using DTP
DTP allows character shapes, variety of patterns, colours
Can be sent to world wide audience
Easy to create an email and mailmerge
Must have more than one method to gain full marks [8]
© UCLES 2016
Cambridge International Examinations
Cambridge International Advanced Subsidiary and Advanced Level
* 9 2 0 1 7 7 9 9 8 0 *
Write your Centre number, candidate number and name on all the work you hand in.
Write in dark blue or black pen.
Do not use staples, paper clips, glue or correction fluid.
You may use an HB pencil for any diagrams, graphs or rough working.
DO NOT WRITE IN ANY BARCODES.
The number of marks is given in brackets [ ] at the end of each question or part question.
DC (LEG) 115297/4
© UCLES 2016 [Turn over
2
Scenario 1
Questions 1 and 2
Paraiso College has a large number of students who attend classes at three campuses.
A large number of different courses are available covering many subject areas. The technology faculty
is very well equipped and supports students who are involved in completing a number of different
projects.
Each student at the college is issued with a plastic card containing information stored on a magnetic
stripe. This card is used to gain entry to each of the college campuses.
Students at the college need to use the internet in order to find background information for their project
work. A large amount of information will be available when they search the internet.
The Technology department at the College has decided to produce a handbook detailing the equipment
that is available for use by students. The handbook needs to be as accurate as possible because it will
be used as a reference by students in the department.
1 (a) The college provides a number of devices which produce hardcopy. Describe three of these
devices that could be used by the students in their project work, explaining what each device
would be used for.
Each use must be different.
1 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
3 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[6]
(b) (i) Explain the drawbacks of using magnetic stripe cards to gain entry to the college.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[4]
(ii) Explain the different ways the card could be used by both the students and the college
authorities.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[5]
(c) Explain how students can evaluate the reliability of information resulting from a search on the
internet.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[6]
2 Describe, in detail, how the content of the handbook can be checked to ensure that it is as error
free as possible.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[6]
Scenario 2
Question 3
Intweb is a company that specialises in creating and managing webpages for other companies and
organisations.
Spreadsheet software is used to store details of customer accounts. A word processor is used to
produce communications with customers.
Other software is used to create the items (assets) for inclusion in the web pages.
The data stored on Intweb’s websites needs to be secure. The staff who develop the software also
need to be aware of the potentially sensitive nature of the data stored.
3 (a) Apart from those in the scenario, describe how five other types of software could be used to
create the assets for the web pages.
1 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
3 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
4 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
5 ................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[5]
(b) (i) Other than physical methods, describe two ways of ensuring the security of the data on
the websites.
1 ........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[2]
(ii) Five security/privacy issues have been described below. In each case, name which issue
is being described.
Obligation arising under common laws where a person is obliged not to disclose
information to a third party.
...........................................................................................................................................
Employees must be loyal to their employers for as long as they work for them.
...........................................................................................................................................
...........................................................................................................................................
Personal details about individuals are combined to provide information in such a way that
individuals cannot be identified.
...........................................................................................................................................
.......................................................................................................................................[5]
Scenario 3
Questions 4 and 5
One model that it produces is called the Yaraven which is produced on a production line without the use
of robots.
Another model, the Aymic, is produced on a production line that makes full use of industrial robots.
The robotic production line for the Aymic has been so successful that the management of Nistoy have
decided a similar system should be introduced to produce the Yaraven.
Liene is the systems analyst who has been asked to oversee the automation of the Yaraven production
line.
4 (a) The robots used on the Aymic production line were very expensive to buy.
Describe in detail two advantages to the company of using robots on a production line.
1 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[4]
(b) The engine compartment of the Aymic needs to have two new holes drilling in it so that a
windscreen washer can be fitted.
Describe how a programmer would program the robotic arm to drill the holes in the correct
position.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[4]
5 (a) Describe each of the following methods of implementation that Liene could use and explain
how each would be used in the car factory.
Parallel running:
Description ................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Direct changeover:
Description ................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Phased implementation:
Description ................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[6]
(b) Discuss advantages and disadvantages to the workers of the introduction of robots to the
Yaraven production line.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[6]
Scenario 4
Questions 6 and 7
The government of a large region of a country has a number of departments. One of these departments
is called Youngov.
Youngov collects data annually and creates graphs and charts to make the data more easily understood.
6 (a) For each of the following sets of data, explain why the type of chart or graph has been chosen.
The number of young people in each age group (0–5, 6–10, 11–15 and 16–20).
Type: bar chart
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
The proportion of young people in each age group (0–5, 6–10, 11–15 and 16–20).
Type: pie chart
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
The number of young people in different types of educational institution (first school,
secondary school, college, university) compared with the previous year.
Type: comparative bar chart
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
The number of 18-year-old pupils in full time education in each of the last ten years.
Type: line graph
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[4]
(b) One of Youngov’s responsibilities is to consider the health and safety issues faced by young
people who are using computers.
Apart from RSI, describe three other health issues that should be considered.
1 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
3 ................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[3]
7 The systems analyst who was responsible for the design of the payroll system had to decide
between using a sequential access filing system and a random access filing system.
(a) Compare and contrast the use of a sequential access filing system and a random access
filing system.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[8]
(b) Describe how the payroll file is updated using sequential access for the master and transaction
files.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[6]
BLANK PAGE
BLANK PAGE
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable
effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will
be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.
Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.
Published
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.
Cambridge will not enter into discussions about these mark schemes.
Cambridge is publishing the mark schemes for the October/November 2016 series for most
Cambridge IGCSE®, Cambridge International A and AS Level components and some Cambridge O Level
components.
Inkjet printer produces high quality hard copy by spraying ink onto paper
Allows photo quality output of pictures to be included in the project/for draft quality of first
attempts of work
Magnetic stripe cards are susceptible to magnetic interference which can wipe the data
on them
This can come from close proximity to a mobile phone
If the card is lost/damaged/stolen/forgotten/misplaced student cannot enter the college
If the card is lost/damaged/stolen/forgotten/misplaced student cannot access services
from the college
If the reader malfunctions student cannot enter the college
If stolen it can be used by unauthorised person/other student to enter the college or to
access services from the college
Can cause queues at entry points to the college because students have to find and use
the card [4]
College authorities know how many students are present at any time (if card is also used
for exit)...
… important for emergencies e.g. fire drills
College could use it for individual student attendance records
Students could use card to pay for purchases like food, trips and books
College authorities could collect information on which resources are being used/not used
by students…
…to know the times of day when the library is heavily used
Students could use cards to borrow books from library
College can grant different access rights/privileges to groups of students
College could keep records of which students have borrowed equipment/resources
[5]
© UCLES 2016
Page 3 Mark Scheme Syllabus Paper
Cambridge International AS/A Level – October/November 2016 9713 13
2 Six from:
Proof read and correct the document to ensure that it makes sense
Check for accuracy of description of equipment available and its use
Check for consistency of line spacing/character spacing to make sure that the distance between
lines/paragraphs/characters is standard
Check lists/tables/charts are not split over two pages
Check that there are no widows or orphans produced; no single lines from a paragraph/list are at
the top or bottom of pages without the rest of the text
Ensure that tables and charts fit boundaries of page/columns accurately
Use spellchecker to find misspelled words
Use grammar checker to ensure that document adheres to syntax of language [6]
© UCLES 2016
Page 4 Mark Scheme Syllabus Paper
Cambridge International AS/A Level – October/November 2016 9713 13
User Ids and passwords so that those who do not know the password are denied access
Encryption so that those who do not have the correct decryption key are
unable/understand to read the information accessed
Memorable data – something only the staff member knows used in conjunction with
User Id [2]
© UCLES 2016
Page 5 Mark Scheme Syllabus Paper
Cambridge International AS/A Level – October/November 2016 9713 13
The programmer controls the robot by physically guiding the arm through each step using the
drill
The programmer has sensors attached to his/her arm
The sensors transmit data to the computer
The computer stores the sequence of movements…
…as a program in its memory
The robot arm is therefore able to repeat the actions every time a new unit comes down
the assembly line [4]
Parallel running:
The old and new systems are run at the same time
Computerised production of Yaravan and normal workforce production are run together until
the robot system has no bugs
Direct changeover:
The new system replaces the old system immediately
The old production line is shut down and the new one is installed in one go
Phased implementation:
Implementing one part of the system while rest of system remains unchanged/implementing
system part by part
The cars continue to be produced by the workforce but are painted by robots [6]
Advantages:
Disadvantages:
Unemployment
Will have to re-train in order to keep a job
Loss of social interaction with other workers
Deskilling can occur [6]
© UCLES 2016
Page 6 Mark Scheme Syllabus Paper
Cambridge International AS/A Level – October/November 2016 9713 13
Bar chart:
Individual values can be read from the axis/no meaning to intermediate values/emphasises
differences from one block to another
Pie chart:
Small number of segments used to show relative sizes/actual numerical values are not
important
Differences between figures for different institutions AND between different years are easier
to see
Line graph:
Shows the trend from one year to the next making extrapolation possible [4]
Staring at a computer screen continuously can cause problems with one’s sight
Typing at a keyboard continuously can cause RSI
Gripping a mouse and repetitive clicking can cause carpal tunnel syndrome/RSI
Sitting in the same position/with wrong posture all day can cause lower back pain
Staring at a computer screen all day can cause eye strain/headaches
Poor positioning of screen can cause upper back/neck/shoulder pain/eyestrain/headaches
Glare from screen can cause eye strain/headaches [3]
© UCLES 2016
Page 7 Mark Scheme Syllabus Paper
Cambridge International AS/A Level – October/November 2016 9713 13
The transaction file is sorted in the same order as the master file
First record in the transaction file read
Reads first record in the old master file
These two records are compared
If records don’t match computer writes master file record to new master file
If it matches transaction is carried out
Then
If transaction relates to calculation of pay:
© UCLES 2016
Cambridge International Examinations
Cambridge International Advanced Level
* 3 9 7 0 8 7 9 4 6 9 *
Write your Centre number, candidate number and name on all the work you hand in.
Write in dark blue or black pen.
Do not use staples, paper clips, glue or correction fluid.
You may use an HB pencil for any diagrams, graphs or rough working.
DO NOT WRITE IN ANY BARCODES.
The number of marks is given in brackets [ ] at the end of each question or part question.
DC (ST/CGW) 113548/3
© UCLES 2016 [Turn over
2
Scenario 1
Questions 1, 2, 3 and 4
Faster Cars is a racing car company that produces high-speed racing cars.
The company employs engineers and mechanics to maintain the cars. It has an expert system that can
be used by the mechanics when trying to diagnose faults in the car engines.
The company has its own racing drivers who use simulators to practise high-speed racing for when
they are driving the real racing cars.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[4]
(b) Describe two specialist input devices that could be used by a designer using CAD.
1 ...............................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
2 ...............................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
(c) Describe two specialist output devices that could be used by a designer using CAD.
1 ...............................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
2 ...............................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[6]
(e) Explain why the company would choose to use CAM to produce the cars.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[4]
2 When a car engine develops a fault, a mechanic will use the expert system to help diagnose the
fault.
The diagram shows an outline of the expert system that is used by the mechanic.
Inference Interface to
data from car engine
outside
Engine world
Knowledge
car mechanic
Base
(a) Describe two inputs to the expert system from the car engine.
1 ...............................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
2 ...............................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
(b) Explain the use of two output devices that could be used by the interface.
1 ...............................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
2 ...............................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
(c) Describe the knowledge base of the expert system and how it may be expanded.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[6]
(d) Explain how the inference engine of the expert system helps to diagnose the fault.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[6]
3 Describe how each of the following output devices might be used in a racing car simulator.
motor
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
buzzer
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
large screen
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
loudspeaker
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[4]
4 Discuss the benefits and drawbacks of using computer simulations to practise driving the racing
cars.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[8]
BLANK PAGE
Scenario 2
Questions 5, 6 and 7
Floatem is a multi-national shipping company which owns a fleet of cruise ships. These ships sail to
and from ports all over the world carrying passengers on holidays.
Passengers may book holiday cruises in person at any office or online using the company’s website.
Every passenger cabin on the cruise ships is equipped with an entertainment system that can be
used to:
5 (a) Describe, including their purpose, six items of information that a customer would have to
enter when booking a holiday cruise online.
1 ...............................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
2 ...............................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
3 ...............................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
4 ...............................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
5 ...............................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
6 ...............................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[6]
(b) Explain why a customer would prefer to book a cruise online rather than at one of the company
offices.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[6]
(c) An e-ticket and an e-receipt are issued when a booking is made online.
(i) Describe one item of information that might be shown on the e-ticket.
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[1]
(ii) Describe one item of information that might be shown on the e-receipt. This item must be
different from the one given in (c)(i).
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[1]
6 (a) Describe how each of the following could be used in the entertainment system in the
passenger cabins.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[2]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[2]
(b) Explain why MP3 files are used to distribute content to the entertainment system.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[4]
7 Kumar, a passenger, decides to use the entertainment system to watch TV in his cabin.
Describe how the sports programme is sent to, and received by, the entertainment system for
Kumar to watch.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[6]
(b) Kumar watches a movie using the ship’s video on-demand system.
Explain how the ship’s video on-demand system enables Kumar to watch the movie of his
choice.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[6]
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable
effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will
be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.
Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.
Published
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.
Cambridge will not enter into discussions about these mark schemes.
Cambridge is publishing the mark schemes for the October/November 2016 series for most
Cambridge IGCSE®, Cambridge International A and AS Level components and some Cambridge O Level
components.
Light pen for drawing directly on screen/when desk space is limited/might only have CRT
monitors
Trackerball for drawing when desk space is limited/less chance of picking up dust/reduced
risk of health issues/more accurate than a mouse/selecting options
Graphics tablet/use of stylus for inputting freehand drawings
Scanner for inputting hardcopy drawings/photographs/notes. [2]
CRT monitors/curved screens for several designers to see the design simultaneously
Plotter to produce large hardcopy of design drawings/blueprints
Laser printer to produce hardcopy of designs
3D-printer to produce model/prototype. [2]
Benefits:
Using CAD can be more accurate with measurements than traditional drawing methods
Using CAD can reduce human error in use of/placing components from library for the
drawings
Using CAD allows drawings to be saved/edited/modified at various stages in the process
Using CAD allows drawings to be saved/edited/modified by several designers
Using CAD allows drawings to be sent electronically to designers/email
Using CAD enables analysis of interaction of components
Using CAD enables analysis of component costs
Using CAD allows rotation/zoom of views
Drawbacks:
Using CAD requires a computer system which can be expensive/initial costs are high
Using CAD can be slower than traditional methods for one-off/low-volume production
Increased costs as workers need to be trained how to use the software and machinery.
© UCLES 2016
Page 3 Mark Scheme Syllabus Paper
Cambridge International AS/A Level – October/November 2016 9713 31
The results of manufacturing using CAM are consistent (always the same)
Using CAM enables very high accuracy levels in large-scale production
CAM can produce/machine very intricate/difficult shapes
Using CAM can speed up production of low-volume products
CAM can be run for very long periods e.g. 24 hours a day, 7 days a week
Can be linked to CAD, so that designs are electronically input to machinery. [4]
Data about speed/from engine rotation/flywheel revolutions collected by using a light sensor
Temperature data from oil/water/exhaust systems collected by using temperature sensor
Data about pressure of coolant/oil systems collected by using a pressure sensor
Data about air/fuel ratio from exhaust gases/manifold/before and after catalytic converter
collected by using oxygen/lambda sensor
Data from the engine management system. [2]
Receives data from user interface from mechanic/from car engine sensors
Checks knowledgebase for matches to data input
Checks the rules to find relevant rules that match knowledgebase facts
....using forward/backward chaining
Chooses/selects relevant rules
...prioritises rules found in knowledgebase
Executes rules in order of priority
Repeats the steps from check knowledgebase to execute rules
.....until no more matches for condition/data input
Use of if-then-else logic/action
Applies logical rules
Interprets facts in knowledgebase to provide possible diagnoses/probabilities
Suggests possible faults. [6]
© UCLES 2016
Page 4 Mark Scheme Syllabus Paper
Cambridge International AS/A Level – October/November 2016 9713 31
Motor: to move whole simulator/parts of simulator/open,close valves in hydraulic rams for moving
the simulator
4 Eight from:
Benefits:
Drivers are not put in physical danger/can be safer/less risk of being hurt/no risk to life
Different/extreme conditions can be simulated so no need to wait for natural occurrence
Different conditions/scenarios can be repeated
Running costs/fuel consumption lower than real cars
Simulation can be recorded for later playback/analysis
...feedback can be visual overlays as well as verbal comments
...computer can objectively assess performance c.f. observations by instructor
Manoeuvres/actions can be demonstrated by the simulator
Crashed/damage to virtual cars does not cost money to repair
Drawbacks:
© UCLES 2016
Page 5 Mark Scheme Syllabus Paper
Cambridge International AS/A Level – October/November 2016 9713 31
© UCLES 2016
Page 6 Mark Scheme Syllabus Paper
Cambridge International AS/A Level – October/November 2016 9713 31
Video and audio encoded into digital format (by camera/at studio/in outside broadcast truck)
Video/audio edited for transmission/may have short time delay introduced
Sent by cable/satellite link to studio
Sent by cable to uplink station/dish
Received by receiving dish on (geostationary) satellite
Frequency altered and sent to transponder on (geostationary) satellite
Transmitted to ground/downlinked to dish on ship
LNB on dish on ship receives signal from satellite
Signal sent to receiver via cable
Signal distributed to entertainment systems around the ship/in cabins
Receiver converts signal into viewable audio/video. [6]
© UCLES 2016
Cambridge International Examinations
Cambridge International Advanced Level
* 7 1 4 8 3 2 8 6 5 7 *
Write your Centre number, candidate number and name on all the work you hand in.
Write in dark blue or black pen.
Do not use staples, paper clips, glue or correction fluid.
You may use an HB pencil for any diagrams, graphs or rough working.
DO NOT WRITE IN ANY BARCODES.
The number of marks is given in brackets [ ] at the end of each question or part question.
DC (ST) 113549/2
© UCLES 2016 [Turn over
2
Scenario 1
Questions 1, 2 and 3
A local government uses its website to provide online services for citizens.
The online services are stored on a web server situated on a protected segment of the government’s
local area network (LAN). Citizens access the services from the internet to look at information provided
by the government and to apply for official documents.
Ali is the IT manager responsible for the maintenance of the website and file server.
Ali can use his laptop to access the servers from the LAN or remotely using the internet when he
needs to carry out maintenance on the servers.
1 Describe the purpose of four network hardware devices that could be found on the government
LAN.
1 ......................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
2 ......................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
3 ......................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
4 ......................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[8]
2 Ali has been given a USB memory stick (pen drive) with some new information to be made
available on the website.
Describe how Ali could transfer the information from the memory stick (pen drive) to the web
server using his laptop.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[4]
3 Explain how citizens can find and apply for official documents online when using the government
website.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[2]
BLANK PAGE
Scenario 2
Questions 4, 5 and 6
Customers have accounts that can be accessed and maintained by logging into the bank’s secure
website.
Gupta works in the head office of the bank. He sometimes travels to the offices of customers to give
advice.
Gupta uses the bank’s expert system to help him when he is giving advice to customers on investments
and financial planning. He can access the expert system while in his office and via the internet while
visiting customers.
4 (a) Describe, in detail, the banking activities that a customer could carry out when maintaining
their account online.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[4]
(b) The bank stores the phone number of each of its customers. Explain how the bank could use
these details to help prevent fraud.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
5 Authentication and authorisation are used when a customer logs into an online bank account.
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[1]
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[1]
(b) Describe the authentication techniques that the bank might use with its online accounts.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[6]
6 When away from the head office, Gupta needs secure access to the expert system via the internet.
Explain how Gupta could access the expert system securely via the internet.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[6]
Scenario 3
Questions 7 and 8
She uses her computer for online banking and online shopping.
7 Explain how computer hardware and software can be configured to cater for different physical
disabilities.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[8]
8 Describe how a website can be configured to assist Liene when she is shopping online.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[6]
BLANK PAGE
Scenario 4
Kemoko is a company that produces ointments for supply to pharmacies to sell to the general public.
The company has created a new ointment for treating insect bites.
Anthea, a marketing manager, has created a leaflet to explain to the public the benefits of the new
ointment. She has created the leaflet on her computer.
Anthea has sent the draft leaflet to Mick, a marketing assistant, and asked him to thoroughly check it to
ensure that it is error-free and conforms to the company house-style.
Anthea is advertising the new ointment in the media to try and increase sales.
Anthea would also like feedback from the public. She plans to use both paper-based and online
questionnaires to gather the feedback.
9 (a) Describe how Mick could manually check that the leaflet is error-free.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[4]
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[4]
11 Describe and compare the ways that Anthea could advertise the new ointment in the media.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[8]
12 Describe the features of an online questionnaire that make it suitable for gathering feedback from
the general public.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[6]
13 Explain why Anthea uses an online questionnaire instead of using a paper-based questionnaire.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[8]
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable
effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will
be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.
Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.
Published
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.
Cambridge will not enter into discussions about these mark schemes.
Cambridge is publishing the mark schemes for the October/November 2016 series for most
Cambridge IGCSE®, Cambridge International A and AS Level components and some Cambridge O Level
components.
Router
....to connect LANs into WAN
....to connect network to the internet
Switch
....to connect network segments together into a LAN
....to forward data packets to required segment of network but not all segments
....to manage packets by user programming
Hub
....to connect network segments together into a LAN
....to forward data packets to all segments of network
....a packet entering any port is forwarded/rebroadcast to all ports
Proxy server
....to act as intermediary for services requested by devices on LAN
....to enforce an acceptable use policy
....to provide language translation of resources accessed from LAN
....to act as buffer between LAN and internet for web pages accessed from LAN
....to provide network address translation (NAT) services to computers/devices on LAN
Firewall
....to prevent unauthorised access/network traffic to/from LAN by computers
....by inspecting contents of IP/data packets
...comparing contents with pre-set rules
Bridge
...connect two or more LANs together
...transfer data between two different protocols
...faster than a router at transferring data between networks as no analysis of data is done by
bridge.
[8]
© UCLES 2016
Page 3 Mark Scheme Syllabus Paper
Cambridge International AS/A Level – October/November 2016 9713 32
Account holder mobile (cell) phone number looked up and used to send SMS/text message
to holder...
...to ensure that transactions originate from account holder
...to alert/call account holder of an irregular/unusual transaction
...when payment made from account
...details of payments/account are changed
...to alert when funds go below/above pre-set values.
[2]
© UCLES 2016
Page 4 Mark Scheme Syllabus Paper
Cambridge International AS/A Level – October/November 2016 9713 32
6 Six from:
© UCLES 2016
Page 5 Mark Scheme Syllabus Paper
Cambridge International AS/A Level – October/November 2016 9713 32
Sticky keys:
By pressing two keys together, users can press the alt, control or shift key first, then the character
key afterwards
Filter keys:
Computer ignores brief key presses/where a key is pressed down repeatedly
Mouse keys:
The number pad can be configured to control the pointer on the screen
Settings:
To allow the size and appearance of the pointer, icons, text font size, menus etc. to be altered
Text to speech software that speaks the words to help the user
Speech recognition software to enable the user to speak into a microphone, the speech is
converted into text and word-processing software is used to display the text
Predictive word processors to try to guess what the user is typing
...after one or two letters are typed in, a choice of words appears on the screen and the user can
select the correct word
A mouse that can be configured to have a different type of pointer and/or leave a trail so that
people with sight problems can easily pick up where the position of the pointer
Head pointers: these use a camera positioned on top of the monitor to detect the movement of
the head through the use of reflective materials; software then converts these into the movement
of the mouse pointer
Overlay or concept keyboards: the overlay can have much larger characters that can be picked
out easily by those people with sight problems and can be selected more easily by those with
poor motor control
Purpose-built keyboards: specially manufactured keyboards, e.g. Braille keyboards for blind
people/keyboards with larger keys for those people who can see but not very well
Tracker balls: these can be used with either hands or feet
...most disabled people find they are easier to use than a mouse to control menus and pointers
Joysticks: can often respond to minor involuntary movements
...these are easier to control than a mouse
Touch screens: the idea is similar to the use of concept keyboards in that characters of the
keyboard can be larger or images can be used to replace characters
Head wand: this is a wand or rod attached to a headband that enables people with limited or no
limb movement to press the keys on a keyboard
Foot mouse: used by user’s feet instead of a hand-held mouse.
© UCLES 2016
Page 6 Mark Scheme Syllabus Paper
Cambridge International AS/A Level – October/November 2016 9713 32
Coded website with semantically meaningful HTML so visually impaired people can use text-to-
speech software and/or text-to-Braille hardware
Hard-coding of fonts etc. is avoided to allow users to adjust/configure to suit needs
Textual equivalents provided for images for visually impaired
Links named meaningfully so easy to understand
Text and images are large/enlargeable so users with poor sight can read/understand the content
Flashing effects are omitted/optional so users prone to seizures caused by these effects are not
put at risk
Distracting animations/pop-ups kept to minimum to avoid distracting visually disabled people
Clickable links and areas are large to help users who cannot precisely control a mouse
Pages are coded so that users can navigate by use of the keyboard /single switch access device
alone so users who cannot use a mouse can access the site
Links are underlined/coloured, this ensures that colour deficient users will be able to spot them
Videos are closed captioned/sign language version is available so that hearing impaired users
can understand the video.
[6]
10 Four from:
© UCLES 2016
Page 7 Mark Scheme Syllabus Paper
Cambridge International AS/A Level – October/November 2016 9713 32
Television advertising by
....sponsorship of programmes to attract viewers attention
....product placement within programmes to put product in context/in view of watcher
....virtual advertisement(s) overlaid using computer graphics into e.g. Sports programmes to put
product in view of watcher
‘Infomercials’
....with presenters describing and displaying the product
....that give/state telephone number/website details where prospective customers can find more
information/sales
Radio advertising
....by inserting audio/spoken adverts between/in programmes
Newspaper/magazine advertising
....with printed adverts on pages
....by having mini-booklets within magazines.
© UCLES 2016
Page 8 Mark Scheme Syllabus Paper
Cambridge International AS/A Level – October/November 2016 9713 32
13 Eight from:
© UCLES 2016
Cambridge International Examinations
Cambridge International Advanced Level
* 1 9 0 0 8 1 4 6 5 6 *
Write your Centre number, candidate number and name on all the work you hand in.
Write in dark blue or black pen.
Do not use staples, paper clips, glue or correction fluid.
You may use an HB pencil for any diagrams, graphs or rough working.
DO NOT WRITE IN ANY BARCODES.
The number of marks is given in brackets [ ] at the end of each question or part question.
DC (ST/CGW) 124829
© UCLES 2016 [Turn over
2
Scenario 1
Questions 1, 2, 3 and 4
Faster Cars is a racing car company that produces high-speed racing cars.
The company employs engineers and mechanics to maintain the cars. It has an expert system that can
be used by the mechanics when trying to diagnose faults in the car engines.
The company has its own racing drivers who use simulators to practise high-speed racing for when
they are driving the real racing cars.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[4]
(b) Describe two specialist input devices that could be used by a designer using CAD.
1 ...............................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
2 ...............................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
(c) Describe two specialist output devices that could be used by a designer using CAD.
1 ...............................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
2 ...............................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[6]
(e) Explain why the company would choose to use CAM to produce the cars.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[4]
2 When a car engine develops a fault, a mechanic will use the expert system to help diagnose the
fault.
The diagram shows an outline of the expert system that is used by the mechanic.
Inference Interface to
data from car engine
outside
Engine world
Knowledge
car mechanic
Base
(a) Describe two inputs to the expert system from the car engine.
1 ...............................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
2 ...............................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
(b) Explain the use of two output devices that could be used by the interface.
1 ...............................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
2 ...............................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
(c) Describe the knowledge base of the expert system and how it may be expanded.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[6]
(d) Explain how the inference engine of the expert system helps to diagnose the fault.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[6]
3 Describe how each of the following output devices might be used in a racing car simulator.
motor
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
buzzer
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
large screen
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
loudspeaker
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[4]
4 Discuss the benefits and drawbacks of using computer simulations to practise driving the racing
cars.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[8]
BLANK PAGE
Scenario 2
Questions 5, 6 and 7
Floatem is a multi-national shipping company which owns a fleet of cruise ships. These ships sail to
and from ports all over the world carrying passengers on holidays.
Passengers may book holiday cruises in person at any office or online using the company’s website.
Every passenger cabin on the cruise ships is equipped with an entertainment system that can be
used to:
5 (a) Describe, including their purpose, six items of information that a customer would have to
enter when booking a holiday cruise online.
1 ...............................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
2 ...............................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
3 ...............................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
4 ...............................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
5 ...............................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
6 ...............................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[6]
(b) Explain why a customer would prefer to book a cruise online rather than at one of the company
offices.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[6]
(c) An e-ticket and an e-receipt are issued when a booking is made online.
(i) Describe one item of information that might be shown on the e-ticket.
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[1]
(ii) Describe one item of information that might be shown on the e-receipt. This item must be
different from the one given in (c)(i).
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[1]
6 (a) Describe how each of the following could be used in the entertainment system in the
passenger cabins.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[2]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[2]
(b) Explain why MP3 files are used to distribute content to the entertainment system.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[4]
7 Kumar, a passenger, decides to use the entertainment system to watch TV in his cabin.
Describe how the sports programme is sent to, and received by, the entertainment system for
Kumar to watch.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[6]
(b) Kumar watches a movie using the ship’s video on-demand system.
Explain how the ship’s video on-demand system enables Kumar to watch the movie of his
choice.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[6]
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable
effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will
be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.
Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.
Published
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.
Cambridge will not enter into discussions about these mark schemes.
Cambridge is publishing the mark schemes for the October/November 2016 series for most
Cambridge IGCSE®, Cambridge International A and AS Level components and some Cambridge O Level
components.
Light pen for drawing directly on screen/when desk space is limited/might only have CRT
monitors
Trackerball for drawing when desk space is limited/less chance of picking up dust/reduced
risk of health issues/more accurate than a mouse/selecting options
Graphics tablet/use of stylus for inputting freehand drawings
Scanner for inputting hardcopy drawings/photographs/notes. [2]
CRT monitors/curved screens for several designers to see the design simultaneously
Plotter to produce large hardcopy of design drawings/blueprints
Laser printer to produce hardcopy of designs
3D-printer to produce model/prototype. [2]
Benefits:
Using CAD can be more accurate with measurements than traditional drawing methods
Using CAD can reduce human error in use of/placing components from library for the
drawings
Using CAD allows drawings to be saved/edited/modified at various stages in the process
Using CAD allows drawings to be saved/edited/modified by several designers
Using CAD allows drawings to be sent electronically to designers/email
Using CAD enables analysis of interaction of components
Using CAD enables analysis of component costs
Using CAD allows rotation/zoom of views
Drawbacks:
Using CAD requires a computer system which can be expensive/initial costs are high
Using CAD can be slower than traditional methods for one-off/low-volume production
Increased costs as workers need to be trained how to use the software and machinery.
© UCLES 2016
Page 3 Mark Scheme Syllabus Paper
Cambridge International AS/A Level – October/November 2016 9713 33
The results of manufacturing using CAM are consistent (always the same)
Using CAM enables very high accuracy levels in large-scale production
CAM can produce/machine very intricate/difficult shapes
Using CAM can speed up production of low-volume products
CAM can be run for very long periods e.g. 24 hours a day, 7 days a week
Can be linked to CAD, so that designs are electronically input to machinery. [4]
Data about speed/from engine rotation/flywheel revolutions collected by using a light sensor
Temperature data from oil/water/exhaust systems collected by using temperature sensor
Data about pressure of coolant/oil systems collected by using a pressure sensor
Data about air/fuel ratio from exhaust gases/manifold/before and after catalytic converter
collected by using oxygen/lambda sensor
Data from the engine management system. [2]
Receives data from user interface from mechanic/from car engine sensors
Checks knowledgebase for matches to data input
Checks the rules to find relevant rules that match knowledgebase facts
....using forward/backward chaining
Chooses/selects relevant rules
...prioritises rules found in knowledgebase
Executes rules in order of priority
Repeats the steps from check knowledgebase to execute rules
.....until no more matches for condition/data input
Use of if-then-else logic/action
Applies logical rules
Interprets facts in knowledgebase to provide possible diagnoses/probabilities
Suggests possible faults. [6]
© UCLES 2016
Page 4 Mark Scheme Syllabus Paper
Cambridge International AS/A Level – October/November 2016 9713 33
Motor: to move whole simulator/parts of simulator/open,close valves in hydraulic rams for moving
the simulator
4 Eight from:
Benefits:
Drivers are not put in physical danger/can be safer/less risk of being hurt/no risk to life
Different/extreme conditions can be simulated so no need to wait for natural occurrence
Different conditions/scenarios can be repeated
Running costs/fuel consumption lower than real cars
Simulation can be recorded for later playback/analysis
...feedback can be visual overlays as well as verbal comments
...computer can objectively assess performance c.f. observations by instructor
Manoeuvres/actions can be demonstrated by the simulator
Crashed/damage to virtual cars does not cost money to repair
Drawbacks:
© UCLES 2016
Page 5 Mark Scheme Syllabus Paper
Cambridge International AS/A Level – October/November 2016 9713 33
© UCLES 2016
Page 6 Mark Scheme Syllabus Paper
Cambridge International AS/A Level – October/November 2016 9713 33
Video and audio encoded into digital format (by camera/at studio/in outside broadcast truck)
Video/audio edited for transmission/may have short time delay introduced
Sent by cable/satellite link to studio
Sent by cable to uplink station/dish
Received by receiving dish on (geostationary) satellite
Frequency altered and sent to transponder on (geostationary) satellite
Transmitted to ground/downlinked to dish on ship
LNB on dish on ship receives signal from satellite
Signal sent to receiver via cable
Signal distributed to entertainment systems around the ship/in cabins
Receiver converts signal into viewable audio/video. [6]
© UCLES 2016
Cambridge International Examinations
Cambridge International Advanced Subsidiary and Advanced Level
* 1 3 7 8 5 2 1 3 5 5 *
Write your Centre number, candidate number and name on all the work you hand in.
Write in blue or black pen.
Do not use staples, paper clips, glue or correction fluid.
You may use an HB pencil for any diagrams, graphs or rough working.
DO NOT WRITE IN ANY BARCODES.
The number of marks is given in brackets [ ] at the end of each question or part question.
DC (LEG) 115296/4
© UCLES 2016 [Turn over
2
Scenario 1
Questions 1 and 2
Didier is a student who is studying for his A levels. He attends Montmartre College.
When he is at college he uses the college’s computer network in order to do his coursework.
When he is at home he uses his own laptop to continue work that he did not manage to complete at
college.
Didier needs to take weather readings for a month as part of his Geography coursework. He will then
have to write a report of his findings.
Didier uses the internet to find some information about the climate during the previous eleven months
for his report.
1 (a) Name four storage devices which Didier or the college could use. For each device give a
different use.
Device 1 ....................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Device 2 ....................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Device 3 ....................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Device 4 ....................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[4]
(b) Describe how Didier will use each of the following types of software to prepare his Geography
report. Each use must be different.
(i) Spreadsheet:
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[2]
(ii) Database:
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[2]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[2]
(c) Describe how Didier can find relevant pages on the internet related to his Geography
coursework.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[6]
2 Didier has found the ideal website for his needs. It provides the data that he wants in the form of a
.csv file.
Three file types are shown on the left along with six descriptions on the right.
Draw six lines (2 from each file type) to connect each file type to its most appropriate descriptions.
.csv file
Allows user to choose different fonts and effects
.rtf file
File contains text mixed with tags which are used to turn
effects on and off
.txt file
[4]
Scenario 2
Questions 3 and 4
Kwikshop is a supermarket company which has a number of branches across the country. It uses
computer technology at checkouts in all its supermarkets. Barcode scanners are used to input data
from goods purchased by customers. Smart card readers are used to allow customers to complete
their transactions.
The management of Kwikshop is aware of new technology that will allow customers to pay at the
checkout without entering their card into the chip and pin machine. They would like to introduce this
contactless technology throughout their stores.
The management of Kwikshop have recently introduced an online shopping system. Customers provide
a list of goods that they require on the supermarket company’s website and pay electronically. The
goods are later delivered to their home.
3 (a) Each item on sale in the supermarket has a barcode printed on it.
5 0 1 2 3 4 5 6 1 2 3 4 5
(i) Explain why the bars on the barcode are different widths.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[2]
(ii) Describe what the digits stand for and why they are necessary.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[2]
(iii) Explain how the data collected from the barcodes at the checkout is used.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[6]
(b) Rosef, a systems analyst, has been employed to oversee the introduction of the new
contactless system.
Describe each of the following methods of implementation that Rosef could use and explain
how each could be used in the supermarket to introduce the new system.
Parallel running:
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Direct changeover:
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Pilot running:
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[6]
(c) Rosef will need to provide documentation for the checkout operators using the contactless
payment system and for the administration staff of the supermarket.
Explain the need for user documentation specifically for the contactless payment system in
Kwikshop.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[4]
4 (a) Describe the benefits and drawbacks of this new online shopping system for the customers of
Kwikshop.
Benefits .....................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Drawbacks ................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[4]
(b) (i) Describe three different measures that the workers can take to overcome
computer-related health problems. Each problem must be different.
1 ........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
3 ........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[3]
Aggregated information:
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
Duty of confidence:
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[3]
Scenario 3
Question 5
Modeast hospital has an intensive care ward. The patients in each of the six beds in the intensive care
ward are monitored by a computer system.
5 (a) Explain how the computer system can be used in the intensive care unit of the hospital.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[6]
(b) Describe two forms of output that the system will produce and explain why each is necessary.
1 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[4]
Scenario 4
Question 6
The workers who are employed in the stores are offered a number of different working patterns so that
Homedec can increase its opening hours.
6 (a) Name and describe three different working patterns that would be appropriate for workers in
the stores. For each working pattern describe a different benefit to the workers in Homedec.
1 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
3 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[6]
(b) Workers at the stores are paid a bonus each month. Workers’ pay, bonuses and methods of
payment are stored in a spreadsheet, part of which is shown here.
A B C D E F G H I
Pay per
1 ID Hours hour Bonus Final Wage
2 216 16 $23.25 Blue =B2*C2+(VLOOKUP(D2,$G$2:$I$4,3,FALSE)) Blue $5.00
3 233 22 $16.95 Blue Silver $10.00
4 243 45 $22.75 Silver Gold $15.00
5 257 45 $15.85 Gold
6 261 16 $16.85 Silver
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[6]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[8]
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable
effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will
be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.
Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.
Published
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.
Cambridge will not enter into discussions about these mark schemes.
Cambridge is publishing the mark schemes for the October/November 2016 series for most
Cambridge IGCSE®, Cambridge International A and AS Level components and some Cambridge O Level
components.
(ii) Database:
Two from:
© UCLES 2016
Page 3 Mark Scheme Syllabus Paper
Cambridge International AS/A Level – October/November 2016 9713 11
2
File contains no formatting information
.csv file
Allows user to choose different fonts and effects
© UCLES 2016
Page 4 Mark Scheme Syllabus Paper
Cambridge International AS/A Level – October/November 2016 9713 11
Parallel running:
The old and new systems are run at the same time [1]
Both the chip and pin payment system and the contactless system are run together until the
contactless system has no bugs [1]
Direct changeover:
The new system replaces the old system immediately [1]
All the chip and pin machines are removed in one go and the new contactless system is
installed ready for the store to open the following day [1]
Pilot running
The new system is run in one branch of the organisation [1]
The contactless system is used in only one supermarket until it has been fully tested/before
being rolled out to other supermarkets [1]
© UCLES 2016
Page 5 Mark Scheme Syllabus Paper
Cambridge International AS/A Level – October/November 2016 9713 11
The users will not be familiar with the new technology and must therefore be given
instructions
User documentation is less time consuming/expensive than Rosef training them
The staff will need to be able to give assistance to customers and explain how to use it
Staff may need to consult FAQs/documentation if they/customers have problems
The documentation is permanently available meaning that Rosef will not need to be
consulted every time a problem occurs
The documentation will include a troubleshooting guide for future reference
May need to be able to restart the system if there is a system crash
Benefits:
Drawbacks:
© UCLES 2016
Page 6 Mark Scheme Syllabus Paper
Cambridge International AS/A Level – October/November 2016 9713 11
RSI – carpal tunnel syndrome – ensure that regular finger exercises are practised/take
regular breaks/use wrist supports/use trackerballs/ergonomic keyboard
RSI – cubital tunnel syndrome – keep forearms horizontal when using keyboard/take
regular breaks/place arms at your side straight down from time to time
Deep vein thrombosis – take regular breaks and walk around [3]
Duty of confidence:
Workers must not disclose/share personal/customer data to a third party [1]
© UCLES 2016
Page 7 Mark Scheme Syllabus Paper
Cambridge International AS/A Level – October/November 2016 9713 11
Buzzer/Sound/light alarm…
…in order to instantly attract attention if patient change may need immediate action/to alert
doctors/nurses if preset values exceeded
Job sharing – Two (or more) workers doing the job of one worker (working full time)
Allows workers to accept other commitments/can spend more time with family
Part time working – Working a limited number of hours/ working less than the normal working
hours of a full time employee
Allows workers to accept other commitments/can spend more time with family
Flexible working hours – Workers choose the time of day they want to work (but work the
same number of hours every week)
Can organise their working lives to suit their personal needs/Can choose to work off peak
hours as travelling to work outside peak times is easier and cheaper/If workers stay late to
finish a job, they can take time off at a later date/If the job requires great concentration, it can
be done at quiet times of day
Compressed hours – Working for same number of hours as a normal working week but over
fewer days
Earn the same amount of money but work fewer days/They can have long weekends by
finishing early on Fridays or not working Fridays/Travel to work fewer days so less time spent
travelling/Travel to work fewer days so less money spent travelling
[6]
Calculates the final wage after applying a bonus for each worker
Multiplies the number of hours worked/B2 by the pay per hour/C2…
… and adds the bonus to be paid
VLOOKUP is used to search the lookup table of bonuses/check which bonus is to be paid/in
the range G2 to G4/I4…
…until a match to the value in cell D2 is found…
…the resulting value is added
Needs to be an exact match because of the ‘FALSE’ part of the formula
The ‘3’ instructs that when a match is made then the appropriate value is read from the third
column of the lookup table
Contents of E2 = 377 [6]
© UCLES 2016
Page 8 Mark Scheme Syllabus Paper
Cambridge International AS/A Level – October/November 2016 9713 11
E-mail to customers
Use of attachments may dissuade customers from reading the advertisement
Customers may treat it as junk mail and so not read it
Specific customers can be targeted
Attachment can be created easily using DTP
DTP allows character shapes, variety of patterns, colours
Can be sent to world wide audience
Easy to create an email and mailmerge
Must have more than one method to gain full marks [8]
© UCLES 2016
Cambridge International Examinations
Cambridge International Advanced Subsidiary and Advanced Level
* 9 2 1 2 0 1 0 2 3 9 *
Write your Centre number, candidate number and name on all the work you hand in.
Write in blue or black pen.
Do not use staples, paper clips, glue or correction fluid.
You may use an HB pencil for any diagrams, graphs or rough working.
DO NOT WRITE IN ANY BARCODES.
The number of marks is given in brackets [ ] at the end of each question or part question.
DC (TN) 131305
© UCLES 2016 [Turn over
2
Scenario 1
Questions 1 and 2
Didier is a student who is studying for his A levels. He attends Montmartre College.
When he is at college he uses the college’s computer network in order to do his coursework.
When he is at home he uses his own laptop to continue work that he did not manage to complete at
college.
Didier needs to take weather readings for a month as part of his Geography coursework. He will then
have to write a report of his findings.
Didier uses the internet to find some information about the climate during the previous eleven months
for his report.
1 (a) Name four storage devices which Didier or the college could use. For each device give a
different use.
Device 1 ....................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Device 2 ....................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Device 3 ....................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Device 4 ....................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[4]
(b) Describe how Didier will use each of the following types of software to prepare his Geography
report. Each use must be different.
(i) Spreadsheet:
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[2]
(ii) Database:
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[2]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[2]
(c) Describe how Didier can find relevant pages on the internet related to his Geography
coursework.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[6]
2 Didier has found the ideal website for his needs. It provides the data that he wants in the form of a
.csv file.
Three file types are shown on the left along with six descriptions on the right.
Draw six lines (2 from each file type) to connect each file type to its most appropriate descriptions.
.csv file
Allows user to choose different fonts and effects
.rtf file
File contains text mixed with tags which are used to turn
effects on and off
.txt file
[4]
Scenario 2
Questions 3 and 4
Kwikshop is a supermarket company which has a number of branches across the country. It uses
computer technology at checkouts in all its supermarkets. Barcode scanners are used to input data
from goods purchased by customers. Smart card readers are used to allow customers to complete
their transactions.
The management of Kwikshop is aware of new technology that will allow customers to pay at the
checkout without entering their card into the chip and pin machine. They would like to introduce this
contactless technology throughout their stores.
The management of Kwikshop have recently introduced an online shopping system. Customers provide
a list of goods that they require on the supermarket company’s website and pay electronically. The
goods are later delivered to their home.
3 (a) Each item on sale in the supermarket has a barcode printed on it.
5 0 1 2 3 4 5 6 1 2 3 4 5
(i) Explain why the bars on the barcode are different widths.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[2]
(ii) Describe what the digits stand for and why they are necessary.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[2]
(iii) Explain how the data collected from the barcodes at the checkout is used.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[6]
(b) Rosef, a systems analyst, has been employed to oversee the introduction of the new
contactless system.
Describe each of the following methods of implementation that Rosef could use and explain
how each could be used in the supermarket to introduce the new system.
Parallel running:
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Direct changeover:
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Pilot running:
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[6]
(c) Rosef will need to provide documentation for the checkout operators using the contactless
payment system and for the administration staff of the supermarket.
Explain the need for user documentation specifically for the contactless payment system in
Kwikshop.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[4]
4 (a) Describe the benefits and drawbacks of this new online shopping system for the customers of
Kwikshop.
Benefits .....................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Drawbacks ................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[4]
(b) (i) Describe three different measures that the workers can take to overcome
computer-related health problems. Each problem must be different.
1 ........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
3 ........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[3]
Aggregated information:
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
Duty of confidence:
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[3]
Scenario 3
Question 5
Modeast hospital has an intensive care ward. The patients in each of the six beds in the intensive care
ward are monitored by a computer system.
5 (a) Explain how the computer system can be used in the intensive care unit of the hospital.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[6]
(b) Describe two forms of output that the system will produce and explain why each is necessary.
1 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[4]
Scenario 4
Question 6
The workers who are employed in the stores are offered a number of different working patterns so that
Homedec can increase its opening hours.
6 (a) Name and describe three different working patterns that would be appropriate for workers in
the stores. For each working pattern describe a different benefit to the workers in Homedec.
1 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
3 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[6]
(b) Workers at the stores are paid a bonus each month. Workers’ pay, bonuses and methods of
payment are stored in a spreadsheet, part of which is shown here.
A B C D E F G H I
Pay per
1 ID Hours hour Bonus Final Wage
2 216 16 $23.25 Blue =B2*C2+(VLOOKUP(D2,$G$2:$I$4,3,FALSE)) Blue $5.00
3 233 22 $16.95 Blue Silver $10.00
4 243 45 $22.75 Silver Gold $15.00
5 257 45 $15.85 Gold
6 261 16 $16.85 Silver
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[6]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[8]
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable
effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will
be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.
Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.
Published
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.
Cambridge will not enter into discussions about these mark schemes.
Cambridge is publishing the mark schemes for the October/November 2016 series for most
Cambridge IGCSE®, Cambridge International A and AS Level components and some Cambridge O Level
components.
(ii) Database:
Two from:
© UCLES 2016
Page 3 Mark Scheme Syllabus Paper
Cambridge International AS/A Level – October/November 2016 9713 12
2
File contains no formatting information
.csv file
Allows user to choose different fonts and effects
© UCLES 2016
Page 4 Mark Scheme Syllabus Paper
Cambridge International AS/A Level – October/November 2016 9713 12
Parallel running:
The old and new systems are run at the same time [1]
Both the chip and pin payment system and the contactless system are run together until the
contactless system has no bugs [1]
Direct changeover:
The new system replaces the old system immediately [1]
All the chip and pin machines are removed in one go and the new contactless system is
installed ready for the store to open the following day [1]
Pilot running
The new system is run in one branch of the organisation [1]
The contactless system is used in only one supermarket until it has been fully tested/before
being rolled out to other supermarkets [1]
© UCLES 2016
Page 5 Mark Scheme Syllabus Paper
Cambridge International AS/A Level – October/November 2016 9713 12
The users will not be familiar with the new technology and must therefore be given
instructions
User documentation is less time consuming/expensive than Rosef training them
The staff will need to be able to give assistance to customers and explain how to use it
Staff may need to consult FAQs/documentation if they/customers have problems
The documentation is permanently available meaning that Rosef will not need to be
consulted every time a problem occurs
The documentation will include a troubleshooting guide for future reference
May need to be able to restart the system if there is a system crash
Benefits:
Drawbacks:
© UCLES 2016
Page 6 Mark Scheme Syllabus Paper
Cambridge International AS/A Level – October/November 2016 9713 12
RSI – carpal tunnel syndrome – ensure that regular finger exercises are practised/take
regular breaks/use wrist supports/use trackerballs/ergonomic keyboard
RSI – cubital tunnel syndrome – keep forearms horizontal when using keyboard/take
regular breaks/place arms at your side straight down from time to time
Deep vein thrombosis – take regular breaks and walk around [3]
Duty of confidence:
Workers must not disclose/share personal/customer data to a third party [1]
© UCLES 2016
Page 7 Mark Scheme Syllabus Paper
Cambridge International AS/A Level – October/November 2016 9713 12
Buzzer/Sound/light alarm…
…in order to instantly attract attention if patient change may need immediate action/to alert
doctors/nurses if preset values exceeded
Job sharing – Two (or more) workers doing the job of one worker (working full time)
Allows workers to accept other commitments/can spend more time with family
Part time working – Working a limited number of hours/ working less than the normal working
hours of a full time employee
Allows workers to accept other commitments/can spend more time with family
Flexible working hours – Workers choose the time of day they want to work (but work the
same number of hours every week)
Can organise their working lives to suit their personal needs/Can choose to work off peak
hours as travelling to work outside peak times is easier and cheaper/If workers stay late to
finish a job, they can take time off at a later date/If the job requires great concentration, it can
be done at quiet times of day
Compressed hours – Working for same number of hours as a normal working week but over
fewer days
Earn the same amount of money but work fewer days/They can have long weekends by
finishing early on Fridays or not working Fridays/Travel to work fewer days so less time spent
travelling/Travel to work fewer days so less money spent travelling
[6]
Calculates the final wage after applying a bonus for each worker
Multiplies the number of hours worked/B2 by the pay per hour/C2…
… and adds the bonus to be paid
VLOOKUP is used to search the lookup table of bonuses/check which bonus is to be paid/in
the range G2 to G4/I4…
…until a match to the value in cell D2 is found…
…the resulting value is added
Needs to be an exact match because of the ‘FALSE’ part of the formula
The ‘3’ instructs that when a match is made then the appropriate value is read from the third
column of the lookup table
Contents of E2 = 377 [6]
© UCLES 2016
Page 8 Mark Scheme Syllabus Paper
Cambridge International AS/A Level – October/November 2016 9713 12
E-mail to customers
Use of attachments may dissuade customers from reading the advertisement
Customers may treat it as junk mail and so not read it
Specific customers can be targeted
Attachment can be created easily using DTP
DTP allows character shapes, variety of patterns, colours
Can be sent to world wide audience
Easy to create an email and mailmerge
Must have more than one method to gain full marks [8]
© UCLES 2016
Cambridge International Examinations
Cambridge International Advanced Subsidiary and Advanced Level
* 0 0 5 3 1 1 9 3 9 8 *
Write your Centre number, candidate number and name on all the work you hand in.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.
At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.
DC (LK) 133330/4
© UCLES 2017 [Turn over
2
1 Tick the four true statements referring to the use of data types when creating a database.
The real number data type is used for fields containing whole numbers only.
The numeric data type can be subdivided into different types of number.
2 Tick the four true statements relating to the use of normalisation when organising the attributes
and tables of a relational database.
A table that has not got a unique key can still be in first normal form.
Normalisation does not attempt to eliminate storing the same data in more than one
table.
Normalisation involves breaking down a table into less redundant, smaller tables.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[6]
4 Sheila has just become manager of the ticketing department in an airport. She uses computers to
accept payments and check passengers’ passports.
(a) Evaluate the input devices which Sheila might use, including their specific use in this system.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[8]
(b) Sheila stores all the records of her transactions and lists of passengers from each flight on a
hard disk. She is considering replacing her hard disk drive with a solid state drive (SSD).
Evaluate the use of a hard disk drive compared with an SSD.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[8]
5 Below is an extract from a spreadsheet showing the wages paid in one week to a group of workers.
Any hours worked over 40 count as overtime. Overtime is paid at 1.5 times the normal rate.
A B C D E F G H
1
Overtime
Hours worked Hours overtime Rate per hour Wage paid this
Worker’s name Job type earned this
this week worked paid week
2 week
3
4 Johan Braun Labourer 45 5 $13.00 $97.50 $617.50
5 Lisa Moran Skilled 40 $18.00 $720.00
6 Chi Li Labourer 40 $13.00 $520.00
7 Susan Armstrong Labourer 46 6 $13.00 $117.00 $637.00
8 Luqman Hisham Labourer 39 $13.00 $507.00
9 Kanda Demir Semi-skilled 40 $15.50 $620.00
10 Paul Strong Labourer 43 3 $13.00 $58.50 $578.50
11 Shoba Purushothaman Semi-skilled 48 8 $15.50 $186.00 $806.00
12 Kulap Kaya Semi-skilled 40 $15.50 $620.00
13 Tony Fernandes Skilled 40 $18.00 $720.00
14 Halim Saad Semi-skilled 51 11 $15.50 $255.75 $875.75
15
Workers working
16 overtime 5
17
(a) Write down the formula which should be used in cell C16 in order to display the number of
workers who worked overtime.
= ................................................................................................................................................
...............................................................................................................................................[4]
You can use the space below for any working you need.
(b) Write down the formula which should be used in cell D4 in order to display the number of
Hours overtime worked for Johan Braun. The formula should be in a form that can be easily
replicated and should leave the cell blank if no overtime has been worked.
= ................................................................................................................................................
...............................................................................................................................................[5]
You can use the space below for any working you need.
(c) Write down the formula which should be used in cell F4 in order to display the amount of
money earned for working overtime for Johan Braun. The formula should be in a form that
can be easily replicated and should leave the cell blank if no overtime has been worked.
= ................................................................................................................................................
...............................................................................................................................................[5]
You can use the space below for any working you need.
The BBC has obtained exclusive figures from the financial ombudsman that show there have
been nearly 100 complaints about “vishing” in the past three months.
(i) phishing.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[3]
(ii) vishing.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[3]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
(b) Describe six of the services that are provided by the internet.
1. ...............................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
2. ...............................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
3. ...............................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
4. ...............................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
5. ...............................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
6. ...............................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[6]
8 A recording company has produced a video of one of its famous singers. The video has been
given to John to edit so that it will have a fully professional look. The soundtrack has been sent
separately to the video file.
Describe how John would use the following features of video editing software.
Trimming ..........................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[6]
9 Bruce works from home but is able to access company data using a virtual private network (VPN).
Benefits ............................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
Drawbacks .......................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[6]
Apart from type check or length check, describe four different validation checks which should be
carried out on the data to help prevent mistakes occurring.
1. ......................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
2. ......................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
3. ......................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
4. ......................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[8]
11 A manager of a small business wants to update her computer system. When considering which
software to use, she has to choose between custom written software and off-the-shelf software.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[3]
(b) Off-the-shelf:
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[3]
12 Below is part of a spreadsheet Deirdre has created to show her company’s profits.
A B C D E F G
1 DIY Inc.
2
3 2012 2013 2014 2015 2016
4
5 1st quarter $135,000 $146,000 $158,000 $162,000 $154,000
6 2nd quarter $142,000 $149,000 $161,000 $167,000 $157,000
7 3rd quarter $138,000 $150,000 $159,000 $163,000 $151,000
8 4th quarter $129,000 $141,000 $146,000 $148,000 $147,000
9
10 Total profits $544,000 $586,000 $624,000 $640,000 $609,000
11
Describe, giving reasons, the most appropriate type of graph or chart for displaying:
(i) the company’s profits, throughout 2016 showing comparisons of each quarter.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[3]
(ii) the company’s profits, showing the trend for all four quarters in each year from 2012 to 2016.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[3]
BLANK PAGE
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.
Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.
Write your Centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.
At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.
DC (NH) 143196
© UCLES 2017 [Turn over
2
1 A bank has strategies in place to safeguard its information technology (IT) services. You have
been asked to check and update the strategies that are designed to try and prevent IT disasters
from happening, the strategy for disaster recovery management and the strict password policy.
(a) Describe how you would use risk analysis to check the strategy for disaster recovery
management.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[4]
(b) The bank’s strict password policy has rejected these two passwords:
abc
1234AAA
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[6]
© UCLES 2017 9626/31/M/J/17
3
(c) Explain the precautions that you would take to try and prevent a disaster happening to the
data used by the IT services.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[6]
2 Project management software is used to create an overview of the tasks or activities required in a
project.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[4]
3 Frank is a web designer who writes his own code and uses JavaScript on his webpages. He
wants to print his name on every page. He creates two versions of the code to run his JavaScript
on the webpage. These versions are represented here:
Version 1:
<script language="JavaScript">
document.write ("<p>My name is <b>Frank </b> </p>");
</script>
Version 2:
where the instructions for writing Frank’s name are in the file called “FranksJavaScriptcode.js”
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[6]
(a) Describe each of the following wide area network (WAN) protocols.
(i) HDLC:
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[2]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[2]
(b) An updated version of a free operating system has to be downloaded quickly. The operating
system is contained in a very large file. There is a choice of using ‘BitTorrent’ or file transfer
protocol (FTP) for the download.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[4]
(c) Describe how a network router provides connectivity between a home network and the
internet.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[6]
5 Discuss the benefits and drawbacks to small businesses of storing their data in the ‘cloud’.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[8]
6 A new operating system for tablet computers has been developed and is now ready for testing to
begin.
Analyse the difference between white box testing and black box testing.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[8]
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[8]
8 You have been asked to use data mining to analyse economic trends for a business.
Describe the tasks involved in data mining that you would have to carry out to produce an overview
of an economic trend.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[6]
9 Dylan works for a graphics design company producing images in GIF, JPEG and PNG file formats.
He has been asked to produce some high-quality still images for use in advertising on the World
Wide Web. He has to choose one of the file formats to store the images.
Choose the most appropriate file format by comparing the features of the three different formats.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[4]
10 A large, profitable manufacturing company wishes to replace its current computer system with a
new one. The company employs a large workforce in many different departments. The time to
be taken for the implementation is not important but the new system must work as efficiently as
possible.
The company has chosen the most appropriate method of implementation to suit its circumstances.
Identify the chosen method and explain, with reasons, why the company has chosen this compared
to other methods.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[8]
11 A large company employs a small team of workers to design a new, complex product. They
all work on the same site and need to discuss possible designs and costings and to exchange
documentation on a weekly basis. Network connections are intermittent.
The company could use video-conferencing or face-to-face meetings for the workers’ discussions.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[8]
BLANK PAGE
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.
Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.
Write your Centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.
At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.
DC (NH/FC) 134398/2
© UCLES 2017 [Turn over
2
(i) Video-conferencing:
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[2]
(ii) Teleworking:
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[2]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[5]
2 Companies must protect the data that is used and stored on their networks.
(a) Evaluate the use of a firewall in protecting the data on a company network.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[8]
(b) Describe how a proxy server can help to protect a company network.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[4]
3 A report about the computer system of a company is to be written. The activities to be carried out
so that the report can be presented by the due dates are shown below:
Number of days
Activity allocated to
activity
Evaluation of initial report 6
Initial research of the system 2
Interviewing users of the system 2
Writing the final report 4
Writing the initial report 3
Using the table below, create a Gantt chart to show a possible schedule of activities.
Clearly indicate which tasks are carried out in parallel and which tasks are carried out sequentially.
Activity
M T W T F M T W T F M T W T F
[8]
4 RockIT Limo Hire is a taxi company that has an online booking system. Customers can book a
journey using a smartphone. When the company receives a booking request from a customer, it
collects the following data:
RockIT Limo Hire’s computer system checks its booking diary to see if the booking can be
accepted.
• the customer is sent a text (SMS) to state that the booking is refused
• the customer details are deleted from the system.
In the box below, draw a Level 1 data flow diagram (DFD) to represent the RockIT Limo Hire
booking system.
[8]
5 An examination board uses mail merge to create letters to send to candidates by email.
The letter template showing the places to insert the candidate details is illustrated below:
Cambridge Assessment
Cambridge International Examinations
1 Hills Road
Cambridge
United Kingdom
Yours sincerely,
Director
Family First Title Address Address City ZIP/Postal Country Email address
name name line 1 line 2 code
(a) Explain how you would use the data given in the table to create the template shown.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[5]
(b) Explain how you would produce the letters to all the candidates apart from those in New
Zealand.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
6 Quick Response (QR) codes are used in marketing to convey information to users.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[4]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
(c) Describe how a QR code may put the user at risk from malicious code.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[4]
7 Animators create effects by ‘morphing’ images from one into another. An example of one image
being morphed into another is shown in Fig. 1.
Fig. 1
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[6]
8 A software company produces games for use on smartphones. It uses the Rapid Application
Development method to develop the games.
Discuss the advantages and disadvantages of the Rapid Application Development method.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[8]
1 2 3 4 5 6 7 8 9 10
2 4 6 8 10 12 14 16 18 20
3 6 9 12 15 18 21 24 27 30
4 8 12 16 20 24 28 32 36 40
5 10 15 20 25 30 35 40 45 50
6 12 18 24 30 36 42 48 54 60
7 14 21 28 35 42 49 56 63 70
8 16 24 32 40 48 56 64 72 80
9 18 27 36 45 54 63 72 81 90
10 20 30 40 50 60 70 80 90 100
Fig. 2
<html>
<body>
<script language="javascript">
var tableout;
tableout = "<table border='1' width='300' cellspacing='0'
cellpadding='3'>"
for (b = 1; b <= 10; b++) {
tableout = tableout + "<tr>";
for (g = 1; g <= 10; g++) {
tableout = tableout + "<td>" + b * g + "</td>";
}
tableout = tableout + "</tr>";
}
tableout = tableout + "</table>";
document.write (tableout);
</script>
</body>
</html>
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[8]
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[8]
11 A college department has a free Massive Open Online Course (MOOC) with access for its students
via the World Wide Web.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[6]
BLANK PAGE
BLANK PAGE
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.
Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.
Write your Centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.
At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.
DC (NH) 134399/3
© UCLES 2017 [Turn over
2
1 A bank has strategies in place to safeguard its information technology (IT) services. You have
been asked to check and update the strategies that are designed to try and prevent IT disasters
from happening, the strategy for disaster recovery management and the strict password policy.
(a) Describe how you would use risk analysis to check the strategy for disaster recovery
management.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[4]
(b) The bank’s strict password policy has rejected these two passwords:
abc
1234AAA
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[6]
© UCLES 2017 9626/33/M/J/17
3
(c) Explain the precautions that you would take to try and prevent a disaster happening to the
data used by the IT services.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[6]
2 Project management software is used to create an overview of the tasks or activities required in a
project.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[4]
3 Frank is a web designer who writes his own code and uses JavaScript on his webpages. He
wants to print his name on every page. He creates two versions of the code to run his JavaScript
on the webpage. These versions are represented here:
Version 1:
<script language="JavaScript">
document.write ("<p>My name is <b>Frank </b> </p>");
</script>
Version 2:
where the instructions for writing Frank’s name are in the file called “FranksJavaScriptcode.js”
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[6]
(a) Describe each of the following wide area network (WAN) protocols.
(i) HDLC:
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[2]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[2]
(b) An updated version of a free operating system has to be downloaded quickly. The operating
system is contained in a very large file. There is a choice of using ‘BitTorrent’ or file transfer
protocol (FTP) for the download.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[4]
(c) Describe how a network router provides connectivity between a home network and the
internet.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[6]
5 Discuss the benefits and drawbacks to small businesses of storing their data in the ‘cloud’.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[8]
6 A new operating system for tablet computers has been developed and is now ready for testing to
begin.
Analyse the difference between white box testing and black box testing.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[8]
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[8]
8 You have been asked to use data mining to analyse economic trends for a business.
Describe the tasks involved in data mining that you would have to carry out to produce an overview
of an economic trend.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[6]
9 Dylan works for a graphics design company producing images in GIF, JPEG and PNG file formats.
He has been asked to produce some high-quality still images for use in advertising on the World
Wide Web. He has to choose one of the file formats to store the images.
Choose the most appropriate file format by comparing the features of the three different formats.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[4]
10 A large, profitable manufacturing company wishes to replace its current computer system with a
new one. The company employs a large workforce in many different departments. The time to
be taken for the implementation is not important but the new system must work as efficiently as
possible.
The company has chosen the most appropriate method of implementation to suit its circumstances.
Identify the chosen method and explain, with reasons, why the company has chosen this compared
to other methods.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[8]
11 A large company employs a small team of workers to design a new, complex product. They
all work on the same site and need to discuss possible designs and costings and to exchange
documentation on a weekly basis. Network connections are intermittent.
The company could use video-conferencing or face-to-face meetings for the workers’ discussions.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[8]
BLANK PAGE
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.
Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.
Write your Centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.
At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.
DC (ST/SW) 142860
© UCLES 2017 [Turn over
2
1 Tick the four most accurate statements regarding LANs and WANs.
2 Tick the four statements which are true about the use of expert systems.
The inference engine searches the user interface to find possible solutions.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[4]
4 Ashraf has used a word processor to type up an essay for his history assignment. He wishes to
make sure that there are no errors in the text he has written.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[4]
5 A school secretary has just been given some student data to enter into a school’s database of
student records.
These include student numbers and dates of birth such as:
13542767 14/07/2000
11987643 13/10/2001
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[8]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[3]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[3]
7 A school has a computerised weather station which monitors a number of atmospheric conditions
or variables.
Describe how data is collected, processed and displayed using such a system.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[6]
8 Li is very concerned that one day he could be a victim of a scam to take money from his bank
account. He is particularly worried about smishing and pharming.
(a) smishing.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[3]
(b) pharming.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[3]
The digital divide, like many other economic or social problems, is a global issue.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[6]
10 Here is a table of data about individuals and their families which is being converted into a database.
Family_name First_name C D E F
Suggest suitable field names for C, D, E and F. For each field, state an appropriate data type
and give a reason for your choice. For each field, state, with a reason, the number of bytes the
database would need to allocate for the data to be stored.
(i) C ..................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[2]
(ii) D .................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[2]
(iii) E ................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[2]
(iv) F .................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[2]
11 Rajvinder and his team of car designers are producing designs for a new model. Their office is on
the other side of town from the company’s head office. Every month, Rajvinder and the designers
report to the company directors by means of a web conference.
Describe how Rajvinder would set up this web conference, assuming that he is using a third party
to supply the service and that he has checked that all the hardware and software is working.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[6]
12 Dudley Nuclear Fuels (DNF) creates and operates nuclear reactors. They often create models of
reactors before building them in real life.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[8]
13
Above is a pie chart showing the proportion of students following different courses at a school. In
its present form it is not providing any information.
Describe, using examples related to this scenario, how you would improve this chart so that it did
provide information which could be used by the head teacher of the school.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[4]
14 Imran has developed a simple library database system which contains information about the
books. Each record contains the following data:
Book title, author, ISBN, borrowed (Y/N), date borrowed, borrower number.
Design an appropriate online data entry form for one book, clearly indicating the amount of space
required for each field. Your design must represent a computer screen and, where appropriate,
allow the user to enter data by clicking the mouse rather than entering text.
[8]
15 Frida has been given the task of creating a database to store all her company’s customer records
and sales records. She is going to produce a relational database.
The customer records will have the fields Customer_id, Name, Contact_phone and
Card_number.
The sales records will have the fields Invoice_number, Item_number, Item_description,
Item_cost and Customer_ref.
(a) Complete the diagram below to show how the tables will be combined.
[4]
(b) Describe how you would create the relational database in part (a).
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[4]
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.
Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.
Write your Centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.
At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.
DC (LK/SW) 133328/2
© UCLES 2017 [Turn over
2
1 Tick the four most accurate statements regarding LANs and WANs.
2 Tick the four statements which are true about the use of expert systems.
The inference engine searches the user interface to find possible solutions.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[4]
4 Ashraf has used a word processor to type up an essay for his history assignment. He wishes to
make sure that there are no errors in the text he has written.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[4]
5 A school secretary has just been given some student data to enter into a school’s database of
student records.
These include student numbers and dates of birth such as:
13542767 14/07/2000
11987643 13/10/2001
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[8]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[3]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[3]
7 A school has a computerised weather station which monitors a number of atmospheric conditions
or variables.
Describe how data is collected, processed and displayed using such a system.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[6]
8 Li is very concerned that one day he could be a victim of a scam to take money from his bank
account. He is particularly worried about smishing and pharming.
(a) smishing.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[3]
(b) pharming.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[3]
The digital divide, like many other economic or social problems, is a global issue.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[6]
10 Here is a table of data about individuals and their families which is being converted into a database.
Family_name First_name C D E F
Suggest suitable field names for C, D, E and F. For each field, state an appropriate data type
and give a reason for your choice. For each field, state, with a reason, the number of bytes the
database would need to allocate for the data to be stored.
(i) C ..................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[2]
(ii) D .................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[2]
(iii) E ................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[2]
(iv) F .................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[2]
11 Rajvinder and his team of car designers are producing designs for a new model. Their office is on
the other side of town from the company’s head office. Every month, Rajvinder and the designers
report to the company directors by means of a web conference.
Describe how Rajvinder would set up this web conference, assuming that he is using a third party
to supply the service and that he has checked that all the hardware and software is working.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[6]
12 Dudley Nuclear Fuels (DNF) creates and operates nuclear reactors. They often create models of
reactors before building them in real life.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[8]
13
Above is a pie chart showing the proportion of students following different courses at a school. In
its present form it is not providing any information.
Describe, using examples related to this scenario, how you would improve this chart so that it did
provide information which could be used by the head teacher of the school.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[4]
14 Imran has developed a simple library database system which contains information about the
books. Each record contains the following data:
Book title, author, ISBN, borrowed (Y/N), date borrowed, borrower number.
Design an appropriate online data entry form for one book, clearly indicating the amount of space
required for each field. Your design must represent a computer screen and, where appropriate,
allow the user to enter data by clicking the mouse rather than entering text.
[8]
15 Frida has been given the task of creating a database to store all her company’s customer records
and sales records. She is going to produce a relational database.
The customer records will have the fields Customer_id, Name, Contact_phone and
Card_number.
The sales records will have the fields Invoice_number, Item_number, Item_description,
Item_cost and Customer_ref.
(a) Complete the diagram below to show how the tables will be combined.
[4]
(b) Describe how you would create the relational database in part (a).
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[4]
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.
Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.
Published
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.
Cambridge will not enter into discussions about these mark schemes.
Cambridge is publishing the mark schemes for the May/June 2017 series for most Cambridge IGCSE®,
Cambridge International A and AS Level and Cambridge Pre-U components, and some Cambridge O Level
components.
1 4
Boolean is a data type representing one of two states. 3
Text fields cannot contain numbers.
Numeric fields cannot contain text. 3
Integer is a numeric data type used for storing decimal numbers.
Date is a data type which can be used for storing images.
The real number data type is used for fields containing whole
numbers only.
The numeric data type can be sub divided into different types of
3
number.
The alphanumeric data type can contain punctuation marks. 3
The text data type is the easiest type of data to validate.
Currency must be stored as text.
2 4
A table that has not got a unique key can still be in first normal
form.
Normalisation does not attempt to eliminate storing the same data
in more than one table.
Normalisation involves breaking down a table into less redundant,
3
smaller tables.
There are no duplicate records in first normal form. 3
A table is in second normal form if it is in first normal form and,
3
additionally, does not have a composite primary key.
A table in first normal form must use all the relationships, one to
one, one to many and many to one.
A database is in third normal form if it is in second normal form
and each table has no non-key attributes that depend upon other 3
non-key attributes.
Third Normal Form tables can still have non-key attributes
depending on other non-key attributes.
Third Normal Form tables can still have fields that do not depend
on the primary key.
Every table in a relational database must have a foreign key.
3 Six from: 6
Level 0 (0 marks)
Response with no valid content.
Advantages
Hard disks tend to have higher storage capacities than SSDs
Hard disk drives still cost less per gigabyte than SSDs
HDDs last longer than SSDs «
«the NAND flash used in SSDs can only be used for a finite number of
writes
The choice and availability of SSDs is still limited
Disadvantages
Hard Disk Drives are more susceptible to shock and damage«
« as they consist of various moving parts
SSDs have faster data transfer rate
SSDs have quicker boot ups«
«can have almost instantaneous data access«
«HDDs data access speed is dependent on how close the data is to the
read/write heads«
«while all parts of the SSD can be accessed at once
SSDs use significantly less power at peak load than hard drives«
«SSD's energy efficiency can deliver longer battery life in laptops
With no moving parts SSDs run at near silent operation«
«unlike whirring hard disk drives.
5(a) 4
COUNTIF(C4:C14,">40")
COUNTIF() 1 mark
C4:C14, 1 mark
>40 1 mark
,“” 1 mark
5(b) 5
=IF(C4>40,C4-40,"")
=IF() 1 mark
C4 1 mark
>40 1 mark
,C4-40 1 mark
,“” 1 mark
5(c) 5
=IF(C4>40,D4*E4*1.5,"")
=IF() 1 mark
C4>40 1 mark
,D4*E4 1 mark
*1.5 1 mark
,”” 1 mark
6(i) Phishing 3
Three from:
6(ii) Vishing 3
Three from:
Electronic Mail – email is a message that may contain text, files, images, or
other attachments sent through a network to a specified individual or group
of individuals
World Wide Web – The World Wide Web is a system of Internet servers that
support specially formatted HTML documents
File transfer – transmitting files over a computer network like the internet.
Trimming –
On the Timeline he would position the cursor over the in/start or out/end
point
When the trim handles appear drag the handle to trim the clip«
«action the trim
Adding sound –
In the software he would open the video and audio files that he wants to
merge
Then drag the added files to the corresponding tracks on the timeline board
The video file would be placed on the video track and the audio file on the
audio track
Adding captions –
Once he has chosen the style he wants, right-click it and select where he
wants to place it
He would select start of the video track/add to the end of the video track/add
to the title track
Then double-click the title frame in the preview window and type or paste
the text.
9 Six from: 6
Benefits
Offer a much higher level of secure communication when compared to other
remote methods of communication
Every file coming into a computer or going out from a computer is
encrypted«
« meaning no unwanted user will be able to open the files
Can be used to work automatically as part of logging on
Drawbacks
The company may not permit him to use other third party software on his
computer in order to safeguard the integrity of their VPN connection
The use of mobile devices to initiate access to the virtual private network
can cause security issues«
«if Bruce’s local wireless network is not secure
Packet loss will be higher with the VPN and cause data to be lost and need
to be retransmitted«
«increasing the time taken to receive documents
The connection depends on the ISP and so performance can be variable
Will need to install extra anti- malware tools to ensure his PC is clean in
order to comply with VPN suppliers’ requirements.
The height of the bars represent the monetary value and the x axis is the
category axis (the quarters) 1 mark
Points are plotted, monetary value against year and these are joined
together by straight lines 1 mark
Useful for emphasising the trend over time since they allow a viewer to trace
it by working backwards or interpolating 1 mark
Published
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.
Cambridge will not enter into discussions about these mark schemes.
Cambridge is publishing the mark schemes for the May/June 2017 series for most Cambridge IGCSE®,
Cambridge International A and AS Level and Cambridge Pre-U components, and some Cambridge O Level
components.
The abc password is too short and does not meet minimum length
requirements/number of character requirements
Does not meet requirement for different types of characters
Passwords must not be easily guessed and this is a simple pattern
1234AAA password has a sequence of characters/numbers
...has repeating characters
Neither have a combination of upper/lower case/number/special characters.
2 Four from: 4
3 Six from: 6
Can call the code several times/from different pages/re-use the code
No need of re-writing/having several copies/copies on each webpage
Code only has to be tested once/checked for errors once
File/JavaScript is cached by web browser
...reduces network access time/reduces cost of fetching data
JavaScript code embedded in webpages can slow loading times/reduce
browser performance
...webpage can slow/stop while browser executes code
Can separate code into different conceptual/functional areas
...provides modularity to code
...separate html and JavaScript code so easier to read/maintain.
(HDLC is):
High-Level Data Link Control
Layer 2 (data link) protocol
Connects point-to-point serial devices/leased lines
Uses error correction
Routers encapsulate HDLC before putting on LAN.
Benefits:
Reduced IT support requirements/staff so reduced costs to company
Reduced requirements for storage devices reduces costs/maintenance costs
Backups are managed by ‘cloud’ company so reduced costs of media/staff to
carry out backups
Files can be accessed from anywhere with internet connection allowing
collaboration on documents/allows access to documents from home
Drawbacks:
Security issues are not under business control
‘Cloud’ service suppliers may go out of business so data is lost
Need for a reliable internet service to be able to access the data
Data may not be stored in same country as business so may be subject to
different laws/regulations.
Analyse requires that candidates explain the main points in detail, explaining
their effectiveness and characteristics.
Level 0 (0 marks)
Response with no valid content.
White Box Testing is a testing method in which the internal structure/ design/
implementation is known to the tester.
Black Box Testing is a testing method in which the internal structure/ design/
implementation is NOT known to the tester.
In white box testing, programming knowledge is required; in black box
testing it is not.
In white box testing, programming knowledge is in-house; in black box
testing it is not.
White box testing needs access to a detailed design specification, black box
testing does not.
White box testing needs knowledge of the implementation, black box testing
does not.
7 Eight from: 8
Advantages
Easier to customise products such as pills to users specific
requirements/genetic makeup
Printing can be done remotely so no need to transport the final product from
factory to destination
Prototypes can be produced more rapidly for testing so production is
speeded up
Manufacturing of product may be faster than traditional methods so product
is available sooner
Costs may be reduced due to reduction in tooling costs/ less need for
specialist machinery
No need to store excess inventory/reduced warehouse costs
Can produce items/spare parts in harsh environments where traditional
methods may not be feasible/possible
Disadvantages
Limited materials available for printing so product range is
restricted/materials may not be suitable for product’s eventual use
Copyright issues arise as easier for anyone to print the product
Dangerous items can be more easily created e.g. Knives/guns
Useless items produced and thrown away these have an environmental
impact
Limited size of products due to restrictions on size of printer
Printing can be quite slow compared to traditional manufacturing.
9 Four from: 4
PNG images are lossless/do not lose data when edited so have higher
quality
JPEG (jpg) format is compressed with data being lost/data is lost during
editing but images are of lower quality/have artefacts compared to PNG
images
GIF only allows limited number of colours/256 colours so is not suitable for
high quality image publication
GIF allows several images in one file so animations are possible, but this is
not required.
10 Eight from: 8
Pilot running would not be appropriate as it not likely that each department
would need similar aspects of the system
Phased implementation would be possible because one department could
have their part system implemented...
...when working another part of system could be tried in another department
Parallel running would be possible as there are enough workers available to
use both systems at the same time
Parallel running would be possible as company can afford to employ two
sets of workers if more are needed
Parallel running is appropriate as the old system continues while problems
are fixed with the new system
Direct changeover would not be advisable as it may not work properly first
time
Direct changeover is a quick method but speed of changeover is not an
issue
Direct changeover is a cheaper method but the cost is not important to the
company.
11 Eight from: 8
Total: 90
Published
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.
Cambridge will not enter into discussions about these mark schemes.
Cambridge is publishing the mark schemes for the May/June 2017 series for most Cambridge IGCSE®,
Cambridge International A and AS Level and Cambridge Pre-U components, and some Cambridge O Level
components.
Advantages:
A firewall can provide protection to multiple networked computers
simultaneously
Firewalls can monitor traffic coming in and going out of a network«
«and produce log files for subsequent analysis
Firewalls can enforce password controls to enter/use the network to try to
prevent unauthorised users from gaining access
Firewalls can enforce access policies so that only authorised users can
access the network/parts of the network
Firewalls reduce the risk of key logging software sending details to third
parties by blocking the access out of the network
Disadvantages:
Firewalls are the central point of attack by hackers/potential intruders and
once breached there are no further defences
Firewalls can block legitimate process/applications so manual adjustment of
settings may be required
«can lead to allowing unwanted access by other processes if not
configured by experts
Firewalls are usually incapable of protecting against backdoor Trojans that
open ports to send data to third parties who can then access the system
Firewalls do not usually contain malware removal tools.
Acts as intermediary for client requests for services such as a web page/a
file
Provide content filtering to control the content that is accessed/enforce
acceptable use policies
Provide user authentication to control web access
Provide detailed logs of user web activity/flag up unacceptable use by
employees
Provide links to anti-malware applications to check incoming/outgoing data
Filtering based on URL lists
«DNS blacklists
«based on lists maintained by third party companies
Can provide NAT/anonymity of IP address.
3 Eight from: 8
E.g.
7 Six from: 6
Warping/deforming these from the original images so final image has same
shape
«use of forward mapping
«each pixel in original image is mapped to an appropriate
«pixel in final image
«use of reverse mapping
«each pixel in the final image is sampled for an usable/ appropriate pixel in
the original
«all final image pixels are mapped to an original image pixel
Cross-dissolving the images
«a sequence of images shows a gradual fade from one to the other
«via a (series of) transition images
«original image is gradually distorted and faded out
«final image starts out totally warped to the first and is faded in.
8 Eight from: 8
Advantages:
Increased quality of product
«focusses on problems that are critical to end users
«rather than technical problems of interest to developers
More likely to complete project on time
More likely to complete within budget
«method focuses on incremental development so chances of failure are
reduced
More risk control
«the key risk factors show in the early part of the process
provides a flexible/adaptable process
Disadvantages:
Users are involved from the beginning and at all stages of the entire
project«
«takes more interaction throughout the entire life-cycle between users and
developers
«takes up the time of the experts
«costs are likely to be higher
RAD can be a new approach for some developers
«new tools/methods will be more likely to fail the first time as the team
learns the process
Less control over the process as it is adaptable
Poor design of prototypes
«developers constantly make minor changes to individual components
«ignore overall system architecture issues that produce a better overall
design
Not suitable for very large systems.
9 Six from: 8
Advantages:
satellite communications:
• easier to setup of mobile communications
• are more economical than terrestrial communication over long
distances
• is most economical especially for low network traffic demands in remote
areas
• quality of transmitted signal is independent of distance
• quality of transmitted signal does not depend on location of sending and
receiving stations
• country/owner has control over their own network
Disadvantages:
• huge initial cost of manufacture/launch
• repair of satellite is almost impossible once it has been launched
• can be affected by severe weather conditions/very dark clouds
• can be affected by electromagnetic disturbances/events in space/sun
activity
• annoying time gap/delay between exchange of data reducing the
efficiency of satellite communications for data transmission.
11 Six from: 6
Total: 90
Published
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.
Cambridge will not enter into discussions about these mark schemes.
Cambridge is publishing the mark schemes for the May/June 2017 series for most Cambridge IGCSE®,
Cambridge International A and AS Level and Cambridge Pre-U components, and some Cambridge O Level
components.
The abc password is too short and does not meet minimum length
requirements/number of character requirements
Does not meet requirement for different types of characters
Passwords must not be easily guessed and this is a simple pattern
1234AAA password has a sequence of characters/numbers
...has repeating characters
Neither have a combination of upper/lower case/number/special characters.
2 Four from: 4
3 Six from: 6
Can call the code several times/from different pages/re-use the code
No need of re-writing/having several copies/copies on each webpage
Code only has to be tested once/checked for errors once
File/JavaScript is cached by web browser
...reduces network access time/reduces cost of fetching data
JavaScript code embedded in webpages can slow loading times/reduce
browser performance
...webpage can slow/stop while browser executes code
Can separate code into different conceptual/functional areas
...provides modularity to code
...separate html and JavaScript code so easier to read/maintain.
(HDLC is):
High-Level Data Link Control
Layer 2 (data link) protocol
Connects point-to-point serial devices/leased lines
Uses error correction
Routers encapsulate HDLC before putting on LAN.
Benefits:
Reduced IT support requirements/staff so reduced costs to company
Reduced requirements for storage devices reduces costs/maintenance costs
Backups are managed by ‘cloud’ company so reduced costs of media/staff to
carry out backups
Files can be accessed from anywhere with internet connection allowing
collaboration on documents/allows access to documents from home
Drawbacks:
Security issues are not under business control
‘Cloud’ service suppliers may go out of business so data is lost
Need for a reliable internet service to be able to access the data
Data may not be stored in same country as business so may be subject to
different laws/regulations.
Analyse requires that candidates explain the main points in detail, explaining
their effectiveness and characteristics.
Level 0 (0 marks)
Response with no valid content.
White Box Testing is a testing method in which the internal structure/ design/
implementation is known to the tester.
Black Box Testing is a testing method in which the internal structure/ design/
implementation is NOT known to the tester.
In white box testing, programming knowledge is required; in black box
testing it is not.
In white box testing, programming knowledge is in-house; in black box
testing it is not.
White box testing needs access to a detailed design specification, black box
testing does not.
White box testing needs knowledge of the implementation, black box testing
does not.
7 Eight from: 8
Advantages
Easier to customise products such as pills to users specific
requirements/genetic makeup
Printing can be done remotely so no need to transport the final product from
factory to destination
Prototypes can be produced more rapidly for testing so production is
speeded up
Manufacturing of product may be faster than traditional methods so product
is available sooner
Costs may be reduced due to reduction in tooling costs/ less need for
specialist machinery
No need to store excess inventory/reduced warehouse costs
Can produce items/spare parts in harsh environments where traditional
methods may not be feasible/possible
Disadvantages
Limited materials available for printing so product range is
restricted/materials may not be suitable for product’s eventual use
Copyright issues arise as easier for anyone to print the product
Dangerous items can be more easily created e.g. Knives/guns
Useless items produced and thrown away these have an environmental
impact
Limited size of products due to restrictions on size of printer
Printing can be quite slow compared to traditional manufacturing.
9 Four from: 4
PNG images are lossless/do not lose data when edited so have higher
quality
JPEG (jpg) format is compressed with data being lost/data is lost during
editing but images are of lower quality/have artefacts compared to PNG
images
GIF only allows limited number of colours/256 colours so is not suitable for
high quality image publication
GIF allows several images in one file so animations are possible, but this is
not required.
10 Eight from: 8
Pilot running would not be appropriate as it not likely that each department
would need similar aspects of the system
Phased implementation would be possible because one department could
have their part system implemented...
...when working another part of system could be tried in another department
Parallel running would be possible as there are enough workers available to
use both systems at the same time
Parallel running would be possible as company can afford to employ two
sets of workers if more are needed
Parallel running is appropriate as the old system continues while problems
are fixed with the new system
Direct changeover would not be advisable as it may not work properly first
time
Direct changeover is a quick method but speed of changeover is not an
issue
Direct changeover is a cheaper method but the cost is not important to the
company.
11 Eight from: 8
Total: 90
Published
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.
Cambridge will not enter into discussions about these mark schemes.
Cambridge is publishing the mark schemes for the May/June 2017 series for most Cambridge IGCSE®,
Cambridge International A and AS Level and Cambridge Pre-U components, and some Cambridge O Level
components.
1 4
A WAN is a Wireless Area Network.
4 Four from: 4
Level 0 (0 marks)
Response with no valid content.
A range check could only be carried out on the student number if you
knew the lowest and highest number.
Invalid numbers/non-existent numbers might be entered which are within
the range so would be accepted.
A range check on each part of the date of birth could be carried out.
Would prevent negative days/days greater than 31 being entered.
Would prevent months less than 1 or greater than 12 being entered.
Would prevent years less than 2000 or greater than 2001 from being
entered.
Would not prevent dates like 30/02/2000 or 31/06/2000 being entered.
Check digit can only be carried out on long strings of numbers – Student
number is not really long enough.
Check digit would pick up transposed numbers which none of the other
checks would.
Date of birth is not in correct format for a check digit to be used.
Format check could be used on date of birth nn/nn/nnnn.
Format check would not pick up nonsensical dates of birth such as
68/99/3000.
Format check would pick up data entry errors such as a three digit
day/month/single digit day/month/two digit year.
Translates each line of source code into an intermediate stage and then
executes that line/statement
Reports on errors as lines of source code are entered
Only a few lines of source code needs to be in memory at any one time
Some interpreters execute code within a 'virtual machine'
these have been designed to disallow code from directly accessing the
computer.
7 Six from: 6
9 Six from: 6
The divide between people who have access to and the resources to use
new information/communication technology and those who do not
This technology can include the telephone, television, personal
computers and the internet
The divide between those who have the skills, knowledge and abilities to
use the technologies and those who do not
The digital divide can exist between those living in rural areas and those
living in urban areas
due to lack/expense of infrastructure in rural areas
The digital divide can exist between the educated and uneducated
The digital divide can exist between economic classes
The digital divide can exist between old and young people
as young people have grown up with the technology/older people may
feel they are too old/unwilling to learn about new technology/do not know
how to use it
May refer to inequalities between individuals, households, businesses, or
geographic areas
The divide between countries or regions of the world is referred to as the
global digital divide
The quality of connection to the internet may vary between
groups/countries
The price of connection to the internet may vary between
groups/countries
Can be overcome by:
Community teaching programmes to teach older people how to use
advanced technology
Giving cheap computers/laptops to school children from poor
backgrounds
Setting up cyber cafes in rural areas
Providing overseas aid to poor countries to purchase the technology.
11 Six from: 6
Benefits
Testing nuclear reactor designs using computer models avoids safety
problems
such as explosions/meltdowns
Testing nuclear reactor designs using computer models cuts costs
as do not have to pay as much money for workers/materials to replace
damaged reactors
Can obtain results in a short period of time regarding reactions that take
a long time in real life
Re-designing computer models is cheaper than re-building a nuclear
reactor
Researchers will have the tools to simulate scenarios that are hard to
observe in operating reactors
Drawbacks
Researchers will need to know how to apply simple modelling techniques
in some situations and more complicated ones in others
Models cannot always recreate exactly the real-world experiment
In order to carry out test efficiently researchers will need specialist
knowledge
of mechanical engineering/materials science/reactor physics
Most researchers who are specialists in one discipline will need to
retrain/extend their studies
which costs money
Not every possible variable may be included in the model
leading to inaccurate results.
13 Four from: 4
14 Eight from: 8
ᴕ Invoice_number
ᴕ Customer_id 1
Item_number
Name
Item_description
Contact_phone
∞ Item_cost
Card_number
Customer_ref
Published
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.
Cambridge will not enter into discussions about these mark schemes.
Cambridge is publishing the mark schemes for the May/June 2017 series for most Cambridge IGCSE®,
Cambridge International A and AS Level and Cambridge Pre-U components, and some Cambridge O Level
components.
1 4
A WAN is a Wireless Area Network.
4 Four from: 4
Level 0 (0 marks)
Response with no valid content.
A range check could only be carried out on the student number if you
knew the lowest and highest number.
Invalid numbers/non-existent numbers might be entered which are within
the range so would be accepted.
A range check on each part of the date of birth could be carried out.
Would prevent negative days/days greater than 31 being entered.
Would prevent months less than 1 or greater than 12 being entered.
Would prevent years less than 2000 or greater than 2001 from being
entered.
Would not prevent dates like 30/02/2000 or 31/06/2000 being entered.
Check digit can only be carried out on long strings of numbers – Student
number is not really long enough.
Check digit would pick up transposed numbers which none of the other
checks would.
Date of birth is not in correct format for a check digit to be used.
Format check could be used on date of birth nn/nn/nnnn.
Format check would not pick up nonsensical dates of birth such as
68/99/3000.
Format check would pick up data entry errors such as a three digit
day/month/single digit day/month/two digit year.
Translates each line of source code into an intermediate stage and then
executes that line/statement
Reports on errors as lines of source code are entered
Only a few lines of source code needs to be in memory at any one time
Some interpreters execute code within a 'virtual machine'
these have been designed to disallow code from directly accessing the
computer.
7 Six from: 6
9 Six from: 6
The divide between people who have access to and the resources to use
new information/communication technology and those who do not
This technology can include the telephone, television, personal
computers and the internet
The divide between those who have the skills, knowledge and abilities to
use the technologies and those who do not
The digital divide can exist between those living in rural areas and those
living in urban areas
due to lack/expense of infrastructure in rural areas
The digital divide can exist between the educated and uneducated
The digital divide can exist between economic classes
The digital divide can exist between old and young people
as young people have grown up with the technology/older people may
feel they are too old/unwilling to learn about new technology/do not know
how to use it
May refer to inequalities between individuals, households, businesses, or
geographic areas
The divide between countries or regions of the world is referred to as the
global digital divide
The quality of connection to the internet may vary between
groups/countries
The price of connection to the internet may vary between
groups/countries
Can be overcome by:
Community teaching programmes to teach older people how to use
advanced technology
Giving cheap computers/laptops to school children from poor
backgrounds
Setting up cyber cafes in rural areas
Providing overseas aid to poor countries to purchase the technology.
11 Six from: 6
Benefits
Testing nuclear reactor designs using computer models avoids safety
problems
such as explosions/meltdowns
Testing nuclear reactor designs using computer models cuts costs
as do not have to pay as much money for workers/materials to replace
damaged reactors
Can obtain results in a short period of time regarding reactions that take
a long time in real life
Re-designing computer models is cheaper than re-building a nuclear
reactor
Researchers will have the tools to simulate scenarios that are hard to
observe in operating reactors
Drawbacks
Researchers will need to know how to apply simple modelling techniques
in some situations and more complicated ones in others
Models cannot always recreate exactly the real-world experiment
In order to carry out test efficiently researchers will need specialist
knowledge
of mechanical engineering/materials science/reactor physics
Most researchers who are specialists in one discipline will need to
retrain/extend their studies
which costs money
Not every possible variable may be included in the model
leading to inaccurate results.
13 Four from: 4
14 Eight from: 8
ᴕ Invoice_number
ᴕ Customer_id 1
Item_number
Name
Item_description
Contact_phone
∞ Item_cost
Card_number
Customer_ref
Write your Centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.
At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.
DC (NF) 134291/3
© UCLES 2017 [Turn over
2
1 Tick the four most accurate statements regarding the quality of information.
Data collected from a third party always becomes high quality information.
The more complete the collected information is, the better its quality.
[4]
Explain why they are regarded as just items of data. In your explanation give a possible context
for the data and describe how this would make the data become information.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..................................................................................................................................................... [5]
4 There are many types of user interface in computerised systems. Three types are a graphical user
interface, a dialogue interface and a gesture based interface.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..................................................................................................................................................... [8]
5 Avtar is a recently appointed network manager in a school. In his role he will need to use a variety
of utility software.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...................................................................................................................................... [4]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...................................................................................................................................... [3]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...................................................................................................................................... [3]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...................................................................................................................................... [2]
(b) There are a number of computers in the school which are not networked at the moment.
Discuss the advantages and disadvantages of creating a new network using these computers.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [8]
6 Amisha, the Management Information System (MIS) manager has just purchased some MIS
software for her company.
Explain how it can be used by Amisha to help the company run more efficiently.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..................................................................................................................................................... [6]
7 Atat Iron Ltd uses computers to process its payroll. The company pays its workers weekly which
involves the updating of a master file.
(a) Describe what processes must happen before the updating can begin.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [2]
(b) Using this data, explain how a transaction file is used to update a master file in a payroll
system. You may assume that the only transaction being carried out is the calculation of the
weekly pay before tax and insurance deductions.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [6]
(c) When a new worker is added to the master file, the data must be validated. His hourly rate
will be 50 Rupees.
Without using a type check, describe three other validation checks you would develop to
make sure all the data entered is sensible.
1. ..............................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
2. ..............................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
3. ..............................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [6]
8 Below is part of a spreadsheet Jose has created to model his personal finances.
A B
1 $2,600 Wages/salary
2
3 $120 Utilities
4 $100 Satellite/TV
5 $80 Phone
6 $30 Pet food
7 $1,000 Mortgage/rent
8 $80 Internet
9 $100 Insurance
10 $75 Hair/beauty
11 $550 Groceries
12 $150 Eating out
13 $100 Clothing
14 $40 Cinema
15 $160 Car/travel
16
17 $2,585 Total outgoings
18
19 $15 Balance
Using only the sort feature explain how you would be able to get the following values in the given
cells.
(i) $80 in cell A11 with Internet in cell B11 and $1,000 in cell A3.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...................................................................................................................................... [3]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...................................................................................................................................... [3]
9 Theresa has created a database query which searches for the surname “Johnson”.
Surjit has told her that this is a static parameter query.
Explain what is meant by static parameter query and why she should change to using a dynamic
parameter query.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..................................................................................................................................................... [6]
10 Below is an extract from a database of students who have chosen to study Maths at AS Level. The
database is in unnormalised (0NF) form.
Student
Name Second subject Third subject
number
1001 Eashan Wadhwa Chemistry Physics
Describe the characteristics of the data above which make it unnormalised and explain how it can
be transformed into first normal form (1NF).
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..................................................................................................................................................... [6]
11 Below is an extract from a spreadsheet showing the wages paid in one week to a group of workers.
Their wages depend on the type of job they do as well as the number of hours worked. Cells C2 to
E4 contain the data which is referred to in the lower part of the spreadsheet.
A B C D E F G
1 Standard rate per hour
2 L Labourer 55
3 Se Semi-skilled 65
4 Sk Skilled 75
5
Hours worked this Rate per hour Wage paid
Worker ID Job Code Job type
6 week paid this week
7
8 12478L L Labourer 40 55 2200
9 13691R Se Semi-skilled 38 65 2470
10 21463R Se Semi-skilled 40 65 2600
11 29816M L Labourer 36 55 1980
12 36479L Sk Skilled 34 75 2550
13 49786R Sk Skilled 40 75 3000
14 52376M Se Semi-skilled 36 65 2340
15 18964L L Labourer 35 55 1925
16 13578R L Labourer 40 55 2200
17 38945M L Labourer 40 55 2200
18 36249M Se Semi-skilled 40 65 2600
19
(a) Write down the formula which should be used in cell C8 in order to display the Job type using
the Job Code in the preceding column. The formula should be in a form that can be easily
replicated.
= ................................................................................................................................................
.............................................................................................................................................. [5]
You can use the space below for any working you need.
Explain the other formulae used in the spreadsheet which enable the data in the Wage paid
this week column to be displayed. The formulae should be in a form so that they can be easily
replicated.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [6]
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.
Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.
Write your Centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.
At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.
DC (RW/FC) 134349/2
© UCLES 2017 [Turn over
2
1 A software application has been fully tested so that it is error-free and has been implemented.
There are no new situations likely to arise but the management wants to ensure that the software
is working as well as it should.
Explain, with reasons, how you would maintain the software application.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[5]
2 Wearable, or body-borne, computers are miniature electronic devices worn by the bearer.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[8]
Task 2 Task 5
Start of Finish of
Project Project
Fig. 1
Task 1 2 3 4 5
Duration (days) 3 5 7 2 4
(a) Use the information given in Fig. 1 and in the table to determine the critical path through the
sequence of tasks.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[6]
(b) Each task can have an extra amount of time allowed over its stated duration before it causes
the project to be delayed. This is the ‘float’.
Explain how you would calculate the float for each of the tasks in the project.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[4]
4 A website advertising a tourist resort uses both bitmap and vector graphics.
Evaluate the suitability of these types of graphics for use on the website.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[8]
5 Global positioning systems (GPS) are used by navigation devices to allow drivers of cars to find
locations and destinations.
(a) Describe how GPS signals from satellites are used by navigation devices to determine a
location.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[8]
(b) Describe the factors that could degrade a GPS signal, when it is transmitted to a navigation
device, and affect the accuracy of the location found by that device.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[5]
6 A customer in a restaurant can pay the bill with a credit card using a mobile chip and pin reader
carried by a waiter.
Describe the computer processing involved in the payment of the bill by credit card using the
mobile chip and pin reader.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[8]
7 Electronic data exchange is often called electronic data interchange. An online retailer and its
trading partners use electronic data interchange (EDI).
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[3]
(b) The retailer has prepared an order that has to go to a supplier. When the supplier has received
the order, an invoice asking for payment for the goods has to go back to the retailer.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[5]
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[8]
9 JavaScript can be embedded in the code of web pages to add interactivity to a page.
Jonas uses JavaScript code to store, list and display the names of cities on a web page.
Method 1:
Method 2:
Explain why storing the names using Method 2 is more suitable for storing large numbers of
cities.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[4]
/*
The code below stores the list of cities.
*/
var city = ["London", "Cambridge", "Oxford", "Manchester"];
Explain why Jonas would have added the new code to the script.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
(c) Jonas wants to extract ‘Oxford’ from the list in the code below to display it on the web page.
Write a line of JavaScript code to access the list and store the city name.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[3]
(d) Write a loop in JavaScript code to extract and display the first three city names.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[4]
10 A new computer system is to be developed for a factory. You have been asked to gather
information from the managers, assembly-line workers and clerical staff about the current system.
The managers can be available at any time, the assembly-line workers must not be interrupted at
any time and do not like taking work home, and the clerical staff are very busy during their working
hours and do not like being watched.
Describe, with reasons, the method of research you would use to gather information from each
group.
(i) Managers:
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[3]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[3]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[3]
© UCLES 2017 9626/32/F/M/17
15
BLANK PAGE
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.
Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.
Published
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.
Cambridge will not enter into discussions about these mark schemes.
Cambridge is publishing the mark schemes for the March 2017 series for most Cambridge IGCSE®,
Cambridge International A and AS Level components and some Cambridge O Level components.
3 Five from: 5
4 Eight from: 8
Users with physical handicaps may not be able to use a keyboard or mouse«
«or control their limbs accurately«
«could speak into a microphone to control a device
For reasons of hygiene a doctor may not be allowed to touch a display or device
Appropriate gestures/speaking into a microphone are/is a more hygienic way to
control the device
Gestures may be a quicker way of initiating a response from a device
Certain gestures may not be socially acceptable which is not a problem with the
other interfaces
Some gestures may be unintentional but still initiate a reaction from the device
Dialogue interface allows hands free control ensuring safety when driving«
«whereas gestures/GUI would need at least one hand to leave the steering
wheel
Dialogue interface can be more expensive to develop compared with a GUI
Dialogue interface may not operate reliably if there is background noise or user
has a cold/strong dialect/accent«
«whereas GUI/gestures will still be reliable
GUIs tend to be more accurate than gestures/dialogue
Dialogue interface often requires a training session with user«
«GUI/gestures can be taught through manuals
Gesture based is less effective when several users/background movement
involved
Organises the contents of the disk into the smallest number of contiguous
regions/fragments
Attempts to create larger regions of free space using compaction
Some defragmentation utilities try to keep smaller files within a single directory
together
The movement of the hard drive's read/write heads over different areas of the
disk when accessing fragmented files is slower«
«compared to accessing the entire contents of a non-fragmented file
sequentially
Level 0 (0 marks)
Response with no valid content
6 Six from: 6
Must be one of Foundry, Cold rolling, Tube production, Extrusion or Hot rolling 1
Select A3:B15«
«Sort in descending order of column A«
«Add a level«
«Sort in ascending order of column B
Select A3:B15«
«Sort in ascending/descending order of column A
«Add a level
«Sort in ascending order of column B
Five from: 5
Every time that the query is run it will search for the surname “Johnson”
If Theresa wants to look for another surname she will need to open up the query
in design view«
«and change the surname criteria to that name
With a dynamic parameter query she could type in a different surname/data
each time
Every time the query is run a dialogue box would appear asking her to type in
the surname
This would save the time of designing the query every time she wanted to find a
surname
10 Two from: 6
Four from:
Student
First name Second name Subject
number
1001 Eashan Wadhwa Chemistry
1001 Eashan Wadhwa Physics
There will still be columns with the same data in some rows but each row as a
whole will be unique
11(a) =VLOOKUP(B8,C$2:D$4,2) 5
VLOOKUP() – 1 mark
B8, – 1 mark
C2:D4 – 1 mark
2 – 1 mark
Use of appropriate absolute referencing – 1 mark
In order to calculate the wage paid this week the Rate per hour paid has to be
known then is multiplied by the hours worked this week– 1 mark
Cell E8 should contain the rate per hour paid for a labourer – 1 mark
=VLOOKUP(B8,C$2:E$4,3)
VLOOKUP(B8«) – 1 mark
C2:E4 – 1 mark
3 – 1 mark
Use of appropriate absolute referencing in VLOOKUP – 1 mark
Involves looking up Job Code in cells C2 to E4 and returns rate per hour from
third column/column E
Cell F8 should contain wage paid this week which is hours worked multiplied by
rate per hour – 1 mark
D8*E8 – 1 mark
Published
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.
Cambridge will not enter into discussions about these mark schemes.
Cambridge is publishing the mark schemes for the March 2017 series for most Cambridge IGCSE®,
Cambridge International A and AS Level components and some Cambridge O Level components.
1 Five from: 5
2 Eight from: 8
Benefits:
(Body worn) video cameras used to record incidents for later use
in court/enquiry
Optical (head-mounted) technology to display information is in a
similar format to a smartphone/act as a smartphone so is
familiar
Operated hands-free via voice activation
Wrist-worn computers/smartphones for access to
communications systems
Wi-Fi-enabled/wireless connected clothing to track movements
in real-time/connect peripherals
...monitor vital signs of officer
...maintaining constant communications with others
Drawbacks:
Reliance on computers can remove elements of human
judgment
Implementation can be expensive since this is an emerging
technology
Can lead to invasions of privacy for user and third parties...
...location and other details can be used to track the user
Possibility of wearable computers being ‘hacked’ and data
stolen/computers manipulated
Breakdown in communications systems can lead to system
failure
6 Eight from: 8
The computer-to-computer
Exchange of business documents
Using a standard electronic format
Between business partners
Three from:
var =1 mark
plus suitable variable name to store city e.g. place =1 mark
= city(2) =1 mark
for () 1 mark
suitable var names 1 mark
count from to 0 to 2 (b from 0 to <=3) 1 mark
adding 1 inside loop (b++) 1 mark
displaying the result of loop 1 mark
Total: 90
Write your Centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.
At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.
DC (NF/SG) 133655/2
© UCLES 2017 [Turn over
2
1 (a) Tick the most accurate statement about the use of a compiler.
A compiler executes a high-level program one statement at a time before translating the
next statement.
A compiler converts object code into source code.
(b) Tick the most accurate statement about the use of a linker.
A linker executes a high-level program one statement at a time before translating the
next statement.
A linker takes one or more source code files and combines them into a single executable
file.
A linker takes one or more object files and combines them into a single executable file.
It is alright to send an email to a person you do not know as it does not matter if
they find out your email address.
You should always attach a photograph of yourself to an email so they know who
you are.
You should only use websites recommended by teachers.
It is acceptable to post a photograph of your school on a social media site as so
many students go there.
You should always think twice before opening an email from an unknown person
as it might be spam.
It is okay, for the first time, to meet a person you only know from the internet on
your own.
You should know how to block and report unwanted users from social media sites.
It is acceptable, if you trust them, to give someone you have only met on the
internet your name and address.
When using instant messaging it is okay to use bad language if you are among
friends.
When playing games on the internet you should never use your real name.
[4]
3 A health inspector, Josefine, is investigating the health of students. She wishes to study the effect
on them of traffic on roads passing close to the school. One road seems to be causing more
problems than others. She is going to collect data regarding the amount of traffic and its effect on
their health.
(a) Describe, with specific reference to the investigation, how she could gather data from direct
data sources.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [6]
(b) Describe the drawbacks of gathering data from direct data sources.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [5]
(c) Give reasons why the information that Josefine collects may be inaccurate.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [4]
The school’s students have collected data about cars for a maths project. The teacher has decided
to code the data. Here is some of the data. The codes he will use are in brackets.
Male or
Approximate
Colour Make female
age of driver
driver
Light blue (B) Frod (F) Male (M) 50–59 (50)
(d) Give three reasons why the teacher is planning to code the data.
1 ...............................................................................................................................................
...................................................................................................................................................
2 ...............................................................................................................................................
...................................................................................................................................................
3 ...............................................................................................................................................
.............................................................................................................................................. [3]
(e) Give three reasons why the IT teacher has warned against some of the coding the maths
teacher plans to use.
1 ...............................................................................................................................................
...................................................................................................................................................
2 ...............................................................................................................................................
...................................................................................................................................................
3 ...............................................................................................................................................
.............................................................................................................................................. [3]
4 Jasvinder has just become manager of the ticketing department in an airport. Part of her job is to
provide tickets for passengers who have decided to fly at the last minute. She uses computers
to produce the tickets. She also has to produce hard copy of the details of every flight, including
passenger names, prior to each flight.
Evaluate the output devices which Jasvinder might use, including their specific use in this system.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..................................................................................................................................................... [8]
5 Below is an extract from a spreadsheet showing details of one day’s train journeys between
London and Paris. A hyphen, ‘-’, in a cell indicates that the train does not stop at that station.
I J K L M N
LONDON EBBSFLEET ASHFORD PARIS
Train No.
2 St Pancras Intl International International Gare du Nord
3 05:40 05:58 06:24 09:17 9080
4 06:18 – 06:55 09:47 9002
5 07:01 – – 10:17 9004
6 07:55 08:12 – 11:17 9008
7 08:19 08:38 – 11:47 9010
8 09:17 09:34 09:55 12:47 9014
9 10:01 – – 13:17 9016
10 10:24 10:42 – 13:47 9018
11 11:01 – – 14:17 9020
12 11:31 – – 14:47 9022
13 12:01 – – 15:17 9060
14 12:24 12:42 – 15:47 9024
15 13:31 – – 16:47 9028
16 14:01 – – 17:17 9030
17 14:31 – – 17:47 9032
18 15:31 – – 18:47 9036
19 16:01 – – 19:17 9038
20 16:22 – 16:55 19:47 9040
21
22 Number of non-stop trains 10
Michelle, the train controller in London, wants to use this spreadsheet to count the number of
trains that do not stop at any station between London and Paris.
(a) Write down the formula which should go in cell M22 to give her this information.
= ................................................................................................................................................
.............................................................................................................................................. [6]
You can use the space below for any working you need.
(b) Describe the steps that Michelle would need to carry out if she wanted to print out the Train
No. of the trains that do not stop at any station between London and Paris.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [5]
6 Below is an extract from a company’s database which shows the details of their factory workers.
Describe the steps you would use to create a report containing the Workers_Id number and Salary
only, using the most efficient method to extract all the Hot rolling or Cold rolling workers whose
salary is greater than $35,000.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..................................................................................................................................................... [6]
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..................................................................................................................................................... [8]
8 A college keeps records of its A Level students and the subjects they study in a database. It has
the following tables:
Students’ names
Students’ other personal data
Details of when they started studying the subject
All the possible subjects which can be taken by A Level students.
(i) one-to-one
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...................................................................................................................................... [2]
(ii) one-to-many
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...................................................................................................................................... [2]
(iii) many-to-many
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...................................................................................................................................... [4]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [4]
9 Siegfreid has created a word processed document using ‘proprietary software’. Simon has
suggested that he should save it in an ‘open-source file format’.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [3]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [3]
10 Chow uses sound editing software to vary the sampling rate in an audio file.
Describe what is meant by sampling and how the sampling rate affects audio file sizes.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..................................................................................................................................................... [4]
11 A space agency pays scientists whose job is to enable rockets to be sent to the moon.
Describe how batch and real-time processing would be used by the agency and its scientists.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..................................................................................................................................................... [8]
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.
Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.
Write your Centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.
At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.
DC (NF/AR) 133657/3
© UCLES 2017 [Turn over
2
Every individual mistake in the database has to be manually corrected in all tables.
It is easier to produce cross-tabular reports in relational databases than with flat file
databases.
The only two possible relationships are one-to-one and many-to-one.
Primary keys are unnecessary whereas you must have them with flat file databases.
2 Tick the four statements referring to the use of the internet and the World Wide Web which are
true.
The World Wide Web and the internet are the same thing.
[4]
3 Ian wants to apply encryption to all his emails. He is not sure whether to use asymmetric or
symmetric encryption.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [5]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [3]
4 Helen is the manager of a company which sells cars. She is going to produce a blog about the
success of the company. She will use word processing, spreadsheets, databases and other
software.
Evaluate the different types of software she will use to produce the blog.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..................................................................................................................................................... [8]
Describe the groups of people who are affected and explain why this is the case.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..................................................................................................................................................... [6]
6 Below is part of a spreadsheet Xia has created to model his personal finances.
A B
1 2600 Wages/salary
2
3 1000 Mortgage/rent
4 120 Utilities
5 50 Phone
6 100 Satellite/TV
7 80 Internet
8 550 Groceries
9 100 Clothing
10 150 Eating out
11 75 Hair/beauty
12 30 Pet food
13 40 Cinema
14 160 Car/travel
15 100 Insurance
16
17 =SUM(A3:A15) Total outgoings
18 =MAX(A3:A15) =VLOOKUP(A18,$A$3:$B$15,2,FALSE)
19
20 =A1-A17 Balance
21
(a) Identify the value which would appear in cell B18 explaining how you arrived at your answer.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [4]
(b) Xia is not sure whether the spreadsheet would work if some of the values were changed.
Describe the test plan you would use to help Xia make sure there are no errors in his
spreadsheet.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [8]
7 Fig. 1 below shows a small extract from a school database. All students shown are in year
groups 9, 10 or 11 depending on their year of birth. Each student’s year group, which is not part of
the database, is shown in Fig. 2.
Fig. 1
Name year_group
Marian Griffith 11
Manjit Dupay 9
Ho Chan 10
Johan Schmidt 10
Paul Dugarry 11
Li Cho 10
Fig. 2
The year_group field needs to be added to the database and will be a calculated field.
(a) Explain how you would set up the calculated year_group field.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [6]
© UCLES 2017 9626/13/O/N/17
9
(b) You have been asked to produce a well-formatted report showing the year 10 students
studying History. The report will contain a list of these students showing only each student’s
name, identity number and the total number of students involved.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [8]
8 Many people complain about the number of CCTV cameras there are in public places.
Discuss the benefits and drawbacks of CCTV monitoring in public places such as on streets or
inside shops.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..................................................................................................................................................... [8]
9 Wilhelm has tried importing a word-processed file into his spreadsheet but the software gives the
error message ‘file format not valid’.
Explain why this has happened and explain what Wilhelm should do to his data to enable him to
load it into his spreadsheet.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..................................................................................................................................................... [4]
10 Describe the characteristics which make spreadsheets suitable for modelling situations.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..................................................................................................................................................... [4]
11 Ahmed was overheard saying ‘MIS is a piece of software to store data’. Anjan, his colleague, said
‘I am sure it’s a little more complicated than that.’
By describing the features of a management information system (MIS), explain why Anjan was
justified in his statement.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..................................................................................................................................................... [6]
12 Paul and his team of programmers are writing software for a new project for a large company.
Every month, Paul and the programmers report to the company directors by means of a
video-conference.
Describe how Paul would set up and run this video-conference, assuming that the necessary
equipment and software has already been purchased and tested.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..................................................................................................................................................... [6]
13 When an expert system is used to suggest solutions to problems the inference engine uses a form
of reasoning involving forward chaining or backward chaining.
Explain the differences between forward chaining and backward chaining by describing both
terms.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..................................................................................................................................................... [6]
BLANK PAGE
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.
Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.
Write your Centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.
At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.
DC (NF/FC) 134530/3
© UCLES 2017 [Turn over
2
1 A company pays its workers weekly. The payroll department collects the data about the workers
and stores it in a transaction file. At the end of the week, the transaction file is used to update the
master file.
Draw a system flowchart which shows how the transaction file and master file are used to produce
the payslips for the workers.
[8]
© UCLES 2017 9626/32/O/N/17
3
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..................................................................................................................................................... [4]
3 An artist has sketched some of the shapes to use in a cartoon image of a snail.
Fig. 1
The final image is then composed and completed using image-editing tools on a computer. It is
shown in Fig. 2.
Cartoon Snail
Fig. 2
Explain, in detail, how you would use image-editing tools to create the final image from the
components.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
© UCLES 2017 9626/32/O/N/17
5
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..................................................................................................................................................... [8]
4 A new online supermarket will have a very large amount of data about its customers, products and
services that has to be kept safe. Complete back-ups of all its data are to be created at regular
intervals. Jaswinder, the IT manager, is considering the options of using tape-based systems, hard
disk-based systems or back-ups to the ‘cloud’ for storing the back-ups.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..................................................................................................................................................... [8]
(a) Describe the stages of the ‘waterfall’ method that should be followed.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[6]
(b) Discuss the benefits and drawbacks to the developer of using the ‘waterfall’ method for
developing the game application.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [8]
The bit rate of an audio file can appear to affect the quality of the sound when it is listened to.
Explain how you can affect the perceived quality of the sound stored in the audio file by changing
the bit rate.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..................................................................................................................................................... [6]
7 A new operating system for smartphones has been developed and is now ready for testing to
begin.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..................................................................................................................................................... [8]
8 A data protection act can contain principles that create rights for those people who have their data
stored and processed by companies.
(a) Describe the rights that could be created by a data protection act.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [4]
(b) Data controllers are appointed by companies to safeguard the rights of individuals whose
data is stored.
Describe two criminal offences that may be committed by data controllers if they fail to abide
by the principles of a data protection act.
1 ...............................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
2 ...............................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [2]
9 WiFi is often used to connect devices to the internet. In some buildings, WiFi signals may be
degraded so that data transfer appears to be ‘slow’.
Explain how you could try to ensure that the WiFi system suffers minimal signal degradation.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..................................................................................................................................................... [8]
10 A new software application has been developed. A programmer has been brought in to make
further developments. This programmer will need documentation specific to her needs.
Describe, giving reasons, the elements of the documentation that she will need.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..................................................................................................................................................... [6]
While the shop is closed in the morning, a message saying “Sorry, we are closed” is displayed.
After the shop has closed in the evening a message saying “Please try again tomorrow” is
displayed. At all other times, a message saying, “Hello, we are open now” is displayed.
Complete the code in the function below that will allow a user to find out if the shop is open or
closed.
function OpenTimesFunction() {
var welcome;
var timenow = new Date().getHours();
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
document.getElementById(“open”).innerHTML = welcome;
//This line displays the result of the code
}
[6]
12 An animator is producing a digital cartoon showing a dancer in action on a beach. She has
produced four frames of her cartoon and digitised them.
1 2 3 4
Explain how you would create the illusion of movement between frames 1 and 4.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..................................................................................................................................................... [8]
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.
Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.
Write your Centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.
At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.
DC (NF) 134527/2
© UCLES 2017 [Turn over
2
1 A new open-source operating system for smartphones is being developed. Prototypes are being
constructed.
(a) You have helped to develop the new operating system and are now ready to test it. You have
to create a test plan.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...................................................................................................................................... [4]
(ii) Describe, in detail, the testing strategy that would be carried out on this open-source
operating system.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...................................................................................................................................... [8]
(iii) Discuss the benefits and drawbacks of the black box method of testing software.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...................................................................................................................................... [8]
2 Discuss the benefits and drawbacks of using computer-aided manufacturing (CAM) to produce
the prototype of a new tail fin for a racing car.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..................................................................................................................................................... [8]
3 A new computer system is to be installed by a company to replace its existing system. A systems
analyst is producing a report on the current operations of the company before the company installs
the new computer system. The analyst is interviewing the users of the existing system.
Evaluate other methods that the analyst could use to research the existing system.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..................................................................................................................................................... [8]
4 A shopper has a bank account, number 65636373, with a balance of $1100. The shopper wants to
use electronic funds transfer to purchase a jacket for $159, a video recorder for $699 and a digital
camera for $300 from different stores in a retail park. A bank card is used by the customer at the
electronic funds transfer point of sale terminal in each store. The card is scanned and the PIN
entered and accepted.
Describe, in detail, the processes involved in the electronic funds transfer for these purchases.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..................................................................................................................................................... [8]
5 A small database is being developed for an online book store that only sells books to people
over 21 years of age. The database is to contain a table with the details of customers of the
store. The store wishes to hold details of the customers’ names, titles, email addresses and postal
addresses. It also requires a home telephone number for every customer.
In the space below, create a suitable data dictionary for use when developing the table for the
database.
[8]
6 Information technology (IT) has changed the way that people both observe and take part in sports.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..................................................................................................................................................... [6]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [2]
(b) The router uses wireless technology to allow devices in the home to connect to it.
Discuss the benefits and drawbacks of using wireless technology to connect devices to the
router.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [8]
8 The tasks, and the time allowed for each task, for the building of a new house are shown in the
table below.
(a) Draw an activity network diagram for building the new house.
[8]
(b) Use your activity network diagram to calculate the critical path through the tasks.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [4]
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..................................................................................................................................................... [4]
10 Computers can be used to edit images for advertising features in a printed magazine.
Describe the use of image editing techniques to alter images for use in advertising products.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..................................................................................................................................................... [6]
BLANK PAGE
BLANK PAGE
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.
Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.
Write your Centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.
At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.
DC (KN) 146864
© UCLES 2017 [Turn over
2
1 (a) Tick the most accurate statement about the use of a compiler.
A compiler executes a high-level program one statement at a time before translating the
next statement.
A compiler converts object code into source code.
(b) Tick the most accurate statement about the use of a linker.
A linker executes a high-level program one statement at a time before translating the
next statement.
A linker takes one or more source code files and combines them into a single executable
file.
A linker takes one or more object files and combines them into a single executable file.
It is alright to send an email to a person you do not know as it does not matter if
they find out your email address.
You should always attach a photograph of yourself to an email so they know who
you are.
You should only use websites recommended by teachers.
It is acceptable to post a photograph of your school on a social media site as so
many students go there.
You should always think twice before opening an email from an unknown person
as it might be spam.
It is okay, for the first time, to meet a person you only know from the internet on
your own.
You should know how to block and report unwanted users from social media sites.
It is acceptable, if you trust them, to give someone you have only met on the
internet your name and address.
When using instant messaging it is okay to use bad language if you are among
friends.
When playing games on the internet you should never use your real name.
[4]
3 A health inspector, Josefine, is investigating the health of students. She wishes to study the effect
on them of traffic on roads passing close to the school. One road seems to be causing more
problems than others. She is going to collect data regarding the amount of traffic and its effect on
their health.
(a) Describe, with specific reference to the investigation, how she could gather data from direct
data sources.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [6]
(b) Describe the drawbacks of gathering data from direct data sources.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [5]
(c) Give reasons why the information that Josefine collects may be inaccurate.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [4]
The school’s students have collected data about cars for a maths project. The teacher has decided
to code the data. Here is some of the data. The codes he will use are in brackets.
Male or
Approximate
Colour Make female
age of driver
driver
Light blue (B) Frod (F) Male (M) 50–59 (50)
(d) Give three reasons why the teacher is planning to code the data.
1 ...............................................................................................................................................
...................................................................................................................................................
2 ...............................................................................................................................................
...................................................................................................................................................
3 ...............................................................................................................................................
.............................................................................................................................................. [3]
(e) Give three reasons why the IT teacher has warned against some of the coding the maths
teacher plans to use.
1 ...............................................................................................................................................
...................................................................................................................................................
2 ...............................................................................................................................................
...................................................................................................................................................
3 ...............................................................................................................................................
.............................................................................................................................................. [3]
4 Jasvinder has just become manager of the ticketing department in an airport. Part of her job is to
provide tickets for passengers who have decided to fly at the last minute. She uses computers
to produce the tickets. She also has to produce hard copy of the details of every flight, including
passenger names, prior to each flight.
Evaluate the output devices which Jasvinder might use, including their specific use in this system.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..................................................................................................................................................... [8]
5 Below is an extract from a spreadsheet showing details of one day’s train journeys between
London and Paris. A hyphen, ‘-’, in a cell indicates that the train does not stop at that station.
I J K L M N
LONDON EBBSFLEET ASHFORD PARIS
Train No.
2 St Pancras Intl International International Gare du Nord
3 05:40 05:58 06:24 09:17 9080
4 06:18 – 06:55 09:47 9002
5 07:01 – – 10:17 9004
6 07:55 08:12 – 11:17 9008
7 08:19 08:38 – 11:47 9010
8 09:17 09:34 09:55 12:47 9014
9 10:01 – – 13:17 9016
10 10:24 10:42 – 13:47 9018
11 11:01 – – 14:17 9020
12 11:31 – – 14:47 9022
13 12:01 – – 15:17 9060
14 12:24 12:42 – 15:47 9024
15 13:31 – – 16:47 9028
16 14:01 – – 17:17 9030
17 14:31 – – 17:47 9032
18 15:31 – – 18:47 9036
19 16:01 – – 19:17 9038
20 16:22 – 16:55 19:47 9040
21
22 Number of non-stop trains 10
Michelle, the train controller in London, wants to use this spreadsheet to count the number of
trains that do not stop at any station between London and Paris.
(a) Write down the formula which should go in cell M22 to give her this information.
= ................................................................................................................................................
.............................................................................................................................................. [6]
You can use the space below for any working you need.
(b) Describe the steps that Michelle would need to carry out if she wanted to print out the Train
No. of the trains that do not stop at any station between London and Paris.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [5]
6 Below is an extract from a company’s database which shows the details of their factory workers.
Describe the steps you would use to create a report containing the Workers_Id number and Salary
only, using the most efficient method to extract all the Hot rolling or Cold rolling workers whose
salary is greater than $35,000.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..................................................................................................................................................... [6]
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..................................................................................................................................................... [8]
8 A college keeps records of its A Level students and the subjects they study in a database. It has
the following tables:
Students’ names
Students’ other personal data
Details of when they started studying the subject
All the possible subjects which can be taken by A Level students.
(i) one-to-one
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...................................................................................................................................... [2]
(ii) one-to-many
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...................................................................................................................................... [2]
(iii) many-to-many
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...................................................................................................................................... [4]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [4]
9 Siegfreid has created a word processed document using ‘proprietary software’. Simon has
suggested that he should save it in an ‘open-source file format’.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [3]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [3]
10 Chow uses sound editing software to vary the sampling rate in an audio file.
Describe what is meant by sampling and how the sampling rate affects audio file sizes.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..................................................................................................................................................... [4]
11 A space agency pays scientists whose job is to enable rockets to be sent to the moon.
Describe how batch and real-time processing would be used by the agency and its scientists.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..................................................................................................................................................... [8]
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.
Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.
Published
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.
Cambridge International will not enter into discussions about these mark schemes.
Cambridge International is publishing the mark schemes for the October/November 2017 series for most
Cambridge IGCSE®, Cambridge International A and AS Level components and some Cambridge O Level
components.
2 4
The internet is fully policed and safe.
The world wide web and the internet are the same thing.
Level 0 0 marks
Response with no valid content.
Using word processing it is easier to edit documents ready for inclusion in the
website compared to text editors, spreadsheets and databases
Using word processing it is easier to format documents ready for inclusion in
the website compared to text editors, spreadsheets and databases
Using word processing it is more difficult to enter statistics and manipulate
these compared to spreadsheets and databases
Easier to calculate statistics with a spreadsheet than using database software
Can produce charts to show sales growth with a spreadsheet easier than using
a database
Databases could be used to store and process sales figures easier than a
spreadsheet
Easier to query a database than using a spreadsheet
Easier to produce reports with a database than a spreadsheet
With a text editor formatting is not lost when converting to HTML
Using web authoring package is easier to produce a blog than using text
editor«
«easier to use than text editor as functions are provided.
5 Six from: 6
The digital divide can exist between those living in rural areas and those living
in urban areas
There may be a lack of/expensive to install infrastructure in rural areas
The quality of connection to the internet may be poor in rural areas
The digital divide can exist between people from different economic
classes/rich and poor
The poor cannot afford to buy computers/hardware/software/equipment
Poor cannot afford the education/training needed to learn about the new
technology
Lower-income and minority groups are buying smartphones but there are rising
costs of data plans
Disabilities of potential internet users constitute another type of divide
Users with poor hand coordination will not be able to manipulate
keyboards/input devices
The digital divide can exist between the educated and uneducated
The less well educated may not have the skills, knowledge and abilities to use
the technologies
The digital divide can exist between old and young people
Young people have grown up with the technology/older people may
feel they are too old/unwilling to learn about new technology/do not know
how to use it
The digital divide can exist between developed and developing countries
The quality of connection to the internet may be poor in developing countries
The price of connection to the internet may be high in developing countries
In some less well developed countries the population has limited access to
digital services.
6(a) 4
The value in B18 would be Mortgage/rent
The value in A18 would be the maximum value in A3:A15 which is 1000
The lookup function would search the range A3:B15 to find 1000
It returns the value in the same row but in column 2.
A table with columns for Test, Test data, Actual result, Expected result and
comments on comparison of actual result – 2 marks (1 for at least 3
appropriate headings and 2 for 5 appropriate headings)
Test the SUM function by changing some values in A3:A15
Test the MAX function by changing some values in A3:A15
Calculate the expected results for SUM using a calculator, MAX using sight
Test the VLOOKUP function by changing values in B3:B15 and some values in
A3:A15
Look through the data to find what should be in the LOOKUP cell
To test the A1-A17 formula change the value in A1 and some of the values in
A3:A17
Calculate the expected results for =A1-A17 using a calculator
Run each test
Make a note saying whether there are any differences between actual results
and expected results.
8 Eight from: 8
Benefits:
If CCTV cameras constantly monitor a retail business, criminals will likely seek
an easier target/may not commit the crime
If employees know that they are constantly being watched, they are less likely
to steal from their employer or waste time on the job
If a crime occurs in an establishment that has installed CCTV surveillance,
investigation will be aided by the recorded video/can be used as evidence in
court cases
If an argument occurs between two employees, the employer can examine the
videotape to determine what actually occurred
CCTV can help settle disputes when a customer has a complaint cameras are
effective in apportioning blame
Drawbacks:
CCTV is usually not able to display every bit of an area
Some people object to the invasion of privacy due to constant video monitoring
Employees under constant surveillance by CCTV cameras often dislike
monitoring of their daily behaviour
The cameras can sometimes be thwarted by covering them up
Someone who is familiar with the property may still be able to avoid being
caught on camera
Hackers can get into the system and control which ways the cameras are
pointing while their comrades in crime do the crime.
9 Four from: 4
10 Four from: 4
Absolute and relative cell referencing makes sure you only increment the parts
of a formula you need to
Cell protection makes sure that the cells you want do not change by accident
User interface forms makes it easier to input values into the model
Macros make it easier to create more complex formulae or functions
Automatic re-calculation means it is not necessary to evaluate a formula every
time you change it
Conditional formatting allows you to highlight certain values that match specific
criteria
Graphs/charts to detect trends.
11 Six from: 6
12 Six from: 6
13 Six from: 6
Forward chaining starts with the available data and uses inference rules to
extract more data...
... until a goal is reached
An inference engine using forward chaining searches the inference rules until it
finds one where the IF statement is known to be true
When such a rule is found, the inference engine uses the ‘THEN’ part to cause
the addition of new information
Inference engines will iterate through this process until a goal is reached
Backward chaining starts with a list of goals/hypotheses and works backwards
An inference engine using backward chaining would search the inference rules
until it finds one which has a THEN part that matches a desired goal
If the IF part of that rule is not known to be true, then it is added to the list of
goals
Because the list of goals determines which rules are selected and used, this
method is called goal-driven«
«in contrast to data-driven forward-chaining.
Published
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.
Cambridge International will not enter into discussions about these mark schemes.
Cambridge International is publishing the mark schemes for the October/November 2017 series for most
Cambridge IGCSE®, Cambridge International A and AS Level components and some Cambridge O Level
components.
1 8
2 Four from: 4
3 Eight from: 8
Create new canvas/image on which to compose the final image of the snail
Copy and paste/scan all components into the new canvas so that they are
ready for editing
Ensure that all backgrounds of all shapes are set to transparent to allow
overlap of components
Shape 1 has part of the image cut out/erased to produce the eye shape
Shape 1 is copied and pasted to produce two images for the eyes of the snail
Shape 2 is inverted/flipped horizontally (across the vertical plane) and resized
larger/enlarged for the shell
Shape 3 is rotated by 90 degrees and inverted horizontally to form one of the
antennae
...resulting shape is copied and pasted and stretched horizontally to form the
second antenna
Shape 4 is resized, filled with black to form the body of the snail
All the shapes are positioned/aligned together/grouped to form the composite
cartoon snail
Brush tool with pencil/small size is used to ensure that the join between
shape 2/shell and shape 3/body is complete/no gaps are left
...used to add dotted line at base of shell/shape 2
Text is added and rotated left by 90/right by 270 degrees
...text is positioned as shown
Components are grouped and resized together to form final image.
Benefits:
Problems can be found and fixed early in the processes
Emphasis on full documentation (requirements documents, design
documents) means that individual team members can be replaced/no team
member is irreplaceable/new teams can complete/carry on the work
Enforces a structured approach through separate/discrete stages...
...stages easy to understand
...provides identifiable milestones
Drawbacks:
Requirements not fully known before working software created
...clients may change their requirements
...requirements may not cover all details
...clients may not know exactly what they want/all the details required
...leading to increased costs due to redesign/redevelopment/retesting
Designers may be unaware of future difficulties of designing a new software
product/feature.
6 Six from: 6
7 Eight from: 8
Benefits:
Allows tester to look inside system (‘introspection’)
...can identify system objects in code
...can reduce the failure rate of test code provided object names do not
change
Can be more stable/allow re-use of test code provided object names do not
change
More thorough/complete testing of code
...all aspects of code are tested
...every interaction in code/objects is tested
...all routes through code are tested
Drawbacks:
White box testing must be closely integrated with the system
...must be installed in the system to be tested
...cannot be sure that the testing is not causing the errors/problems it flags up
...cannot be sure that all platforms support the white box testing system
changes to objects/code of system may cause white box testing to fail
...white box testing code is highly integrated with system code
...requires high degree of script maintenance
Tester must have in-depth knowledge of system
...be highly skilled programmer.
9 Eight from: 8
10 Six from: 6
if (timenow <12) {
welcome = ‘Sorry, we are closed’;
} else if (timenow < 22) {
welcome = ‘Hello, we are open now’;
} else {
welcome = ‘Please try again tomorrow’;
}
12 Eight from: 8
Published
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.
Cambridge International will not enter into discussions about these mark schemes.
Cambridge International is publishing the mark schemes for the October/November 2017 series for most
Cambridge IGCSE®, Cambridge International A and AS Level components and some Cambridge O Level
components.
Ensure that the writer of the test plan knows details of work to be taken/is
competent in field of activity to be able to:
...define the aspects of the OS to be tested e.g. interface/devices that it will
run on
...define test methods/how each part is to be tested/which aspects of
smartphone is to be tested
...test OS use of smartphone facilities to ensure functionality
...assign tasks and responsibilities for testing the smartphone features
Test functionality of apps on the smartphone with new OS
Write a specific app to test specific features of smartphone with OS
Test OS with third party apps
Test ability to multi-task with apps from third parties/internal apps
...check regulations/legal issues
Test that the amount of smartphone memory is sufficient to hold/run the OS.
Benefits:
Easy to use as testers do not need to know the inner workings of product
...tester need not know programming languages/how the software has been
implemented
...can work through application as would a user
Test case can be developed quicker than for white box testing
...testers need only look at GUI
...do not need to discover all the internal paths/routes through software
....tests are done from point of view of a user
...can expose discrepancies in specification
Tests can be conducted by independent personnel from the developers
allowing for an objective perspective
....ensures the avoidance of developer-bias
Test cases can be designed as soon as specification are complete
Drawbacks:
Test cases will be difficult to design as there is no clear test specification
Script maintenance may be difficult
...if the user interface is changing during development/changes due to
testing
Scripts may not work/be fragile when testing
....GUI may not be the same for different tests
....GUI rendering may change during development
Does not test all internal pathways/all routes through software
...does not fully test the software
...many program paths will be left untested.
Benefits:
High/consistent accuracy in large scale production/consistent results during
production
Production can be faster than traditional methods
Can produce complex products faster/easier than traditional methods
CAD can produce the instructions and send to CAM electronically obviating
need for manual programming
JIT can be used in conjunction with CAM
Drawbacks:
Can be slow for one off products
Need a separate CAM machine for each product
Software is expensive to develop/maintain
Expensive to train users to use the system
Errors can affect the whole production.
3 Answers/Indicative content 8
Evaluation requires that advantages and disadvantages be discussed and
weighed up in importance.
Questionnaires:
• relatively inexpensive to administer when large numbers are
involved
• reduced researcher bias
• questionnaires are familiar to participants
• data can be collected in a format that is easy to analyse
Observation:
• can collect data where/when activity occurs
• can be unobtrusive
• can provide ‘behind the scenes’ information/can directly see the
activities
• can be susceptible to observer bias
• observed often perform better when watched
• cannot help understand why people behave as they do/do what
they do
Level 0 0 marks
Response with no valid content.
4 Eight from: 8
5 Eight from:
Benefits:
Devices are easier to move around as no wires needed...
...no need to physically connect
...no trailing wires to trip over
Greater productivity by home-workers as they can carry laptop/device with
them while doing other tasks
Ease of expansion with new devices as single access point required
...devices can be added without need to add cables/space for
connection/additional hubs/switches
...no need to drill holes/damage house fittings/walls for cables
Less expensive than wired connections so no cost of new
hubs/switches/sockets/wires
Drawbacks:
Security issues so encryption required which may be difficult to set up
Range issues as it is restricted to only 10s of metres from access point
....physical objects may interfere with signal
....reduced signal strength as distances from access point increases
Reliability issues
...subject to interference from other wireless devices/electrical items
Speed issues as rate of data transfer is lower than for cabled connections
...may vary during a session leading to poor user experience.
Eight from:
9 Four from: 4
Published
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.
Cambridge International will not enter into discussions about these mark schemes.
Cambridge International is publishing the mark schemes for the October/November 2017 series for most
Cambridge IGCSE®, Cambridge International A and AS Level components and some Cambridge O Level
components.
She could give questionnaires to students who walk to school using that
particular road asking about their general health/number of days missed
through illness
She could give questionnaires to students who walk to school using other
roads asking about their general health/number of days missed through
illness
She could interview students who walk to school using that particular road
asking about their general health/number of days missed through illness
She could interview students who walk to school using other roads asking
about their general health/number of days missed through illness
She could observe/keep a count of traffic coming down the busy road
She could observe the amount of traffic/keep a count of traffic coming down
the other roads
She could use sensors to detect the flow of traffic going down the busy road
She could use sensors to detect the flow of traffic going down the other
roads
She could give questionnaires to residents who live in that particular road
asking about their general health
She could give questionnaires to residents who live in other roads asking
about their general health
She could interview residents who live in that particular road asking about
their general health
She could interview residents who live in other roads asking about their
general health.
In questionnaires and interviews the questions may not have been very
clear and the respondents may have misunderstood them
The questions might have been badly phrased
so that the respondent thought they knew the answer Josefine wanted –
resulting in similar answers from different respondents
Questions may have been open-ended allowing the respondent to produce
answers which could not be quantified
In a multi-choice type question there may not have been a sufficient number
of alternatives
The respondents selected for the study may not have been very
representative
There is the possibility that Josefine may have made errors when collecting
it
Josefine may have made errors when entering the collected data into the
computer
If the data was collected automatically by sensors the
computer/microprocessor may not have been set up properly to accurately
interpret the readings.
The code B does not give a clear idea of what shade of blue
The approximate age of the driver is too vague/too general
and would be difficult to use in calculations/graphs
There may be many makes of car beginning with the same letter.
Level 0 (0 marks)
Response with no valid content.
5(a) =COUNTIFS(K3:K20,”-“,L3:L20,”-“) 6
=COUNTIFS() 2 marks
(=COUNTIF() 1 mark)
(K3:K20 1 mark
,”-“, immediately after K20 1 mark
L3:L20 immediately after ,”-“, 1 mark
,”-“) 1 mark
5(b) 5
Select data, filter 1 mark
Filter on column K for “-“ 1 mark
Filter on column L for “-“ 1 mark
Highlight column N 1 mark
Select PRINT and PRINT selection. 1 mark
Create a query and select the fields Workers_ID, Salary and Department
In the criteria box under Salary, type > 35 000
In the criteria box under Department, type like “*rolling” – 2 marks
“Hot rolling” OR “Cold rolling” – 1 mark only
Deselect the Department field for showing
Run and save the query
Create the report using this query
In the report section, edit and format the report.
7 Eight from: 8
Advantages:
The costs of fuel, aircraft maintenance and insurance of a regular aircraft
are far greater than the running and maintenance costs of a flight simulator
The environment benefits from flight training in a simulator, as there is no air
and noise pollution created by a flight simulator
Situations can be tackled in a flight simulator without putting the trainee and
the flight training instructor in danger
If there is an accident there is no cost to replace parts unlike a real plane
Emergency procedures, adverse weather conditions and system failures
can be more easily/quickly produced or recreated in a flight simulator
There is less time wasted on booking aircraft for flight training/scheduling
flights/ waiting for the aircraft to warm up
Less time wasted travelling to the desired destination to undergo specific
flight training instruction
The environmental conditions in a simulator are far more comfortable than
flight training in a real aircraft as the temperature and humidity are controlled
in a flight simulator
The level of noise in a flight simulator is not as deafening as in an aircraft
makes the communication between the instructor and trainee much easier
Disadvantages:
The simulator response will not always be exactly the same as an actual
airplane, as there too many variables
Sometimes pilots become bolder/more overconfident after training on the
simulator and overreact to real flight situations
overuse of parts such as the rudder can cause damage to a real aircraft
but not in the simulator
Amount of stress the pilot would be under in dangerous situations is less
likely to be created
Length of training session is more likely to be shorter than a realistic flight
making it difficult to recreate boredom/fatigue of a real flight.
Both tables can have only one record on either side of the relationship
Student_ID in students_1 is connected to Student_ID in students_2
students_2 and students_1 have the same key field
students_1 and students_2 could be combined without affecting the
database.
The table contains individual records that each relate to many records in the
related table
A single Student_ID in students_1 table relates to many records in the
joined_subject table
A single subject_code in subjects table relates to many records in the
joined_subject table.
Every foreign key value has a matching value in the corresponding primary
key
Referential integrity uses these to prevent the deletion of related records
It can alert if the user tries to delete a record which is related to another one
Queries will begin to fail if the relationships do not match
If a table is relying on the keys in another table, then relationships between
the two can be lost if bad data is entered into one location
Referential integrity can be used to ensure foreign key values are valid.
10 Four from: 4
11 Eight from: 8
Published
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.
Cambridge International will not enter into discussions about these mark schemes.
Cambridge International is publishing the mark schemes for the October/November 2017 series for most
Cambridge IGCSE®, Cambridge International A and AS Level components and some Cambridge O Level
components.
She could give questionnaires to students who walk to school using that
particular road asking about their general health/number of days missed
through illness
She could give questionnaires to students who walk to school using other
roads asking about their general health/number of days missed through
illness
She could interview students who walk to school using that particular road
asking about their general health/number of days missed through illness
She could interview students who walk to school using other roads asking
about their general health/number of days missed through illness
She could observe/keep a count of traffic coming down the busy road
She could observe the amount of traffic/keep a count of traffic coming down
the other roads
She could use sensors to detect the flow of traffic going down the busy road
She could use sensors to detect the flow of traffic going down the other
roads
She could give questionnaires to residents who live in that particular road
asking about their general health
She could give questionnaires to residents who live in other roads asking
about their general health
She could interview residents who live in that particular road asking about
their general health
She could interview residents who live in other roads asking about their
general health.
In questionnaires and interviews the questions may not have been very
clear and the respondents may have misunderstood them
The questions might have been badly phrased
so that the respondent thought they knew the answer Josefine wanted –
resulting in similar answers from different respondents
Questions may have been open-ended allowing the respondent to produce
answers which could not be quantified
In a multi-choice type question there may not have been a sufficient number
of alternatives
The respondents selected for the study may not have been very
representative
There is the possibility that Josefine may have made errors when collecting
it
Josefine may have made errors when entering the collected data into the
computer
If the data was collected automatically by sensors the
computer/microprocessor may not have been set up properly to accurately
interpret the readings.
The code B does not give a clear idea of what shade of blue
The approximate age of the driver is too vague/too general
and would be difficult to use in calculations/graphs
There may be many makes of car beginning with the same letter.
Level 0 (0 marks)
Response with no valid content.
5(a) =COUNTIFS(K3:K20,”-“,L3:L20,”-“) 6
=COUNTIFS() 2 marks
(=COUNTIF() 1 mark)
(K3:K20 1 mark
,”-“, immediately after K20 1 mark
L3:L20 immediately after ,”-“, 1 mark
,”-“) 1 mark
5(b) 5
Select data, filter 1 mark
Filter on column K for “-“ 1 mark
Filter on column L for “-“ 1 mark
Highlight column N 1 mark
Select PRINT and PRINT selection. 1 mark
Create a query and select the fields Workers_ID, Salary and Department
In the criteria box under Salary, type > 35 000
In the criteria box under Department, type like “*rolling” – 2 marks
“Hot rolling” OR “Cold rolling” – 1 mark only
Deselect the Department field for showing
Run and save the query
Create the report using this query
In the report section, edit and format the report.
7 Eight from: 8
Advantages:
The costs of fuel, aircraft maintenance and insurance of a regular aircraft
are far greater than the running and maintenance costs of a flight simulator
The environment benefits from flight training in a simulator, as there is no air
and noise pollution created by a flight simulator
Situations can be tackled in a flight simulator without putting the trainee and
the flight training instructor in danger
If there is an accident there is no cost to replace parts unlike a real plane
Emergency procedures, adverse weather conditions and system failures
can be more easily/quickly produced or recreated in a flight simulator
There is less time wasted on booking aircraft for flight training/scheduling
flights/ waiting for the aircraft to warm up
Less time wasted travelling to the desired destination to undergo specific
flight training instruction
The environmental conditions in a simulator are far more comfortable than
flight training in a real aircraft as the temperature and humidity are controlled
in a flight simulator
The level of noise in a flight simulator is not as deafening as in an aircraft
makes the communication between the instructor and trainee much easier
Disadvantages:
The simulator response will not always be exactly the same as an actual
airplane, as there too many variables
Sometimes pilots become bolder/more overconfident after training on the
simulator and overreact to real flight situations
overuse of parts such as the rudder can cause damage to a real aircraft
but not in the simulator
Amount of stress the pilot would be under in dangerous situations is less
likely to be created
Length of training session is more likely to be shorter than a realistic flight
making it difficult to recreate boredom/fatigue of a real flight.
Both tables can have only one record on either side of the relationship
Student_ID in students_1 is connected to Student_ID in students_2
students_2 and students_1 have the same key field
students_1 and students_2 could be combined without affecting the
database.
The table contains individual records that each relate to many records in the
related table
A single Student_ID in students_1 table relates to many records in the
joined_subject table
A single subject_code in subjects table relates to many records in the
joined_subject table.
Every foreign key value has a matching value in the corresponding primary
key
Referential integrity uses these to prevent the deletion of related records
It can alert if the user tries to delete a record which is related to another one
Queries will begin to fail if the relationships do not match
If a table is relying on the keys in another table, then relationships between
the two can be lost if bad data is entered into one location
Referential integrity can be used to ensure foreign key values are valid.
10 Four from: 4
11 Eight from: 8
Write your Centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams or graphs.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.
At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [2]
9
True and false are examples of Boolean data
A field containing the value 253 would be a field containing text data
245.6 is an integer
All numbers are stored as decimals
‘13 cm’ is an example of alphanumeric data
An integer stored in a field is a form of numeric value
Currency is a type of numeric data
A real number is an integer which has already been used in a database
How many times a student has taken an exam would be stored as a Date/time
data type
A percentage value is usually stored as text as it has a percentage sign
[4]
2 There are many ways of changing data to suit a purpose including coding, encoding and encryption
of data. Coding data in a field containing the gender of a person, for example, would involve
coding ‘male’ as ‘m’ and ‘female’ as ‘f’.
9
A disadvantage of coding data is that it makes the data very difficult to read and
understand
An advantage of coding data is that it saves storage space
A disadvantage of coding data is that it becomes much slower to type in the data
An advantage of coding data is that codes are never complicated
[1]
9
Encoding data is a form of validation
Text and numbers are the only data types that can be encoded
Converting digital data to analogue data is a form of encoding data
Encoding is done to deliberately conceal the content of the data
[1]
9
Encrypting data prevents hackers from intercepting it
Encryption is the conversion of data into a form that cannot be easily understood
by unauthorised users
The two main types of encryption are known as public key encryption and open
encryption
Decryption is the process of further converting encrypted data into another more
complicated encrypted form
[1]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [3]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [3]
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..................................................................................................................................................... [3]
5 Here is a small section of a spreadsheet used to calculate the weekly wages of the workers in a
company.
A B C D E F
1 First Second Hours worked Hourly rate Weekly wage ($) Full
name name name
2 John Smith 40 8.50 =C2*D2
3 Johann Schmidt 42 9.25 =C3*D3
4 Felix Schnell 38 8.75 =C4*D4
5 Maurice LaPorte 46 11.50 =C5*D5
=SUM(C2:C5) =MAX(D2:D5) =AVERAGE(E2:E5)
(a) Using examples from the spreadsheet, explain what is meant by a cell reference.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [2]
(b) This spreadsheet uses formulae and functions. Explain the difference between formulae and
functions.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [4]
(c) The manager of the company wants the full name of the worker printed on the payslip. In
order to do this a formula will need to be used in cell F2 combining the first name and the
second name separated by a space.
Write down the formula which uses a function to combine this data.
.............................................................................................................................................. [4]
(d) The manager wants to see immediately if a worker earns more than $500 per week, without
reading through the spreadsheet.
Explain what you would do in cells E2 to E5 to make it easier for her to see this.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [4]
(e) Relative cell referencing has been used in the spreadsheet. Using examples from this
spreadsheet, explain why the use of absolute referencing would not be suitable.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [3]
(f) This spreadsheet could be used for modelling purposes. An example of modelling is the use
of simulators for pilot training.
Describe three advantages of using computer simulations for pilot training rather than the
real thing.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [3]
6 A shop selling Konia mobile (cell) phones keeps records of all the phones it sells.
The shop only stocks three models but each model has either 32 or 64 GB of memory.
An example of the shop’s database is given below.
(a) A validation check is needed to make sure that only valid model numbers can be accepted.
Name this validation check and describe how it would work.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [4]
(b) Giving examples, explain how consistency checks could be used to ensure that the data that
is entered in the shop’s database is valid.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [4]
(c) The shop is sending a standard letter to owners of the 1278C6 model informing them about a
defect.
Using information from the shop’s database, explain how you would set up such a letter to
customers who own that particular model.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [6]
(d) The data in the shop’s database is in unnormalised form. Complete the table below as
necessary to make the database in first normal form (1NF).
[4]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [2]
7 A head teacher wishes to use a computer to create a newsletter which will keep parents up to date
with events at the school.
type 1 ........................................................................................................................................
...................................................................................................................................................
type 2 ........................................................................................................................................
.............................................................................................................................................. [2]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [6]
(a) There are a number of malware issues associated with using the internet.
Other than viruses, describe three of these issues.
1 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
3 ................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [6]
(b) Discuss the reasons why many people use the internet for communication, while some people
do not.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [8]
(c) Explain what is meant by the internet and the World Wide Web. In your answer include
features of the internet which do not use the World Wide Web.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [6]
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..................................................................................................................................................... [4]
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.
Write your Centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams or graphs.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.
At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.
1 A television station makes its programmes in studios on the ground and transmits them via
satellites to receivers in viewers’ homes.
(a) Describe how a programme is transmitted from the station’s studio to a viewer’s satellite
receiver.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [4]
(b) Explain two advantages to the viewer of using satellites to receive television programmes.
1 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [2]
(c) Explain two disadvantages to the viewer of using satellites to receive television programmes.
1 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [2]
2 Anderson Chemicals have a computerised payroll system which has recently become out of date.
Jasbir, a systems analyst, has been asked to update the current system and will need to research
this problem.
(a) Discuss the advantages and disadvantages of the different methods Jasbir could use for
collecting information.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [8]
(b) After developing the new computerised payroll system Jasbir will need to create a test plan.
Describe how he would do this, including the type of testing he would carry out.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [4]
(c) When the new computerised payroll system is implemented, perfective maintenance will be
carried out.
Describe two other types of maintenance and suggest reasons why they would be needed in
this scenario.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [4]
3 Safina, a project manager, uses a number of project management tools for planning the conversion
of an existing classroom into a new computer room.
Describe how Safina would use these tools to plan the project.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..................................................................................................................................................... [6]
4 A bank has a number of offices all over the world. Each office has a local area network (LAN). The
LANs are connected together to create a wide area network (WAN) for use by its staff.
One of the office managers wants to improve the speed and efficiency of his office LAN. He wants
to replace the existing copper cabling with an alternative communication method.
(a) Evaluate three alternative methods of transmission the manager could use including optical
methods.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [8]
(b) Describe the role of three types of server that might be found in an office LAN.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [6]
(c) Explain how the bank could use encryption techniques to attempt to prevent its data from
being read by unauthorised people.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [6]
(a) variable
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [2]
(b) iteration
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [2]
(c) loop
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [2]
6 ‘People are spending a large amount of time using social networking sites. This has important
positive and negative implications for society.’
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..................................................................................................................................................... [8]
7 RockIT is an international company. The senior managers are based on the same site
and use face-to-face meetings to communicate with each other. The senior managers use
video-conferencing to communicate with the company’s other offices around the world.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [4]
(b) The senior managers meet in the same room each week in a face-to-face meeting.
Explain why the senior managers would use face-to-face meetings rather than
video-conferencing.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [6]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [2]
(b) Describe the steps that the web browser will go through to ensure that Shafiq has logged on
to a secure website.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [4]
9 (a) Describe what is meant by the use of biometrics when protecting devices from being accessed
by unauthorised people.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [2]
(b) Many people are becoming concerned that too much reliance is being placed on the use of
biometrics to protect devices from being accessed by unauthorised people.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [8]
© UCLES 2015 9626/03/SP/17
16
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.
MAXIMUM MARK: 90
Three from:
Three from:
System software refers to the operating system and all utility programs that
manage computer resources
System software includes BIOS, compilers, interpreters, system utilities (must
have two)
System software is a type of computer program that is designed to run a
computer’s hardware and application programs
System software is the interface between the hardware and user applications
Three from:
Two from:
Four from:
Four from:
Three from:
Three from:
If the plane crashed in real life the pilot might die whereas nothing would
happen to him/her in a simulator
If the plane crashed in real life the plane would cost a lot to replace whereas
nothing would happen to the simulator
Extreme weather conditions can be made to order in a simulator but you
might have to wait a long time for them to happen in real life
The cost of running a simulator is cheaper than the cost of fuel in a real plane
6(a) Award 1 mark. 4
Lookup check
Three from:
Four from:
Four from:
Two from:
Two from:
Data is not repeated/no redundant data improving data integrity and reducing
errors
Data is not repeated/no redundant data saving storage space
Reinforces referential integrity
Two from:
Six from:
Presentation vs DTP/WP
You can use video/animations in presentations
You can have sound in presentations
Ink/paper is more expensive than slideshow presentation
Easier/less costly to update
Cannot be sure everybody would see presentation/can deliver newsletter to
every home/might have presentation at an inconvenient time for some parents
Producing presentation would take longer than WP document
You have to pay someone to deliver hard copies
Adware is a form of spyware that collects information about the user in order
to display advertisements in the Web browser
Some applications that contain adware track the user’s internet surfing habits
in order to serve ads related to them
Level 0 (0 marks)
Response with no valid comment.
Examples:
Six from:
Four from:
The compiler’s conversion is made just once and after that the same binary
code can be distributed to the user’s machines where it can be executed
without further translation thereby saving time compared to an interpreted
program
Whereas an interpreted program is distributed as source code so it needs
to be translated in each final machine, which takes more time than using
compiled code…
…however this does make the program distribution independent of the
machine’s architecture whereas the compiled version will only run on
machines with a specific processor’s architecture, thus making it less portable
than interpreted code
Compiled object code makes it easier to protect intellectual property as the
machine code is difficult to understand whereas interpreted code can easily
be read and copied by humans
It generally takes longer to run a program under an interpreter than to run the
compiled code because the interpreter must analyse each statement in the
program each time it is executed…
…but it can take less time to interpret it than the total time required to compile
and run it
Compiler generates the error report after the translation of the entire page
while an interpreter will stop the translation after it gets the first error making it
easier to debug
An interpreter uses less memory as source code only has to be present
one line at a time in memory whereas with a compiler all the execution code
needs to be loaded into memory
MAXIMUM MARK: 90
Four from:
The television (TV) programme from the studio is converted to digital data/
modulated onto a carrier wave
The TV signal is sent from the studio to a ground/uplink dish station by high
capacity circuit/microwave/fibre optic cable
The signal is uplinked to a geostationary satellite from the ground/uplink dish
station
The frequency/channel of the signal is changed ready for downlinking
The viewer’s dish is in line of sight of the satellite
The signal is sent from the satellite transponder to viewer’s dish
The LNB on the viewer’s dish collects signals from the satellite
A cable downlinks the signal to the receiver box
A satellite decoder/set top box processes signals for use by the TV
1(b) Award 1 mark for each correct answer up to a maximum of 2. 2
Two from:
Satellite TV can be transmitted with higher data rates so the viewer can watch
high-quality audio and video
Satellite TV can be received in most areas so when a terrestrial signal/cable
TV is not available TV can still be watched
The viewer has access to hundreds of channels so can view programmes
from around the world/many TV stations
The viewer has a greater choice of programmes so can select the ones that
are wanted/interesting and discard the channels not wanted
1(c) Award 1 mark for each correct answer up to a maximum of 2. 2
Two from:
The initial cost to the viewer is higher because the receiver and satellite dish
can be expensive to purchase/install
Viewers will need a separate receiver for each TV set so it can be expensive if
more than one TV set is in use
Poor/bad weather can cause the loss of satellite signals/reception so no
programmes can be watched in very bad weather
Viewers may have to pay extra/subscriptions to watch some programmes
Eight from:
Advantages:
Observation (by the analyst/Jasbir of the system procedures while they are
being carried out) enables the analyst to witness/see/observe directly/first-
hand how the system actually works and how the users use it
Observation provides a realistic view of the system
The actual methods of working and the procedures can be observed
The observed data are collected in real time and are usually more accurate
than second-hand data
Disadvantages:
Questionnaires
The lack of personal contact means that answers cannot easily be clarified
The return rate of the questionnaires may be low
Ambiguous/vague/incomplete/inaccurate answers may invalidate the
responses/information collected
2(b) Award 1 mark for each correct answer up to a maximum of 4. 4
Four from:
Six from:
Use of Gantt charts to track the progress of tasks to show the dependency of
tasks on each other
... to show the schedule of work throughout the duration of the project
Use of Project Evaluation and Review Technique (PERT) charts to identify the
specific tasks and their milestones
Creation of arrow/node activity/network diagrams to show how each task is
related
... to determine the expected time required for each task
... to determine the critical path
Eight from:
Infrared transmission
Is only effective over short distances so other technologies would be more
effective
Can be blocked by walls/obstacles unlike radio waves
... which further limits the range of effectiveness ...
... but does reduce the risk of eavesdroppers outside the network
Can carry a higher bandwidth compared to radio transmission
Relies on line of sight unlike radio transmission
A web server stores, processes and delivers web pages to network users
The communication between client and web server takes place using the
Hypertext Transfer Protocol (HTTP)
Web servers most frequently deliver HTML documents which may include
images, style sheets and scripts in addition to text content
A web browser makes a request for a specific resource using HTTP and the
web server responds with the content of that resource or an error message if
unable to do so
Six from:
Two from:
A storage location
A symbolic identifier
Holds a quantity/value/information
The variable name is used to refer to the stored value
5(b) Award 1 mark for each correct answer up to a maximum of 2. 2
Two from:
Two from:
Level 0 (0 marks)
Response with no valid content.
Examples
Answers may refer to or address, e.g.:
Positive implications
Four from:
More than two participants can take part simulating a face-to-face meeting
All participants can be seen and heard as in a face-to-face meeting
Voice activated switching between participants so they can see and hear who
is contributing
All participants can be seen at once using ‘continuous presence’ technology
Lecture mode allows one participant to be viewed by all the others
Presentations can be viewed by all participants at once
Meetings/conferences can be recorded for later playback/research
Six from:
Large documents can be more easily shared and worked on face to face
The discussions of the senior managers/any documents shared would be
more secure/less likely to be hacked in a face-to-face meeting
Video-conferencing can be less personal than meeting face to face and some
meetings need more personal communication ...
... it could be possible to misunderstand body language/meaning when the
image is not clear
Meetings are regular/each week so the video-conference would need to be
set up often which would require technical expertise with recurring costs
Inconvenience for technical staff having to be available/on call for
video-conference each week/on a regular basis
As they are on the same site, the company would not need to pay travel/
accommodation/hotel expenses for face-to-face meetings so video-
conferencing would not be an advantage
As they are on the same site, there is no waste of time travelling to meetings
so video-conferencing would not be an advantage
Two from:
A padlock is shown by the browser indicating that the data is encrypted during
transmission
The URL will show https indicating that a secure connection is being made
Browser will display a warning if an invalid digital certificate is received from a
website
Browser will display a warning if a mixture of encrypted and unencrypted data
is received from a website
Browser address bar changes colour (to green) when using secure
connections/extended digital certificates
8(b) Award 1 mark for each correct answer up to a maximum of 4. 4
Four from:
Two from:
All people/everyone must have the trait being used for biometrics so the
biometric data can be compared/measured on everyone
Biometric data must be permanent/does not significantly change over time so
algorithm will work over time
Biometric data must be measurable/must be easy/quick to acquire the data
from an individual so the individual is not inconvenienced/device is accessed
quickly
Biometric data must be in a form that allows processing/extraction of features
for comparison
Biometric data may be passed on to third parties/used for other purposes/
raises concerns regarding privacy and the inappropriate use of the data
... so individuals may not allow use of their data for this purpose/use of
biometrics must be acceptable to participants
There is a limit on the number of stored sets of data/maximum number of sets
of data and this limits the usefulness of biometrics in large populations/with a
large number of users
Biometrics rely on the probability of inputs being valid so if the false
acceptance rate is set incorrectly imposters can be shown as genuine
Failure to detect a match between the input and the (matching) data stored
can result in valid inputs being incorrectly rejected and access being
improperly denied
Failure to capture the biometric data when presented/failing to detect data
when correctly presented results in the rejection of genuine readings and
access is improperly denied
Write your Centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.
At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.
DC (ST/CGW) 149845/4
© UCLES 2018 [Turn over
2
1 Tick the four most accurate statements referring to dynamic and static data.
Data that is read from and not written back to a file is called static data.
2 Tick the four most accurate statements referring to hardware and software.
[4]
3 The secretary of a company is transferring workers’ records from paper to a new computer
database. She wishes to make sure the data in the database is accurate. To check the data she is
using verification and validation.
Using an example, or otherwise, explain why she is using validation as well as verification.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[6]
4 Many personal computers are bought with certain types of software already installed. This includes
a number of items of utility software.
Describe how each of the following utilities carries out its function.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
5 Computer controlled traffic lights are used to control traffic flow in major cities.
Identify three input devices which could be used and describe their use in such a system.
Device 1 ...........................................................................................................................................
..........................................................................................................................................................
Use ...................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
Device 2 ...........................................................................................................................................
..........................................................................................................................................................
Use ...................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
Device 3 ...........................................................................................................................................
..........................................................................................................................................................
Use ...................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[6]
6 Many computer users often confuse the terms the ‘internet’ and the ‘World Wide Web’.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[6]
7 A managing director of a company supervises other directors. Each director has three departments
they are responsible for. Each department has several workers. The company stores information
about all its workers in a hierarchical database.
Explain what is meant by a hierarchical database management system and describe how such a
system would be used to store the workers’ data.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[5]
8 Here is a spreadsheet showing the prices of various toys in a shop. The discounted price is found
by using a VLOOKUP formula in cells E8:E13.
E8 ✘ fx =D8-(VLOOKUP(C8,$C$3:$D$5,2,FALSE)*D8)
A B C D E F G H
1
2 Discount code
3 A 20%
4 B 15%
5 C 10%
6
7 Toy Price Discounted price Number sold
8 Elephant A $45 $36.00 4
9 Cheetah A $35 $28.00 6
10 Giraffe C $55 $49.50 10
11 Lion B $50 $42.50 5
12 Leopard A $40 $32.00 6
13 Zebra B $30 $25.50 3
14
15
16
17
(a) By describing what the formula in cell E8 does, explain the need for absolute and relative cell
referencing.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[6]
(b) The owner of the shop wants to see which toys have a Discounted price that could be
considered cheap and those that could be considered expensive. He would like to see all the
cells with toys which are more than $40 shaded blue, all those that are less than $30 shaded
yellow and the remainder shaded green.
Describe how this could be achieved without each individual cell having to be changed.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[5]
(c) The owner wants a chart showing the Number sold of each toy as a proportion of the total
number of toys sold.
Identify the most suitable type of chart which would be used to show this information and
describe how it would be produced.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[4]
© UCLES 2018 9626/12/M/J/18 [Turn over
10
Explain how the components of an expert system would be used to produce the diagnosis of an
illness.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[6]
10 A car salesroom has a relational database which stores details of the cars and the customers
who have purchased a car. The manager uses it to search for information about the cars and the
customers. She also produces reports based on these searches.
Tables
Queries
Customers second names beginning with
Price of car
Forms
Customers
Reports
All cars in stock
(a) She wants to have an easier way of accessing the queries, forms and reports.
Design a switchboard for her which will allow her to go to any of the reports, forms or queries
already set up as shown in the image above.
[4]
(b) Referring to any four interactive items on your switchboard explain what will happen if they
are selected.
Item 1 ........................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Item 2 ........................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Item 3 ........................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Item 4 ........................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[4]
Car–Code ID Customer–code
Make Order–No First Name
Model Customer–code Second Name
Price Car–Code Address–1
Address–1
The car salesroom manager wanted a list of cars made by Frod as well as, in the same list,
any cars ordered by customers whose second name begins with B.
The printout shows the makes and models of cars, first and second customer names who
have ordered them and the order number.
Describe, in detail, the steps required to set up a query which would display this list.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[8]
11 Many major supermarkets now use a variety of monitoring technologies to check the work of their
employees.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[8]
12 Financial models are often created using spreadsheet software rather than using manual
methods.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[8]
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.
Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.
Write your Centre number, candidate number and name on all the work you hand in.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.
At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.
DC (SC/SW) 149773/4
© UCLES 2018 [Turn over
2
1 Tick the four most accurate statements referring to hardware and software.
2 Tick the four most accurate statements referring to protecting the confidentiality of personal data.
You should use different passwords and PINs for different accounts.
Storing personal data on removable media only and locking them away when not in
use, is a good form of protection.
Encryption prevents data from being accessed.
Banks are allowed to share personal data of customers with other customers.
Confidential personal data is usually stored on DVD ROMs as this prevents it from
being accessed.
TLS is a cryptographic protocol used to protect personal data transmitted across a
network.
Users should always log off immediately after using a site where personal data has
been typed in.
Using public computers to access personal information is good practice as they
usually have plenty of security.
[4]
3 When data is entered into a database it needs to be checked for accuracy. One of the methods
used to help in this process is verification.
Compare and contrast the different methods used to carry out verification.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..................................................................................................................................................... [5]
4 Jasmine is carrying out a study of the effect of pollution on her local countryside. She intends to
use data from direct data sources as well as indirect data sources.
Describe what is meant by direct and indirect data sources using examples from this scenario.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..................................................................................................................................................... [6]
5 Joseph has written a program using a high level language. He now needs to get it translated for
use on his computer.
Compare and contrast the use of a compiler with an interpreter for this purpose.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..................................................................................................................................................... [6]
6 A number of schools in the Americas have introduced a BYOD (Bring Your Own Device) policy.
This means that students are expected to bring their own device to school for use in lessons. This
can encourage a digital divide within schools.
(a) Describe three ways in which this can widen the digital divide within schools.
1. ...............................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
2. ...............................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
3. ...............................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [3]
1. ...............................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
2. ...............................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
3. ...............................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [3]
7
A B C D E F G H
1
2
3
4
5 11
6 7
7 4 6 9 15 5
8 6
9 8
10
11
12
13
Values Formulae Functions
(a) Cells
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [2]
(b) Rows
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [2]
(c) Columns
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [2]
(d) Worksheets
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [2]
8 Here is a section of a database showing the wages paid and hours worked by some workers in a
company.
New data is about to be entered but it will need to be validated. Validation rules will need to
be created to make sure the data is sensible. Two validation rules would be appropriate for the
Telephone field and one for the Weekly wage field. You can assume the wages shown include
the minimum and maximum that the company pays.
J215VENUES
Family name First name Telephone Weekly wage Hours worked
Smith John 01632 267145 220 47
Prudhomme Pierre 01632 342016 250 51
Gonzales Jose 01632 941368 260 42
Signusson Lars 01632 643821 240 40
Thorsvald Olaf 01632 811276 190 45
Mueller Dieter 01632 351156 180 48
Lucio Silvio 01632 281146 210 43
Boko Peter 01632 444707 260 51
Ndlovu Joseph 01632 319249 300 41
James Peter 01632 860787 310 40
Gordon James 01632 205775 280 40
McDonnell Jamie 01632 430332 250 45
Kelly Peter 01632 832287 290 50
Describe, using examples from the data shown, the validation rules that will be created. For each
one, give examples of test data (do not include normal data) that would test the validation rule
works and give reasons for each choice.
(a) Telephone:
...........................................................................................................................................
...........................................................................................................................................
...................................................................................................................................... [2]
...........................................................................................................................................
Reason ..............................................................................................................................
...................................................................................................................................... [2]
...........................................................................................................................................
...........................................................................................................................................
...................................................................................................................................... [2]
...........................................................................................................................................
Reason ..............................................................................................................................
...................................................................................................................................... [2]
...........................................................................................................................................
...........................................................................................................................................
...................................................................................................................................... [2]
...........................................................................................................................................
Reason ..............................................................................................................................
...................................................................................................................................... [2]
(c) Select an appropriate data type for the Telephone field, explaining why you have chosen it.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [3]
(d) The data from this section of the database has been imported into a spreadsheet. This is
because the manager wants to calculate the average wage earned by the workers who work
more than 40 hours a week but less than 50 hours a week.
A B C D E F
1 Family name First name Telephone Weekly wage Hours worked
2 Smith John 01632 267145 220 47
3 Prudhomme Pierre 01632 342016 250 51
4 Gonzales Jose 01632 941368 260 42
5 Signusson Lars 01632 643821 240 40
6 Thorsvald Olaf 01632 811276 190 45
7 Mueller Dieter 01632 351156 180 48
8 Lucio Silvio 01632 281146 210 43
9 Boko Peter 01632 444707 260 51
10 Ndlovu Joseph 01632 319249 300 41
11 James Peter 01632 860787 310 40
12 Gordon James 01632 205775 280 40
13 McDonnell Jamie 01632 430332 250 45
14 Kelly Peter 01632 832287 290 50
15
16 Average 230
17
= ................................................................................................................................................
.............................................................................................................................................. [6]
You may use the space below for any working out.
(e) Describe how the spreadsheet could be sorted so that Dieter Mueller is the first worker in the
list and Pierre Prudhomme is the seventh.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [3]
(f) The manager has decided that the name fields should be combined. He wants a name field
containing the first name initial and the family name. Write down the formula that would give
Jamie McDonnell’s name as J McDonnell.
= ................................................................................................................................................
.............................................................................................................................................. [3]
You may use the space below for any working out.
9 Some database systems use the indexed sequential method of accessing data.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..................................................................................................................................................... [8]
10 Magnetic Ink Character Recognition (MICR) and Optical Character Recognition (OCR) are often
used in different ways for different purposes.
Evaluate the use of MICR and OCR for entering data from documents.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..................................................................................................................................................... [8]
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..................................................................................................................................................... [8]
BLANK PAGE
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.
Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.
Write your Centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.
At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.
DC (SC/SG) 152977/2
© UCLES 2018 [Turn over
2
1 A company stores details of its customers in a database which is to be used as the source file for
a mail merge. A letter, created as the master document, is to be sent to all the customers by post
or by email. The company prefers to send the letter by email. However, letters will be sent by post
if the company does not have a current email address for the customer in its database.
Describe how a mail merge field in the master document can be set up to exclude those customers
whose email address is not stored in the database.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[4]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
1 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
3 ................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[3]
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[4]
4 As part of a project to create a new software application, a system analyst will produce a software
requirements specification and a user requirements specification.
(a) Describe the contents of a software requirements specification for the new software
application.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[4]
(b) Describe the purpose of a user requirements specification for the new software application.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[4]
(c) Give one reason why the user requirements specification might prove to be inaccurate.
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[1]
5 Discuss the benefits and drawbacks of the use of satellite technology in global positioning systems
(GPS).
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[8]
6 Tamsin is evaluating CPU hardware for use in a new tablet computer. She uses the charts in
Fig. 1 to help her make a decision between using CPU 1 or CPU 2 in the new tablet.
CPU 1 Physics
CPU 1
calculations
test
CPU 2 Graphics
performance
CPU 2
0 2 4 6 8 10 12 14 16
Time in seconds
0 5 10 15
Score (points)
Fig. 1
Identify, with reasons based on the information in Fig. 1, the most suitable CPU for Tamsin to use
in the new tablet computer.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[5]
7 Cynthia has created a database to store details of her friends in the UK and wants to include
their home addresses. She will create a validation routine to check that the UK postcode of their
address is in a valid format when it is entered into the database.
UK postcodes must have an outward code and an inward code separated by a single space. The
outward code is made up of the postal area and the postal district. The inward code also has two
parts: the postal sector and the postal unit. A typical UK postcode is CB1 2EU.
UK Postcode Formats
Outward Code Inward Code
Area District Sector Unit Written as:
Example 1: CB 1 2 EU CB1 2EU
Example 2: SW 1A 1 AA SW1A 1AA
Example 3: SW 1A 0 AA SW1A 0AA
Example 4: CV 4 8 JQ CV4 8JQ
Fig. 2
Using the information given above, describe what the validation routine would have to do in order
to check that the entered postcode was in a valid format.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[6]
8 Discuss the advantages and disadvantages of carrying out research into an existing computerised
stock control system using the analysis of existing documents.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[8]
9 A graphics artist has drawn a shape on a 600 × 800 pixel resolution grid as shown in Fig. 3.
600
500
400
Y 300
200
100
0
0 100 200 300 400 500 600 700 800
X
Fig. 3
The shape is to be stored in a computer file as a vector graphic so that it can be opened and
displayed in different resolutions without loss of quality.
Describe the information about the shape that would be stored in the vector graphic file.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[6]
10 A large school is creating a relational database to store details of pupils and teachers. Examples
of the data to be stored are shown:
Using the information given, create a data dictionary in the table to list the entities and attributes of
the new database:
[8]
11 An automatic washing machine has a number of wash cycles controlled by an embedded computer
system. The system can accept inputs to vary the temperature and spin speed. It also has ‘start’
and ‘stop/cancel’ buttons.
When the ‘start’ button is pressed the system checks, in this order:
• that the door is properly closed
• the temperature has been set by the user
• the spin speed has been set by the user
• if the load is either a ‘full load’ or ‘half load’ of washing.
The washing cycle will automatically stop if the set time has been reached or the ‘stop/cancel’
cycle button is pressed.
A section of the control sequence is shown in the flowchart in Fig. 4. Some flowchart labels are
missing.
Door is closed.
Temperature &
Spin Speed are
input
No No No
START
Yes Yes
button is A B C
pressed
Yes
Full or Half
load setting
is input
STOP washing
machine cycle
Yes Yes
START
No
E D washing
machine cycle
No
Fig. 4
Complete the table below to describe how the embedded computer system controls the washing
machine at A, B, C, D and E.
Position in
What is happening at the position
flowchart
[5]
Describe each of the following security issues and suggest how, other than using physical security
methods, the risk from each may be reduced.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[5]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[5]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[4]
13 Companies use a range of physical security methods to try to prevent unauthorised access to the
company data stored on their networks.
Evaluate the use of physical security methods in attempting to prevent unauthorised access to the
stored data.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[8]
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.
Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.
Write your Centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.
At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.
DC (SC/SG) 152978/2
© UCLES 2018 [Turn over
2
1 An online store requires customers to create an account using its website. The online form for
creating the account, with customer entries, is shown in Fig. 1.
Password* ***********
Confirm password* ***********
Please check the box to show that you have read and agree to the terms.
Fig. 1
The data entered by the customer is checked for accuracy before it is submitted to the website.
(a) Describe, using the information shown in Fig. 1, how the data in the required fields (fields
marked *) on the form could be checked.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[5]
(b) Describe one essential element that must be added to the form.
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[1]
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[8]
3 A store has a large number of departments each with its own sales staff. The sales staff are
responsible for selling only the goods in their department. Each department has its own dedicated
checkouts which are connected to the store’s network.
A new checkout system is to be implemented so that the staff in the clothing department can use
any of the checkouts in the store to sell goods. Staff with experience of the new system will be
expected to assist in the training of staff in other departments when the new system is eventually
introduced throughout the store.
The store managers have to decide how to implement the new sales and checkout system.
Describe the most appropriate method of implementation and explain how the change would be
carried out in the store.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[8]
The following code shows a ‘for’ loop and the code for displaying the result.
<p id="Number"></p>
<script>
//JavaScript code follows
var displayresult = "";
var X;
(a) Describe what each statement in the ‘for’ loop does and the results that are output when the
code is executed.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[5]
(b) Rewrite the ‘loop’ code as a DO WHILE loop to display the same results.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[6]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[4]
5 A company sells replacement windows for customers’ homes. A salesman visits customers’
homes to measure the windows. The salesman usually takes a company laptop on the visit. The
salesman is away from the office most of the day. When the salesman is back in the office he has
to type up a report on the visit and create quotations to send to the customers. He needs access
to a variety of documents including those found on the internet. The salesman also needs to be
able to communicate with customers in a variety of ways.
The company managers are considering replacing the laptop with a new smartphone for the
salesman to take on the visit.
Explain why the salesman has told the company managers that both devices are needed for the
visits.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[8]
6 A software company is developing a new ‘app’ for smartphones. The Rapid Application
Development (RAD) method is used to ensure that the ‘app’ is available as soon as possible.
(a) The RAD process involves several phases. The first phase is often referred to as Business
Modelling.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[3]
1 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[4]
2 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[4]
7 Telecommunication companies often prefer to use fibre optic cables to transmit data.
Discuss the benefits and drawbacks of using fibre optic cables for data transmission.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[8]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[8]
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[8]
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[8]
BLANK PAGE
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.
Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.
Write your Centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.
At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.
DC (SC/SG) 152979/2
© UCLES 2018 [Turn over
2
1 Video is streamed over networks and the internet at different bit rates. Fig. 1 shows a summary of
the bit rates that are usually required for various video resolutions. Fig. 2 shows the bandwidths
that are typically available over different mobile (cell) phone connections.
Fig. 1 Fig. 2
Using all the information in Fig. 1 and Fig. 2, explain how the viewing experience of a streamed
video displayed on a mobile (cell) phone screen of resolution 1024 × 576 pixels is affected by bit
rate and available bandwidth.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[8]
2 The use of JavaScript within the HTML code of a web page allows the page to react to user
intervention.
The code below contains a function named checkreadpagefunction that will ask the user to
confirm that the page has been read.
Complete the JavaScript code by writing extra code that will capture the click event and execute
the function.
<html>
<body>
<p>Click on the button to confirm that you have read this page.</p>
<button id="button1">Click here</button>
<script>
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[6]
function checkreadpagefunction() {
alert ("I have read this page.");
}
</script>
</body>
</html>
You may use the space below for any rough work.
A S1 S4 B
Message Source Message Destination
S3 S6
C D
S2 S5
Network of switches
Fig. 3
(a) Explain, with reference to Fig. 3, why this method of sending a message by the route shown
is often called ‘store and forward’.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[8]
© UCLES 2018 9626/33/M/J/18 [Turn over
6
(b) Describe two advantages of using the ‘store and forward’ method to send a message over
this network.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
4 An animator used a computer to produce an animation consisting of eight frames. The frames are
shown in Fig. 4.
1 2 3 4 5 6 7 8
Fig. 4
The animator only drew some of the frames in this animation and the computer created the others.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[6]
5 RockICT Sales sells hats to customers direct from its warehouse. It has a centralised ordering
system that is linked to the warehouse and accounts systems. When a customer orders a hat, the
system:
Draw a Level 0 (context level) Data Flow Diagram of the system to show the external entities and
the data flow between these and the ordering system. The ordering system has been drawn in the
centre of this box for you.
Ordering
System
[8]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[4]
(b) Vector images are stored in computer files in a different format to how bitmap (‘raster’) images
are stored.
Explain why vector images must be converted to bitmap (‘raster’) images for display on a
digital monitor.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[4]
7 Describe how holographic optical disk storage technology uses lasers to store vast amounts of
data.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[6]
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[6]
9 (a) Describe how vision enhancement technology can assist visually impaired people when
walking around a shopping street.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[6]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
Discuss the advantages and disadvantages of the various types of project management software
for this task.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[8]
11 Discuss the benefits and drawbacks of using satellites for television and radio broadcasting.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[8]
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[8]
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.
Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.
Write your Centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.
At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.
DC (SC/SW) 149846/4
© UCLES 2018 [Turn over
2
1 Tick the four most accurate statements referring to the meaning of data and information.
2 Tick the four most accurate statements referring to different types of user interface.
A gesture based interface does not require the use of any input devices.
(a) Describe, in detail, how she could use different sets of keys on her keyboard to edit and save
the book.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [3]
(b) When the author finishes a chapter she wishes to print it out.
Name three appropriate types of printer, and for each one give a different advantage to the
author for using it compared to the others.
1 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
3 ................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [3]
4 There is a global digital divide between more and less industrially developed nations.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..................................................................................................................................................... [6]
5 People working away from their office are able to make use of their company’s network through
a VPN.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..................................................................................................................................................... [6]
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..................................................................................................................................................... [6]
7 Describe the importance of considering a user’s mental model when a designer seeks to create a
user interface for them.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..................................................................................................................................................... [6]
8 Juan is the owner of a small company. He has created a spreadsheet to calculate the payroll.
His spreadsheet is shown below.
Each worker has one of four different tax allowances. A tax allowance is the amount that can be
earned before workers start paying tax.
A B C D E F G H I J
1 Range of tax rates Tax allowance range
2
3 A 20% W X Y Z
4 B 30% 200 220 240 260
5 C 35%
6 D 40%
7
8
Wage after
Weekly Tax Taxable tax
9 Worker’s name wage Tax rate allowance pay deduction
10
11 Patrick O’Reilly 250 B Y 10 $247
12 John McDonnell 300 D Z 40 $284
13 Louise Gimenez 280 A X 60 $268
14 Jeanette Grimault 260 A Y 20 $256
15 Xavier Hernandes 250 C W 50 $233
16 Paolo Riva 240 B W 40 $228
17 David Kennedy 280 D Z 20 $272
18 Sian Evans 270 A Y 30 $264
19 Karl Gustaffson 260 B W 60 $242
20
(a) To make it easier to do the calculations Juan has used named ranges. The Range of tax rates
is called Rate and the Tax allowance range is called Allowance.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [3]
(b) Each worker has an amount, related to their Tax allowance, deducted from their weekly wage
to calculate the Taxable pay.
Write down the formula that should go in cell F11 to calculate the Taxable pay for Patrick
O’Reilly. The formula should be easy to replicate and use a named range.
= ................................................................................................................................................
.............................................................................................................................................. [4]
You can use the space below for any working you need.
(c) The Taxable pay is multiplied by the rate of tax to calculate the tax which must be paid, which
is then deducted from their Weekly wage. The result will be their Wage after tax deduction.
Write down the formula that should go in cell G11 to calculate the Wage after tax deduction.
The formula should be easy to replicate and use a named range. Identify the steps which
need to be taken to display the value in G11 exactly as shown in the spreadsheet.
= ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [7]
You can use the space below for any working you need.
9 A company has its own website and wishes to add a music soundtrack. Its web designers will
need to edit the soundtrack before uploading it. They will need to use sound editing software.
Describe, including their effects, the following aspects of sound editing software.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [2]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [2]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [2]
(a) (i) Describe the steps that need to be followed to set up a dynamic query to allow you to
search on the Group size and Code fields. All fields are to be printed except Discount.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...................................................................................................................................... [5]
(ii) You run the query and type in the Group size as 4 and the Code as EGY.
...........................................................................................................................................
...................................................................................................................................... [2]
(b) The Duration field has only the values shown in the database excerpt. The database needs to
be set up to allow you to enter the data in this field without using the keyboard to type in the
value each time.
Describe how this would be done and explain how you would now enter the data.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [4]
(c) When the database was initially set up it did not have the Country field. Data was exported to
a spreadsheet and a formula created, using the Code field, to add the names of the countries
with the layout exactly as shown in the database excerpt.
Without specifying the formula precisely, explain how this could be achieved.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [5]
11 Control technologies are affecting everybody in their normal way of life. Some people think this is
good; others disagree with this.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..................................................................................................................................................... [8]
12 Many people use the internet on a daily basis to communicate with others.
Discuss the benefits and drawbacks of individuals using the internet to communicate with each
other.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..................................................................................................................................................... [8]
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.
Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.
Published
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.
Cambridge International will not enter into discussions about these mark schemes.
Cambridge International is publishing the mark schemes for the May/June 2018 series for most
Cambridge IGCSE™, Cambridge International A and AS Level and Cambridge Pre-U components, and
some Cambridge O Level components.
These general marking principles must be applied by all examiners when marking candidate answers.
They should be applied alongside the specific content of the mark scheme or generic level descriptors
for a question. Each question paper and mark scheme will also comply with these marking principles.
• the specific content of the mark scheme or the generic level descriptors for the question
• the specific skills defined in the mark scheme or in the generic level descriptors for the question
• the standard of response required by a candidate as exemplified by the standardisation scripts.
Marks awarded are always whole marks (not half marks, or other fractions).
• marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit
is given for valid answers which go beyond the scope of the syllabus and mark scheme,
referring to your Team Leader as appropriate
• marks are awarded when candidates clearly demonstrate what they know and can do
• marks are not deducted for errors
• marks are not deducted for omissions
• answers should only be judged on the quality of spelling, punctuation and grammar when these
features are specifically assessed by the question as indicated by the mark scheme. The
meaning, however, should be unambiguous.
Rules must be applied consistently e.g. in situations where candidates have not followed
instructions or in the application of generic level descriptors.
Marks should be awarded using the full range of marks defined in the mark scheme for the question
(however; the use of the full mark range may be limited according to the quality of the candidate
responses seen).
Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should
not be awarded with grade thresholds or grade descriptors in mind.
2 You should use different passwords and PINs for different accounts. 3 4
3 Five from: 5
Both involve comparing data that has been/is being entered with another copy
Both involve checking that data has been entered correctly not that it is correct
Visual verification is visually checking the entered data against the source
document
Double data entry is usually two people entering the data/entered (by the same
person) twice (and each version compared against the other)
Visual verification is carried out by a human/user/yourself
Double data entry – verification is carried out by the computer
Visual verification will enable the user to see mistakes if they have been made
With double data entry the computer will alert user to the fact that a mistake
has been made and they decide which version has been copied correctly.
4 Six from: 6
A direct data source is a source where data is collected for a specific purpose
or task
Examples of direct data sources are questionnaires or data logging
An indirect data source is when data is obtained from a third party not
necessarily related to the current task
5 Six from: 6
When executed, the compiled program is executed directly using the machine
code
An interpreter has to be resident in memory in order for the program to run
Students whose families can afford the devices have an unfair advantage
Teachers find it difficult to manage learning activities when they have to
support multiple platforms and device types
Some activities and applications may only be compatible with certain devices
The gap widens as underprivileged students lack access to high performance
computers at home
Underprivileged students do not have internet access at home so they do not
learn the same things putting them at a distinct disadvantage.
Teachers could be given time to train on and understand the platforms they are
using
Teachers could have to learn how to integrate them into a class of students
who may not have access to the internet or mobile devices at home
Schools need to have different versions of software that can be used on all
devices
Libraries and schools should offer technology training for parents
A fund for the purchase or subsidy to purchase machines for poor children
A stock of spare machines kept in school in case students do not have
machines
A list of software could be issued to staff which runs across all platforms.
8(a) Telephone:
Length check 1
Reason these are examples of data less than 12 characters and more than 1
12 characters.
Format check 1
8(a)(iv) Test Data e.g. 0163 256667, 016322 27655, 01632348976, 01632 454631 1
Range check 1
to check is not lower than 180 and not more than 310 1
8(c) Text
8(d) =AVERAGEIFS(D2:D14,E2:E14,">40",E2:E14,"<50") 6
=AVERAGEIFS() – 1 mark
(D2:D14, – 1 mark
First E2:E14, – 1 mark
“>40”, immediately after E2:E14 – 1 mark
Second E2:E14, – 1 mark
“<50” immediately after E2:E14 – 1 mark
Select A2:E14
Sort in ascending order of column D
Add a level
Sort in ascending order of column E/column B/column A.
=CONCATENATE() – 1 mark
LEFT(B13,1), – 1 mark
,” “,A13 – 1 mark
9 Eight from: 8
10 Eight from: 8
OCR is much faster than someone manually entering large amounts of text
OCR is cheaper than paying someone to manually enter large amounts of text
OCR can allow documents to be made editable MICR does not
OCR – all documents need to be checked over carefully and then manually
corrected
OCR – not 100% accurate, there are likely to be some mistakes made during
reading...
...such as 1 and I, O and 0.
Level 0 (0 marks)
Response with no valid content.
Advantages
Mobile networks generally offer much more coverage than other systems such
as WiFi...
...which forces users to depend upon hotspots in each area visited
4G offers a coverage of 30 miles and more and with overlapping network
ranges so users are usually assured of complete connectivity at all times
Big problem with WiFi networks is online security so mobiles more secure
Mobile devices can be used out in the field
Portability is one of the main advantages of mobile computing, you are not
restricted to one location in order for you to get jobs done
Disadvantages
Mobile networks are more expensive than traditional WiFi networks to use
Quality of connectivity can be poor if you are not near any of the normal
connections (Wifi, 3G, 4G)
Mobile VPNs are unsafe to connect to, and also syncing devices might also
lead to security concerns
Power consumption- due to the use of batteries in these devices, these do not
tend to last long.
Published
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.
Cambridge International will not enter into discussions about these mark schemes.
Cambridge International is publishing the mark schemes for the May/June 2018 series for most
Cambridge IGCSE™, Cambridge International A and AS Level and Cambridge Pre-U components, and
some Cambridge O Level components.
These general marking principles must be applied by all examiners when marking candidate answers.
They should be applied alongside the specific content of the mark scheme or generic level descriptors
for a question. Each question paper and mark scheme will also comply with these marking principles.
• the specific content of the mark scheme or the generic level descriptors for the question
• the specific skills defined in the mark scheme or in the generic level descriptors for the question
• the standard of response required by a candidate as exemplified by the standardisation scripts.
Marks awarded are always whole marks (not half marks, or other fractions).
• marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit
is given for valid answers which go beyond the scope of the syllabus and mark scheme,
referring to your Team Leader as appropriate
• marks are awarded when candidates clearly demonstrate what they know and can do
• marks are not deducted for errors
• marks are not deducted for omissions
• answers should only be judged on the quality of spelling, punctuation and grammar when these
features are specifically assessed by the question as indicated by the mark scheme. The
meaning, however, should be unambiguous.
Rules must be applied consistently e.g. in situations where candidates have not followed
instructions or in the application of generic level descriptors.
Marks should be awarded using the full range of marks defined in the mark scheme for the question
(however; the use of the full mark range may be limited according to the quality of the candidate
responses seen).
Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should
not be awarded with grade thresholds or grade descriptors in mind.
1 Four from: 4
Either:
Insert SKIPIF merge command/skip record if
Select merge field ‘email’
Set comparison to ‘is blank’/not present.
Marks awarded :
{SKIPIF = “” }
{MERGEFIELD email field}
3 Four from: 4
The wrong user may have been chosen so the user requirements are not
accurate
The user requirements may change during the development cycle/lifetime of
the project so the project becomes more complex/’mission creep’.
Candidates will discuss in detail, giving both benefits and drawbacks, of the
use of the use of satellite technology in global positioning systems (GPS).
The information will be relevant, clear, organised and presented in a
structured and coherent format.
There will be a reasoned conclusion/opinion.
Subject specific terminology will be used accurately and appropriately.
Candidates will explain the use, giving a benefit and drawback, of the use of
satellite technology in global positioning systems (GPS).
For the most part, the information will be relevant and presented in a
structured and coherent format.
There may be a reasoned conclusion/opinion.
Subject specific terminology will be used appropriately and for the most part
correctly.
Benefits include:
Access to satellite signals is available over most of surface of earth unlike
signals from terrestrial transmitters
Transmission of GPS signals is not dependent on political boundaries
Satellite signals are accessible over oceans where terrestrial transmissions
are difficult to receive due to the long distances from land
Signals are available to anyone who wishes to use them (unless switched
off by operator of satellite)
Satellites are vandal-proof/ inaccessible to those who would physically
attempt to disrupt their function
Drawbacks include:
Requires a large number (c.25 to 35) of satellites to be in orbit to provide
adequate coverage of terrain
Cannot easily be repaired if malfunctioning
Requires at least 3, preferably 4, satellites to be visible to / received by GPS
receiver to achieve reliable/accurate positioning
Satellite signals are blocked by solid objects/buildings/in tunnels/trees/dense
clouds/ snow storms so, in these circumstances, GPS receivers may«
«fail to provide locations
«may provide erroneous locations.
6 Five from: 5
7 Six from: 6
8 Eight from: 8
Advantages:
Eliminates the ‘researcher effect’/Hawthorne Effect where the presence of a
researcher may affect the observed data
May provide a larger sample for analysis
Provides access to data that may be inaccessible in any other way e.g.
people may be unwilling to discuss/mention details
Cost of the research is relatively low compared to other methods of
gathering data
Documentation may be highly detailed containing vast repositories of data
gathered over long periods of time/tracking over time/previous
observations/questionnaires
Documentation may contain spontaneous comments of recorders e.g.
personal feelings/comments/observations/notes that give greater insight into
the operations of a company/stock control system
Disadvantages:
Can be subjective/based on views of the researcher
Can be time-consuming compared to other methods of gathering data
Documents are not usually designed for research purposes so may be
difficult to comprehend/follow by researcher
Documentation may be incomplete as documents can be misfiled/lost over
time
Documentation can vary in quality of information
Researcher may lose/damage/misplace important documents during the
research process
9 Six from: 6
10 Eight from: 8
E.g.:
11 Five from: 5
13 Eight from: 8
Published
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of
the examination. It shows the basis on which Examiners were instructed to award marks. It does not
indicate the details of the discussions that took place at an Examiners’ meeting before marking began,
which would have considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner
Report for Teachers.
Cambridge International will not enter into discussions about these mark schemes.
Cambridge International is publishing the mark schemes for the May/June 2018 series for most
Cambridge IGCSE™, Cambridge International A and AS Level and Cambridge Pre-U components,
and some Cambridge O Level components.
These general marking principles must be applied by all examiners when marking candidate answers.
They should be applied alongside the specific content of the mark scheme or generic level descriptors
for a question. Each question paper and mark scheme will also comply with these marking principles.
• the specific content of the mark scheme or the generic level descriptors for the question
• the specific skills defined in the mark scheme or in the generic level descriptors for the question
• the standard of response required by a candidate as exemplified by the standardisation scripts.
Marks awarded are always whole marks (not half marks, or other fractions).
• marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit
is given for valid answers which go beyond the scope of the syllabus and mark scheme,
referring to your Team Leader as appropriate
• marks are awarded when candidates clearly demonstrate what they know and can do
• marks are not deducted for errors
• marks are not deducted for omissions
• answers should only be judged on the quality of spelling, punctuation and grammar when these
features are specifically assessed by the question as indicated by the mark scheme. The
meaning, however, should be unambiguous.
Rules must be applied consistently e.g. in situations where candidates have not followed
instructions or in the application of generic level descriptors.
Marks should be awarded using the full range of marks defined in the mark scheme for the question
(however; the use of the full mark range may be limited according to the quality of the candidate
responses seen).
Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should
not be awarded with grade thresholds or grade descriptors in mind.
X-ray holography can be used for imaging internal organs of the body
No need for invasive surgery
Used for living biological specimens
With very high resolution without the need for sample preparation
Endoscopic holography is used for producing high resolution 3D imaging
With no contact/non-destructive measurements inside the natural cavities of
internal organs
Ophthalmology use to correct problems with lenses implanted after cataract
surgery
In dentistry to store dental records of tooth prints as training aids for
students
In otology (ear studies) to study the vibrations forces/how the inner ear
bones move
In orthopaedics to measure strains/forces on fixation pins/rods
3D images of biological specimens can be created from a series of 2D
radiological images
Using holographic stereogram techniques/conical stereogram/ multiplex
hologram
Holographic contour generation is useful for measurements of biomedical
specimens.
3 Eight from: 8
<p id="Number"></p>
/JavaScript code follows
<script>
var X = 1;
do {
document.getElementById("Number").innerHTML += X + "<br>";
X=X+3
}
while (X < 10)
</script>
Smartphone has these features required for sales people when away from
office
Smartphone can be used for SMS/text messages
Can make voice calls whereas a laptop cannot
Smartphone always available/can be carried easily/unobtrusively/smaller
than a laptop Smartphone can use 3G/4G whereas laptop is restricted to
WiFi/cable
Smartphone can be used for internet access by laptop/tethering of laptop to
smartphone for internet access
Smartphone is not as good at office tasks as a laptop
Can connect more readily/to more services
Size of device may not be an issue as salesman will use a car/drive to visit.
Implementation/testing/cutover phase:
Carrying out the test plan by testing the data flow
...testing interaction/interfaces between components
Testing the complete system
User training where required/writing training/help notes
Rollout of ‘app’ to users
7 Eight from: 8
9 Eight from: 8
Published
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.
Cambridge International will not enter into discussions about these mark schemes.
Cambridge International is publishing the mark schemes for the May/June 2018 series for most
Cambridge IGCSE™, Cambridge International A and AS Level and Cambridge Pre-U components, and
some Cambridge O Level components.
These general marking principles must be applied by all examiners when marking candidate answers.
They should be applied alongside the specific content of the mark scheme or generic level descriptors
for a question. Each question paper and mark scheme will also comply with these marking principles.
• the specific content of the mark scheme or the generic level descriptors for the question
• the specific skills defined in the mark scheme or in the generic level descriptors for the question
• the standard of response required by a candidate as exemplified by the standardisation scripts.
Marks awarded are always whole marks (not half marks, or other fractions).
• marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit
is given for valid answers which go beyond the scope of the syllabus and mark scheme,
referring to your Team Leader as appropriate
• marks are awarded when candidates clearly demonstrate what they know and can do
• marks are not deducted for errors
• marks are not deducted for omissions
• answers should only be judged on the quality of spelling, punctuation and grammar when these
features are specifically assessed by the question as indicated by the mark scheme. The
meaning, however, should be unambiguous.
Rules must be applied consistently e.g. in situations where candidates have not followed
instructions or in the application of generic level descriptors.
Marks should be awarded using the full range of marks defined in the mark scheme for the question
(however; the use of the full mark range may be limited according to the quality of the candidate
responses seen).
Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should
not be awarded with grade thresholds or grade descriptors in mind.
1 Eight from: 8
The more available bandwidth on the connection the higher quality of video
that can be streamed
Use of a 3G connection to the internet limits video/streaming to low bit rate
of 400 Kb/s
Buffers not filled completely so video pauses/stops/jerky if frames not
received fast enough
Provides video of 320 × 240 pixels without apparent stuttering/buffering/
stop-start issues
This will be a poor video/low definition video as seen on the 1024 × 576
screen
Use of a 4G connection with higher bandwidth of c. 15Mbit/s allows video
with higher bitrates to be viewed properly
This is 1024 × 576 is possible and this is HD quality
Highest bit rates of 19 / 30 Mbit/s allowing resolutions of up to 1920 × 1080
pixels
Available/can be streamed over Wi-Fi (IEEE 802.1 g) wireless
connections....
Which have a maximum of 54 Mbit/s
1920 × 1080 pixels will have to be downscaled for viewing on the
smartphone screen
Which may lead to artefacts and loss of quality.
document.getElementById(“button1”).addEventListener(“click”,
checkreadpagefunction);
Six from:
1 mark for each of:
4 Six from: 6
Customer Pa
ym Warehouse
en
tf
or
O ha
rd t
er
qu k
re toc
t
O
es
rd of
S
er ha
st t
at
us
te
m
da
R es
up
eq sa
ge
k
ue
oc
r
s
at rde
st
St
fo for Ordering
rh o
n
fo ing
r h pa
io
at
at ym System
irm
ip
en
Sh
nf
t
co
ng
pi
ip
Acknowledgement Stock inventory/
Sh
of updated payment updates
payments
Accounts
Eight from:
Made up of pixels
Each pixel is represented by bits
1 to 64 bits per pixel
Number of pixels depending on colour depth
Bits representing pixels packed in rows for bmp
Rows rounded to 32 bit words
Padding needed for loading into memory locations
Usually stored from bottom left up to top right of image.
7 Six from: 6
8 Six from: 6
Desktop/single-user/personal:
Suitable for smaller projects
Only one person can use the PMS at any one time
Collaborative:
Allows multiple uses to edit sections of the project
Changes reflected to other users
Some areas may be read-only/unavailable when others are working on them
Visual:
Allows information to be filtered and presented in easier to understand
manner to avoid information overload
Used for fluctuating data
Details not instantly available.
11 Eight from: 8
12 Eight from: 8
Published
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.
Cambridge International will not enter into discussions about these mark schemes.
Cambridge International is publishing the mark schemes for the May/June 2018 series for most
Cambridge IGCSE™, Cambridge International A and AS Level and Cambridge Pre-U components, and
some Cambridge O Level components.
These general marking principles must be applied by all examiners when marking candidate answers.
They should be applied alongside the specific content of the mark scheme or generic level descriptors
for a question. Each question paper and mark scheme will also comply with these marking principles.
• the specific content of the mark scheme or the generic level descriptors for the question
• the specific skills defined in the mark scheme or in the generic level descriptors for the question
• the standard of response required by a candidate as exemplified by the standardisation scripts.
Marks awarded are always whole marks (not half marks, or other fractions).
• marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit
is given for valid answers which go beyond the scope of the syllabus and mark scheme,
referring to your Team Leader as appropriate
• marks are awarded when candidates clearly demonstrate what they know and can do
• marks are not deducted for errors
• marks are not deducted for omissions
• answers should only be judged on the quality of spelling, punctuation and grammar when these
features are specifically assessed by the question as indicated by the mark scheme. The
meaning, however, should be unambiguous.
Rules must be applied consistently e.g. in situations where candidates have not followed
instructions or in the application of generic level descriptors.
Marks should be awarded using the full range of marks defined in the mark scheme for the question
(however; the use of the full mark range may be limited according to the quality of the candidate
responses seen).
Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should
not be awarded with grade thresholds or grade descriptors in mind.
Can use ctrl key and other keys to save, print, copy and paste text, find and
replace text
Can use arrow keys, home, end, page up and page down to navigate through
text
Can use tab key to indent, delete key to delete forwards, backspace to delete
backwards
Can use the alphabetic keys to enter the text of the book.
4 Six from: 6
The global digital divide is the different levels of access of countries to modern
information and communications technology
Less industrially developed nations cannot afford to invest as much in
technology as more well developed countries
It does not necessarily mean that a nation does not have technology just a
difference in the type of technology
This technology can include the telephone, television, personal computers and
the internet
Not all countries are able to keep up with the constant changes in technology
There is a large inequality worldwide in terms of the distribution of installed
telecommunication bandwidth/some countries may not have a well-developed
broadband infrastructure/rely on dialup connections
The majority of the globally installed bandwidth is spread among a tiny number
of countries
Some countries may have lower-performance computers
Some may have difficulty in obtaining technical assistance.
5 Six from: 6
6 Six from: 6
7 Six from: 6
Click the Name box at the left end of the formula bar 1
Or
On the Formulas tab, in the Defined Names group, click Define Name 1
8(b) =B11-HLOOKUP(D11,Allowance,2,0) 4
B11- 1 mark
HLOOKUP(D11,) 1 mark
Allowance, 1 mark
2, 0 1 mark
The number of bits used to carry the data in each samples of sound usually, 8
or 16 bits
Decreasing sound sample resolution results in lower quality
It can reduce file size and save storage space.
Cuts part of the sound out reducing the length of the track
Reduces file size
Enables unwanted sounds to be removed.
10(c) Insert rows, above the data exported, for the Lookup table 1
In the cell adjacent/to the left of the group size type in the 1
VLOOKUP/HLOOKUP formula
Level 0 (0 marks)
Response with no valid content.
12 Eight from: 8
Benefits
It is relatively easy to communicate with anybody locally or anywhere in the
world regardless of where they are
You can respond to friends quickly
Messages can be received quickly
The cost of sending messages by email/social networking/ instant messaging
is very low unlike postage or normal phone calls
The cost of using VOIP is very low unlike postage or normal phone calls
An email can be sent to many people at the same time
Using internet to send messages saves time as do not have to spend time
visiting/being on the phone to somebody
Emails can be responded to when it is convenient
Drawbacks
Students can spend too much time on social network sites rather than studying
Spam emails can be received which use up storage space
Phishing emails can trap you into giving out personal information
Viruses can be sent by email
With email/messaging is sometimes difficult to clarify what is meant unlike a
normal phone call
Not everyone has an internet connection
Email/messaging – confidential information can be easily forwarded and if done
in error could easily end up in the wrong hands.
Published
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.
Cambridge International will not enter into discussions about these mark schemes.
Cambridge International is publishing the mark schemes for the May/June 2018 series for most
Cambridge IGCSE™, Cambridge International A and AS Level and Cambridge Pre-U components, and
some Cambridge O Level components.
These general marking principles must be applied by all examiners when marking candidate answers.
They should be applied alongside the specific content of the mark scheme or generic level descriptors
for a question. Each question paper and mark scheme will also comply with these marking principles.
• the specific content of the mark scheme or the generic level descriptors for the question
• the specific skills defined in the mark scheme or in the generic level descriptors for the question
• the standard of response required by a candidate as exemplified by the standardisation scripts.
Marks awarded are always whole marks (not half marks, or other fractions).
• marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit
is given for valid answers which go beyond the scope of the syllabus and mark scheme,
referring to your Team Leader as appropriate
• marks are awarded when candidates clearly demonstrate what they know and can do
• marks are not deducted for errors
• marks are not deducted for omissions
• answers should only be judged on the quality of spelling, punctuation and grammar when these
features are specifically assessed by the question as indicated by the mark scheme. The
meaning, however, should be unambiguous.
Rules must be applied consistently e.g. in situations where candidates have not followed
instructions or in the application of generic level descriptors.
Marks should be awarded using the full range of marks defined in the mark scheme for the question
(however; the use of the full mark range may be limited according to the quality of the candidate
responses seen).
Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should
not be awarded with grade thresholds or grade descriptors in mind.
1 4
Dynamic data is data that does not change.
Data that is read from and not written back to a file is called static
3
data.
2 4
Compilers and linkers are examples of system software. 3
3 Six from: 6
Verification is checking that data that has been/is being entered into a
computer has been copied correctly from the data source
Validation is checking that the data entered is reasonable/sensible
Neither method checks that data is accurate/correct
Although verification helps to stop users from making mistakes when
entering data it cannot check that the data was originally correct
Validation is needed because although the data might be copied correctly,
the original data might be invalid
The date of birth might be in the form dd/mm/yyyy and the data might have
been correctly copied as 1994/12/31 but this is not in the correct format
a format check would have picked this up
Common errors when copying data are transcription and transposition errors
Verification would pick up a transposition error but most validation checks
(except a check digit) would not
Verification would pick up transcription errors but validation might not.
Scans the computer to make sure it is not infected with a virus/to find
viruses
Compares with existing viruses/detects changes in behaviour of files
It may quarantine the infected programs
It will ask the user whether or not they want to delete the infected programs
(Does background scans of downloads and attachments for viruses) and
informs the user if anything found.
Induction loop
When a vehicle goes over it sends a signal to the computer that a vehicle
has passed
Sound sensor
In kerb stones constantly feeding back to computer sound level – if noise
above preset value computer registers that a vehicle has passed
(Video/Digital) camera
Above traffic lights and registers car approaching and sends a signal to the
computer
Push buttons
When a pedestrian presses the button, a signal goes to computer to register
pedestrian is waiting to cross.
6 Six from: 6
Three from:
Three from:
9 Six from: 6
A rules base
b is a set of rules whhich an infe
erence engine uses
The inferrence engin ne uses the data or factts in the kno owledge baase, to
reason thhrough the symptoms
s
Inferencee engine is able to find possible diiagnoses by y using a foorm of
reasoning
The reassoning involv ves forward d chaining, backward chaining
c or a
combinattion of both
User inte
erface asks questions ((about illnes ss)
Patient/d
doctor type in i answers//types in sym mptoms to the
t user inte terface
Inferencee engine compares sym mptoms to those
t in the
e knowledgee base
Inferencee engine uses the ruless base of IF F THEN rules/compparisons/
rules basse consists of IF THE EN rules
Knowledge base editor enabless the knowle edge engineer to edit rrules/and
facts (witthin the knoowledge basse)
Description of forwa ard chaining g
Description of backw ward chainin ng
Possible//suggested diagnoses are output to user inte erface
Explanattion system produces rreasons for suggestions
Reasonss for sugges stions outpu ut using the user interfa
ace.
10(a) Title 4
Cu
ustomers se
econd name
es beginning
g with queryy
Priice of car qu
uery
ustomers forrm
Cu
Customers second names beginning with query – allow you to enter one
letter and all names beginning with that letter displayed
Price of car query – allow you to enter a price/range of prices and all
cars of that price/range will be displayed
Customers form – opens a form showing customer details/allows you
to edit data/add new customer record using form entry
All cars in stock report – will give you a printout/display in report form
of all cars in the showroom
Price less than $20 000 report – will give you a printout/display in
report form of all cars lower than $20 000 in price
Exit button – will close the switchboard/application.
Select create
Select query design
Add all tables into query design window
In first column of query select from Cars table (from drop down list)
and choose Make (from drop down list)
In second column select Cars table (from drop down list) and choose
Model (from drop down list)
In next column select Customers table (from drop down list) and
choose first name (from drop down list)
In fourth column select Customers table (from drop down list) and
choose second name from (drop down list)
In next column select Orders table (from drop down list) and choose
Order_No (from drop down list)
In first column next to criteria type in (Like) Frod
In fourth column in the Or row
In the 4th column type in (Like) B*
Save the query.
Level 0 (0 marks)
Response with no valid content.
Employer benefits:
Employers can keep track of the amount of time an employee spends away
from the computer or idle time at the terminal
Video monitoring can deter theft thus maintaining security
Video monitoring can monitor employee productivity/work is up to
standard/employees are working efficiently
Provides an opportunity to watch for mistakes and errors throughout the
workday to help an employee cut down on his mistakes in the future by
pointing out ways he can improve
Use Global Positioning Systems (GPS) devices to track employees in
employer-owned vehicles
If employees understand that the monitoring system is not being used solely
to point out weaknesses, they may become more accepting of being
monitored
Can have video monitoring to catch all safety issues and so able to bring
safety issues to the forefront
Catching blatant disregard for safety on video may also save employer from
potential lawsuits
Can catch those who willingly violate company policy and immediately
employ disciplinary action
Can increase productivity if employees know they are being monitored
Software can also be used to monitor or track employee activity and
productivity...
...ensuring data is secure by using the software to block certain websites
With a GPS device, dispatchers can give drivers very specific driving
directions to a location saving time and money for fuel
If dispatchers know where every van is they can dispatch the one closest to
a particular job
By tracking which drivers are exceeding the speed limit companies can
educate those drivers about the result of speeding, and discipline them as
necessary
Vehicle fleet managers can also improve efficiency by tracking and
eliminating employees’ unauthorised breaks
11 Employer drawbacks:
Employee benefits:
Employee drawbacks:
12 Eight from: 8
Benefits:
Drawbacks:
Write your Centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.
At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.
DC (SC/SW) 149844/3
© UCLES 2018 [Turn over
2
1 Tick the four most accurate statements regarding knowledge, data and information.
TLS and SSL are protocols that provide security of communication in a network.
3 Indira is the manager of a holiday booking company. She is in the process of updating the
company’s database of holidays. She has a file newholidays.csv which she wants to import to
the database as a new table.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..................................................................................................................................................... [8]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [3]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [3]
5 Describe, in detail, four health issues that can arise from the use of IT. For each issue give one
method of preventing it. Each prevention must be different.
Issue 1 ..............................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
Prevention ........................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
Issue 2 ..............................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
Prevention ........................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
Issue 3 ..............................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
Prevention ........................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
Issue 4 ..............................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
Prevention ........................................................................................................................................
..........................................................................................................................................................
..................................................................................................................................................... [8]
6 Jasvir works in a town in the south of India. He uses email to stay in contact with his parents who
live in the north.
Apart from email and video conferencing, describe four other ways he could use the internet to
communicate with his parents, giving a different drawback for each method.
Way 1 ...............................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
Drawback .........................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
Way 2 ...............................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
Drawback .........................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
Way 3 ...............................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
Drawback .........................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
Way 4 ...............................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
Drawback .........................................................................................................................................
..........................................................................................................................................................
..................................................................................................................................................... [8]
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..................................................................................................................................................... [6]
8 Jagwant has typed data into a spreadsheet. Part of the spreadsheet is shown below.
For each column, explain in detail why the data is not fully visible, and describe the most efficient
way he could use to make all the data fully visible by only using the mouse.
C1 ⁝ ✘ fx 4.678932156
A B C D
1 ########### joseph j 4.678932
2 ########### william 5.986433
3 ########### jasvinder7.325689
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..................................................................................................................................................... [6]
9 Farzana was given a problem to solve by her maths teacher – ‘Add two integers 15 and 16 and
then multiply the answer by 454.’ She has worked out the answer but now wishes to check her
answer by using the spreadsheet below.
A B C D E F G H
1
2 15 16 45 4 127119375
3
Write down the formula she would have used in cell G2 to produce her answer.
= .................................................................................................................................................. [2]
You can use the space below for any working out.
10 A clothing manufacturer uses codes to store information about its clothes. For example, a pair of
blue trousers with a waist of 80 cm and a leg length of 77 cm could be coded as BT8077.
Explain what each part of the code GT8878 could mean and why there may be problems with
coding other items of clothing in this way. Include in your explanation ways of improving this
method.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..................................................................................................................................................... [6]
Evaluate the use of spreadsheet and database software to store this data using examples related
to payroll for your argument.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..................................................................................................................................................... [8]
12 Below are two tables from a college database. A relationship links the two tables.
Students
Courses
Coursecode Course_Title
P301 Physics
E402 English
B115 Biology
M301 Maths
(a) Explain which fields would be set for primary keys, a compound key and a foreign key, giving
reasons for each choice.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [6]
Write down the steps you would need to take to produce this list using the Students table
only. You may assume the database is already open.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [6]
13 Sachin has typed in three dates in column A in the spreadsheet shown below. He has used the
formula =TEXT(A1,"dd mmmm yyyy") in C1 and replicated it down. He has used another formula
in column E to extract the name of the month from C1.
Write down the formula he used in E1 which he then replicated down to E3 to extract the months
shown.
A B C D E
1 03/11/2017 03 November 2017 November
2 26/09/2017 26 September 2017 September
3 03/06/2017 03 June 2017 June
4
= .................................................................................................................................................. [4]
You can use the space below for any working out.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..................................................................................................................................................... [8]
BLANK PAGE
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.
Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.
Write your Centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.
At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.
DC (KN/SW) 152617/3
© UCLES 2018 [Turn over
2
Explain the characteristics of bitmap images that make them suitable for use on web pages that
advertise items for sale.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[4]
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[8]
3 Fig. 1 shows a diagram of interconnected computer networks that use internet protocol (IP) to
communicate. A file is being sent as six data packets from network A to network H. Nodes B to G
are routers used to connect the networks.
Key
1 router
C E
network
1
1 packet
3
4 4
6 5 3 3 2 4 1
A B G H
4
2 2
3
D F
3 2
Fig. 1
(a) Explain why the packets arriving at network H are in a different order from when they were
sent by network A.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
(b) Explain the role of the routers B to G in sending the packets from network A to network H.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[5]
4 A building project has a number of activities, F, G, H, I, J and K, that need to be carried out
between the stages A, B, C, D and E. Fig. 2 shows a Project Evaluation and Review Technique
(PERT) chart for the building project.
F
nths I 2 months
3m K
4 mo on
ths
A J
D E
3 months
5m G
on H
th s
s onth
3m
B
Fig. 2
(a) The building project has a series of milestones to help the managers monitor the progress of
the project.
...................................................................................................................................................
...............................................................................................................................................[1]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
(c) On the grid below, draw and label the Gantt chart from which the PERT chart in Fig. 2 would
have been derived.
[5]
5 A global company has many managers in cities around the world. A mail merge document is being
created to invite each manager to a training event.
The section of the data source file storing the managers’ details for the mail merge is:
First Family
Invite? Title Address1 Address2 City Country Postcode
Name Name
The 12a Bury
Yes Mr Harold Johnson Manchester UK M3 4EN
Beeches St
El Gezira
Yes Mr Ahmed Molokya Dokki Cairo Egypt 12311
St
PO Box Sunshine New
Yes Ms Rowena Cobb Auckland 1010
27 Drive Zealand
Yes Mr Vihann Sardana 1257 SM Mandir Mumbai India 400083
4 The
No Mr Sam Wick Attwood Hume Australia 3000
Avenue
South
Yes Mrs Rethebile Pillay 127 Farnworth Cape Town 7760
Africa
15 Stirling Melbourne
Yes Miss Charlene Foster Melbourne Australia 3205
Highway Terrace
64 Cherry
No Mr Daniel Cross Hinton Cambridge UK CB1 4EF
Rd
Managers in the UK and Egypt will be invited to the event in London while all others will be invited
to the event in Hong Kong. Managers who are not being invited are marked as ‘No’ in the source
file.
A first draft of the mail merge template for the letter is shown here:
The company is holding a training event for you on 1 July 2019 in <<City>> and you
are invited to attend.
All expenses for travel from your home city of <<City>> and accommodation at the
meeting will be paid by the company.
Yours sincerely
Managing Director
(a) Explain how the mail merge may be set up to create letters only to those who are invited.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[4]
(b) Explain how the mail merge template, shown on page 8, must be altered to ensure that the
managers who receive an invitation are asked to the correct event.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[8]
6 Drivers who are 16 years of age or older can apply for a driving licence online.
The government web page code requires applicants to enter their age and then checks if they are
old enough to apply.
The following code captures the applicant’s age. When the applicant clicks the ‘Check now’ button
the age is first checked to ensure that it is numeric. The age is then checked to see if the applicant
is old enough. Suitable messages are displayed as a result of the checks.
Complete the code for the function CheckAgeFunction that checks the age entered by the
applicant and displays an appropriate response.
<html>
<body>
<p>You can apply for a licence to drive when you are 16 years old.</p>
<p>To check if you are old enough to drive, input your age and click
the button:</p>
<input id="AgeNow" value="16" />
<button onclick="CheckAgeFunction()">Check now</button>
<p id="AgeCheck"></p>
<script>
function CheckAgeFunction() {
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[8]
}
document.getElementById("AgeCheck").innerHTML = CanApply;
}
</script>
</body></html>
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[8]
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[4]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
(b) Email is used to send and retrieve messages between email clients and email servers. One
network protocol in common use for email access is Internet Message Access Protocol
(IMAP).
Describe the features of IMAP that make it suitable for email access on smartphones.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[8]
10 Evaluate the use of asymmetric-key and symmetric-key cryptography when encrypting data for
electronic transmission between two people.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[8]
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[5]
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[8]
BLANK PAGE
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.
Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.
Published
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.
Cambridge International will not enter into discussions about these mark schemes.
Cambridge International is publishing the mark schemes for the March 2018 series for most
Cambridge IGCSE®, Cambridge International A and AS Level components and some Cambridge O Level
components.
These general marking principles must be applied by all examiners when marking candidate answers.
They should be applied alongside the specific content of the mark scheme or generic level descriptors
for a question. Each question paper and mark scheme will also comply with these marking principles.
• the specific content of the mark scheme or the generic level descriptors for the question
• the specific skills defined in the mark scheme or in the generic level descriptors for the question
• the standard of response required by a candidate as exemplified by the standardisation scripts.
Marks awarded are always whole marks (not half marks, or other fractions).
• marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit
is given for valid answers which go beyond the scope of the syllabus and mark scheme,
referring to your Team Leader as appropriate
• marks are awarded when candidates clearly demonstrate what they know and can do
• marks are not deducted for errors
• marks are not deducted for omissions
• answers should only be judged on the quality of spelling, punctuation and grammar when these
features are specifically assessed by the question as indicated by the mark scheme. The
meaning, however, should be unambiguous.
Rules must be applied consistently e.g. in situations where candidates have not followed
instructions or in the application of generic level descriptors.
Marks should be awarded using the full range of marks defined in the mark scheme for the question
(however; the use of the full mark range may be limited according to the quality of the candidate
responses seen).
Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should
not be awarded with grade thresholds or grade descriptors in mind.
3 Eight from: 8
Lower back pain caused by sitting in same position for long periods
Use ergonomic furniture/ sit up straight/use a back support/foot rests.
Chat rooms – Jasvir could meet his parents in a chat room and chat to them
by typing a message
Parents might not be skilled chatters and not know how to keep
conversation private/other people apart from parents may be able to enter
room thereby losing privacy.
7 Six from: 6
8 Six from: 6
Solution:
Click on top left corner to highlight all cells
10 Six from: 6
11 Eight from: 8
13 =MID(C1,4,LEN(C1)-8) 4
MID(C1,) 1 mark
4, 1 mark
LEN(C1) 1 mark
-8 1 mark
Level 0 (0 marks)
Response with no valid content.
A single magnetic tape stores more data than a single optical disk
so more appropriate for server backups
Single tapes cost more than a single optical disk
so unlikely to be used by students to back up their work
Tapes cost less per unit memory
so more cost effective for large companies storing lots of data
Optical disks are not quite as portable as a tape
particularly where a large amount of data is stored requiring more disks
Both last longer than the technology that reads them however
Tape is corrupted if placed near to a magnetic field
Optical disks have faster data access times
so more suitable for non-backup purposes
Magnetic tape is less susceptible to damage than optical discs during
handling
as it is completely encased
Optical disks are more viable where there are large variations of
temperature.
Published
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.
Cambridge International will not enter into discussions about these mark schemes.
Cambridge International is publishing the mark schemes for the March 2018 series for most
Cambridge IGCSE®, Cambridge International A and AS Level components and some Cambridge O Level
components.
These general marking principles must be applied by all examiners when marking candidate answers.
They should be applied alongside the specific content of the mark scheme or generic level descriptors
for a question. Each question paper and mark scheme will also comply with these marking principles.
• the specific content of the mark scheme or the generic level descriptors for the question
• the specific skills defined in the mark scheme or in the generic level descriptors for the question
• the standard of response required by a candidate as exemplified by the standardisation scripts.
Marks awarded are always whole marks (not half marks, or other fractions).
• marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit
is given for valid answers which go beyond the scope of the syllabus and mark scheme,
referring to your Team Leader as appropriate
• marks are awarded when candidates clearly demonstrate what they know and can do
• marks are not deducted for errors
• marks are not deducted for omissions
• answers should only be judged on the quality of spelling, punctuation and grammar when these
features are specifically assessed by the question as indicated by the mark scheme. The
meaning, however, should be unambiguous.
Rules must be applied consistently e.g. in situations where candidates have not followed
instructions or in the application of generic level descriptors.
Marks should be awarded using the full range of marks defined in the mark scheme for the question
(however; the use of the full mark range may be limited according to the quality of the candidate
responses seen).
Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should
not be awarded with grade thresholds or grade descriptors in mind.
1 Four from: 4
2 Eight from: 8
A and C
Max 2 from:
Activities on Y axis and labelled
Time on X axis and labelled
Milestones identified
OR
6 Eight from: 8
Appropriate display messages: e.g. "You are too young to apply for a
licence.": "You are old enough to apply for a licence.";
8 Four from: 4
User/client may decide that the early version is all that is needed
Developers can focus on developing parts of the system that they
understand
Instead of developing a whole system which might be beyond their
comprehension
Improvements/alterations/add-ons to the system can be created later
First prototype is not discarded so materials/time are not wasted
Throw-away prototypes may not work at all/be on paper only
Can be used in interim until final system is complete.
symmetric-key cryptography:
Advantages:
shares the same/related key with sender and receiver...
...process is relatively fast
...used on solid state drives to encrypt/decrypt data as it is written/read
to/from disk.
Disadvantages:
...keys must be kept secret from others
...sharing keys between sender/ recipient is a security issue
...if key is compromised both sender and recipient are at risk.
Advantages:
uses different keys to encrypt and decrypt
...public key is known to all, but private key is known only to recipient
...only private key must be kept secret
«anyone can use public key to encrypt
...only recipient can decrypt
...keys are not shared
...so is very secure
...if private key compromised, only senders data is at risk as any other data
sent to others is encrypted with a different public key.
Disadvantages:
...process is relatively slow...
...so not suitable for e.g. hard disk encryption on-the-fly.
11 Five from: 5
12 Eight from: 8
Write your Centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.
At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.
DC (SC/SC) 153473/3
© UCLES 2018 [Turn over
2
1 Tick the four most accurate statements regarding validation and verification.
Validation is the process of checking that the data entered into a system is the same as
the source data.
Visual verification is a type of verification.
A range check is the best check to make sure transposition has not occurred when typing
in a bar code.
Visual validation is a type of validation.
A type check will prevent a letter of the alphabet being typed into a numeric field.
[4]
2 Tick the four most accurate statements regarding input and output.
Input devices allow the user to communicate with the computer’s operating system.
3 One of the dangers of accessing the internet is the increased risk of malware attacks.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
Worm ................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
Spyware ...........................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
Adware .............................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..................................................................................................................................................... [8]
4 (a) Describe the advantages of using a web authoring package to create a web page rather than
writing HTML code.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [3]
(b) Describe the disadvantages of using a web authoring package to create a web page rather
than writing HTML code.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [3]
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..................................................................................................................................................... [4]
1 .......................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
2 .......................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
3 .......................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
4 .......................................................................................................................................................
..........................................................................................................................................................
..................................................................................................................................................... [4]
7 There are a number of communication technologies and their associated networks used for
transmitting data.
Describe the following types including their suitability, with reasons, for use in a video-conference.
(a) ADSL
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [3]
(b) SDSL
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [3]
(c) ISDN
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [3]
8 A secretary has been given a list of product details. She was asked to type the details into a
spreadsheet. Unfortunately, when she typed them in, wrong data was entered into cells A7, A10,
A16 and B10.
(a) Describe four validation checks which could have prevented these errors from occurring,
including a description of how they would have prevented the errors.
1 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
3 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
4 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[8]
(b) The secretary’s manager typed a formula into cell D2 to calculate the price of the product
which is given at the beginning of each Product number.
Write down the formula which he would have entered in cell D2 and describe how the Price
was formatted so that it would appear as it does in the spreadsheet.
= ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [4]
9 People who are employed to develop software often refer to the need for a detailed data dictionary.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..................................................................................................................................................... [5]
BLANK PAGE
10 A company provides cars for several leasing organisations in districts of London, in the UK, such
as Enfield or Lewisham.
Agents buy cars from a number of showrooms.
The company buys a car from an agent before then providing it for lease.
• each car
• which agent bought each car
• which showroom it came from.
An example of a database for this company in unnormalised (0NF) form is shown below.
(a) Convert this database to third normalised form by completing the field names for each table
provided.
You are not required to enter any data into the tables.
Cars
Agents
Showrooms
[10]
(b) Complete the relationship diagram below by completing the tables and showing the types of
relationships between them.
In the top cell write the name of the table and write the field names underneath.
Indicate the primary key (pk) for each table and any foreign keys (fk).
[8]
Evaluate the use of RAM, ROM and hard disks for this purpose.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..................................................................................................................................................... [8]
12 A company is planning a new computer network and is faced with choosing between a peer-to-peer
and a client-server network.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..................................................................................................................................................... [8]
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.
Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.
Write your Centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.
At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.
DC (KN/SW) 150105/4
© UCLES 2018 [Turn over
2
1 Tick the four most accurate statements regarding peer-to-peer and client-server networks.
The server will determine which users can access the files on a client-server network.
In a client-server network each client functions both as a client and as a server
simultaneously.
If one computer crashes it has no effect on the other users in a client-server network.
2 Tick the four statements which are true regarding user interfaces.
A gesture based interface allows users to point with their fingers as a method of input.
3 There are many types of data storage device including hard disk drives, solid state drives, optical
drives and magnetic tape drives.
Describe the purpose of these storage devices and how they store data.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[8]
Explain why different groups of individuals do not have a broadband connection and what can be
done to improve this situation.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[6]
1 .......................................................................................................................................................
..........................................................................................................................................................
2 .......................................................................................................................................................
..........................................................................................................................................................
3 .......................................................................................................................................................
..........................................................................................................................................................
4 .......................................................................................................................................................
......................................................................................................................................................[4]
6 A head teacher wishes to computerise the marking of student exam papers. She is investigating
systems that use optical mark recognition (OMR).
(a) Give three advantages of using an OMR system compared to marking papers manually.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
3 ................................................................................................................................................
...............................................................................................................................................[3]
(b) Give three disadvantages of using an OMR system compared to marking papers manually.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
3 ................................................................................................................................................
...............................................................................................................................................[3]
7 Describe, in detail, three different safety (apart from e-safety) issues that can arise from the use of
IT. For each issue give one method of helping to prevent it. Each method must be different.
Issue 1 ..............................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
Prevention ........................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
Issue 2 ..............................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
Prevention ........................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
Issue 3 ..............................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
Prevention ........................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[6]
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[6]
9 Schmidt and Partners own a chain of shoe shops. They pay their workers a weekly wage consisting
of a basic wage plus commission. Workers only get paid commission if they have made $500
worth of sales in that week.
The commission is paid at the rate of 10% of the amount of sales made over $500.
Below is a spreadsheet showing some of the workers and the wages they were paid in one week.
A B C D E F G
1 Sales person Department Value of sales Basic wage Commission Total wage
2
3 Li Chung Childrens $550 $50 $5 $55
4 Graham Phillips Adults $450 $60 $60
5 Karl Gustaph Childrens $700 $55 $20 $75
6 Paula Meldrew Childrens $850 $60 $35 $95
7 Shen Bin Adults $1,000 $55 $50 $105
8 Ram Babu Childrens $350 $45 $45
9 Joan Adams Childrens $780 $55 $28 $83
10 Hu Zheng Adults $620 $65 $12 $77
11 Louis Raphael Adults $420 $45 $45
12 Ambrin Satem Childrens $900 $50 $40 $90
13 Tong Mu Adults $940 $60 $44 $104
14 Malcolm Novak Adults $870 $70 $37 $107
15
16 $131
17
Fig. 1
(a) Write down the formula which should go in cell E4 which is easily replicable. It should calculate
the commission earned but leave the cell blank if no commission is earned.
= ................................................................................................................................................
...............................................................................................................................................[5]
You can use the space below for any working you need.
(b) The shop manager wants to know the total commission the shop is paying to those workers in
the Adults department who sold over $800 worth of shoes.
= ................................................................................................................................................
...............................................................................................................................................[7]
You can use the space below for any working you need.
(c) The manager wishes to know the number of workers who did not earn any commission.
Write down the formula he would enter into cell E18 to obtain this value. The formula must
work even if the data in the spreadsheet changes in the future.
= ................................................................................................................................................
...............................................................................................................................................[2]
(d) When the manager was originally given the spreadsheet by the IT technician it looked as
shown in Fig. 2 below:
A B C D E F G H
1 Sales person
DepartmentValue of Basic Wag Commission Total wage
2
3 Li Chung Childrens 550.00 50.00 5.00 55.00
4 Graham Phillips
Adults 450.00 60.00 60.00
5 Karl Gustaph
Childrens 700.00 55.00 20.00 75.00
6 Paula Meldrew
Childrens 850.00 60.00 35.00 95.00
7 Shen Bin Adults 1000.00 55.00 50.00 105.00
8 Ram BabuChildrens 350.00 45.00 45.00
9 Joan AdamsChildrens 780.00 55.00 28.00 83.00
10 Hu Zheng Adults 620.00 65.00 12.00 77.00
11 Louis Raphael
Adults 420.00 45.00 45.00
12 Ambrin Satem
Childrens 900.00 50.00 40.00 90.00
13 Tong Mu Adults 940.00 60.00 44.00 104.00
14 Malcolm Novak
Adults 870.00 70.00 37.00 107.00
15
16 131.00
Fig. 2
Explain, in detail, the features of spreadsheet software he had to use to change its appearance
as shown in Fig. 2 to that shown in Fig. 1 (page 8), using the shortest number of steps. The
larger column widths became 20 points wide and the narrower one (column F) 12 points.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[5]
To find all Eagle models the search conditions would be Model = “Eagle”.
(a) Using only Boolean operands, comparison operators and wild cards, write down the most
efficient search conditions which would produce lists of:
...........................................................................................................................................
.......................................................................................................................................[2]
...........................................................................................................................................
.......................................................................................................................................[2]
...........................................................................................................................................
.......................................................................................................................................[3]
(b) Describe how the database has been sorted to produce the one shown.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
(c) Identify, giving reasons, the key field in the database. Give reasons why the other fields are
not suitable.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
11 Normalisation is often used when converting a set of data into a meaningful database.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[8]
12 Encoding of data can be thought of as applying a code such as letters, symbols and numbers
to data for conversion into a cipher. It can also be thought of as a form of analogue to digital
conversion such as used by codec software. At times it is the term applied to the coding of data.
Evaluate the need for encoding data and analyse the different methods that can be used to encode
data.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[8]
BLANK PAGE
BLANK PAGE
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.
Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.
Write your Centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.
At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.
DC (LK/CT) 152975/2
© UCLES 2018 [Turn over
2
1 Credit card accounts are often required for payment when buying goods online.
(a) Describe how the use of a credit card for online purchases may subject credit card account
holders to fraud.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[8]
(b) Explain how a merchant selling goods online can attempt to combat credit card fraud.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[5]
2 Some text is being written for use as a title in a slideshow presentation. The text is to be zoomed
in and out as the titles are displayed in different sizes on the slides.
The sample letter in Fig. 1 has been created as a bitmap graphic while the sample letter in Fig. 2
B
has been created as a vector graphic.
B B
Fig. 1 Fig. 2
Explain, in detail, why letters created as in Fig. 2 are more suitable for use in the slideshow than
those created as in Fig. 1.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[6]
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[8]
4 Fig. 3 shows a diagram of interconnected computer networks that use internet protocol (IP) and
packet switching to communicate. A large file is sent from network A to network H. Nodes B to G
are routers used to connect the networks. During the sending of the file from network A, network I
also starts to send a much larger video file to network H.
C E
A B G H
File from I being
received at H
File sent
from I
I
D F
Fig. 3
(a) Explain, in detail with reference to the diagram, how the file from network A and the file from
network I travel through the network from router to router and start to arrive at network H at
the same time.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[6]
(b) Explain why router C does not always send the packets to router D.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[6]
5 Quintin is a programmer who writes code in HTML and JavaScript for use in online forms. The
code is developed and ‘white-box’ tested before being used.
Quintin is developing the code below. He has added comments to the code. The code asks a user
to input two numbers and adds the numbers together. It also displays the total and whether or not
it is greater than 10.
<html>
<body>
<!-- the next six lines collect the two numbers to be added-->
<script>
function myaddfunction() {
//the next line assigns the first number input to the variable y
var y = document.getElementById("nm1").value;
//the next line assigns the second number input to the variable z
var z = document.getElementById("nm2").value;
//the next line adds the two numbers and assigns the result to the variable x
var x = +y + +z;
//the next line checks if x is greater or not greater than 10 and reports
accordingly
var A = (x >10) ? x+ " is greater than 10":x+ " is not greater
than 10";
//the next line prints the results onto the page
document.getElementById("add").innerHTML = A ;
}
</script>
<!-- the next two lines asks the user to click the button and then the script
is executed
<p>Click the button to calculate the total.</p>
<button onclick="myaddfunction()">Add the numbers</button>
<br/>
</body>
</html>
(a) Explain how Quintin could use ‘white box’ testing to ensure that the JavaScript code produces
the correct result every time.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[8]
(b) Explain why it is good practice that Quintin places his JavaScript code in external files rather
than embeds the code in the actual page code.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[6]
6 Describe how quantum cryptography can help to ensure that data is kept secure when being
transferred electronically between users.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[6]
7 The table shows part of a database used to control the level of stock items in a clothing store.
Reordering is done when the number left in stock reaches or falls below the minimum level allowed
by the store management.
A customer purchases two pairs of walking boots, three pairs of socks and a scarf. The items each
have a barcode and are scanned at the checkout when purchased.
Describe, in detail, the processes that would occur when the purchases have been made to ensure
that the appropriate new orders are placed to maintain the stock levels.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[8]
8 Evaluate the use of the infra-red method of data transmission in wireless communications.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[8]
9 A software development company uses throw away prototyping to develop parts of a new system.
(a) Give one reason why the company would use throw away prototyping.
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[1]
(b) Describe two drawbacks to the company of using throw away prototyping.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
10 Analyse the suitability of using pilot implementation to install and use WiFi internet access for
guests in a chain of hotels.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[6]
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[6]
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.
Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.
Write your Centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.
At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.
DC (LK/CT) 152976/3
© UCLES 2018 [Turn over
2
1 The photograph shown in Fig. 1 was taken and manipulated into the JPEG image shown in Fig. 2.
Fig. 1 Fig. 2
(a) Describe all the software features used to change the image in Fig. 1 to produce the image in
Fig. 2.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................... [2]
(b) Explain why the features of the face in Fig. 2 are no longer easy to see.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[6]
2 An office area has an air conditioning system. The user guide for the system contains a
troubleshooting flowchart that users can follow if the air conditioning is not working properly. The
flowchart is shown in Fig. 3.
START
No No
Use REMOTE to Is REMOTE Are Batteries Insert
turn on power working? installed? Batteries
Is the Air
No Yes
Conditioning
working
properly?
Check the Power No Is the Power
Supply is Supply
connected to connected?
power outlet No Is the Air Yes Clear the
Intake Air Intake
Yes blocked?
No
No Is the Power
Check the Power
Supply is Supply switched
switched on on?
Yes Clean the
Is the Air
Air Filter
Yes Filter dirty?
Yes
Reset Circuit Is there a
Breaker Circuit Breaker No
blown?
Yes Is the No
Are there any Set the
No Temperature
heaters on in Temperature
set correctly?
the room? correctly
No Is the Yes
Reset Timer Call Service Engineer to
Timer set No
correctly correct fault with Air
correctly?
Conditioning
STOP
Fig. 3
Using the information in the flowchart, redesign the troubleshooting guide by completing the table
below with statements of instructions so that it is more easily understood. Some sets of instructions
have been done for you.
[8]
3 Evaluate the use of Bluetooth® wireless technology for communication between devices.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[8]
4 Industrial robots are used to position and fit a windscreen to a new car during a car assembly
process.
Describe ways in which the necessary positional and procedural data could be ‘taught’ to the robot
so that the windscreen is correctly fitted to the car.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[6]
5 JavaScript can be embedded in the code of web pages to add interactivity to a page.
Explain what is meant by the following terms when they are used in JavaScript:
(a) an array.
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[1]
(b) a variable.
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[1]
(c) a function.
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[1]
(d) a comment.
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[1]
(e) an object.
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[1]
(f) an expression.
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[1]
BLANK PAGE
6 A company selling goods online has a network which is configured to allow its web server, FTP
server and email server to be accessible from the internet. The company was concerned that
the network configuration exposed the whole LAN to security risks so has attempted to improve
security by altering the configuration from that in Fig. 4 to the configuration shown in Fig. 5.
Internet Internet
Fig. 4 Fig. 5
(a) Explain how the network configuration has been altered in order to maximise security of the
company file servers while still allowing access to the other services from the internet.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[6]
(b) Explain, using the information from Fig. 5, why the additional firewall provides more security
for the company network.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[4]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[6]
BLANK PAGE
8 A research and development (R&D) department of a company develops expensive goods. The
development process has to be kept secret. The biometrics of all staff of the company are to be
measured and used to restrict entry via the doors to the department.
A comparison of the suitability of various biometric methods that are available for use to identify
staff has been compiled and is shown in Fig. 6. Each aspect of the biometric method has been
rated High (H), Medium (M) or Low (L).
Biometric How How unique How How easy How How Performance
method universal is the permanent to collect acceptable resistant rating of the
used to amongst measurement is the at door to staff? is the biometric
identify a staff amongst staff measurement from method to method
member of members? members? to staff staff? circumvent
staff members? by staff?
Face H L M H H L L
Fingerprint M H H M M H H
Hand shape/ M M M H M M M
geometry
Veins in M M M H H H M
hand
Iris H H H H H H H
Retina H H M L L H H
Voice M L L M H L L
of staff
member
Facial H H L H H H H
thermogram
of staff
member
DNA of staff H H H L L H H
member
Fig. 6
Use the information in Fig. 6 to choose, with reasons, the biometric measurements that would be
most suitable for measurement at the door.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[8]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[6]
(b) Give two reasons why a student might not be able to use online tutorials.
1 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
Discuss the ways that social networking has changed social patterns.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[8]
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[6]
12 Analyse the use of project scheduling tools to organise a project to create a road bridge.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[6]
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.
Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.
Write your Centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.
At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.
DC (KS) 171572
© UCLES 2018 [Turn over
2
1 Tick the four most accurate statements regarding peer-to-peer and client-server networks.
The server will determine which users can access the files on a client-server network.
In a client-server network each client functions both as a client and as a server
simultaneously.
If one computer crashes it has no effect on the other users in a client-server network.
2 Tick the four statements which are true regarding user interfaces.
A gesture based interface allows users to point with their fingers as a method of input.
3 There are many types of data storage device including hard disk drives, solid state drives, optical
drives and magnetic tape drives.
Describe the purpose of these storage devices and how they store data.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[8]
Explain why different groups of individuals do not have a broadband connection and what can be
done to improve this situation.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[6]
1 .......................................................................................................................................................
..........................................................................................................................................................
2 .......................................................................................................................................................
..........................................................................................................................................................
3 .......................................................................................................................................................
..........................................................................................................................................................
4 .......................................................................................................................................................
......................................................................................................................................................[4]
6 A head teacher wishes to computerise the marking of student exam papers. She is investigating
systems that use optical mark recognition (OMR).
(a) Give three advantages of using an OMR system compared to marking papers manually.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
3 ................................................................................................................................................
...............................................................................................................................................[3]
(b) Give three disadvantages of using an OMR system compared to marking papers manually.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
3 ................................................................................................................................................
...............................................................................................................................................[3]
7 Describe, in detail, three different safety (apart from e-safety) issues that can arise from the use of
IT. For each issue give one method of helping to prevent it. Each method must be different.
Issue 1 ..............................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
Prevention ........................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
Issue 2 ..............................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
Prevention ........................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
Issue 3 ..............................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
Prevention ........................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[6]
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[6]
9 Schmidt and Partners own a chain of shoe shops. They pay their workers a weekly wage consisting
of a basic wage plus commission. Workers only get paid commission if they have made $500
worth of sales in that week.
The commission is paid at the rate of 10% of the amount of sales made over $500.
Below is a spreadsheet showing some of the workers and the wages they were paid in one week.
A B C D E F G
1 Sales person Department Value of sales Basic wage Commission Total wage
2
3 Li Chung Childrens $550 $50 $5 $55
4 Graham Phillips Adults $450 $60 $60
5 Karl Gustaph Childrens $700 $55 $20 $75
6 Paula Meldrew Childrens $850 $60 $35 $95
7 Shen Bin Adults $1,000 $55 $50 $105
8 Ram Babu Childrens $350 $45 $45
9 Joan Adams Childrens $780 $55 $28 $83
10 Hu Zheng Adults $620 $65 $12 $77
11 Louis Raphael Adults $420 $45 $45
12 Ambrin Satem Childrens $900 $50 $40 $90
13 Tong Mu Adults $940 $60 $44 $104
14 Malcolm Novak Adults $870 $70 $37 $107
15
16 $131
17
Fig. 1
(a) Write down the formula which should go in cell E4 which is easily replicable. It should calculate
the commission earned but leave the cell blank if no commission is earned.
= ................................................................................................................................................
...............................................................................................................................................[5]
You can use the space below for any working you need.
(b) The shop manager wants to know the total commission the shop is paying to those workers in
the Adults department who sold over $800 worth of shoes.
= ................................................................................................................................................
...............................................................................................................................................[7]
You can use the space below for any working you need.
(c) The manager wishes to know the number of workers who did not earn any commission.
Write down the formula he would enter into cell E18 to obtain this value. The formula must
work even if the data in the spreadsheet changes in the future.
= ................................................................................................................................................
...............................................................................................................................................[2]
(d) When the manager was originally given the spreadsheet by the IT technician it looked as
shown in Fig. 2 below:
A B C D E F G H
1 Sales person
DepartmentValue of Basic Wag Commission Total wage
2
3 Li Chung Childrens 550.00 50.00 5.00 55.00
4 Graham Phillips
Adults 450.00 60.00 60.00
5 Karl Gustaph
Childrens 700.00 55.00 20.00 75.00
6 Paula Meldrew
Childrens 850.00 60.00 35.00 95.00
7 Shen Bin Adults 1000.00 55.00 50.00 105.00
8 Ram BabuChildrens 350.00 45.00 45.00
9 Joan AdamsChildrens 780.00 55.00 28.00 83.00
10 Hu Zheng Adults 620.00 65.00 12.00 77.00
11 Louis Raphael
Adults 420.00 45.00 45.00
12 Ambrin Satem
Childrens 900.00 50.00 40.00 90.00
13 Tong Mu Adults 940.00 60.00 44.00 104.00
14 Malcolm Novak
Adults 870.00 70.00 37.00 107.00
15
16 131.00
Fig. 2
Explain, in detail, the features of spreadsheet software he had to use to change its appearance
as shown in Fig. 2 to that shown in Fig. 1 (page 8), using the shortest number of steps. The
larger column widths became 20 points wide and the narrower one (column F) 12 points.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[5]
To find all Eagle models the search conditions would be Model = “Eagle”.
(a) Using only Boolean operands, comparison operators and wild cards, write down the most
efficient search conditions which would produce lists of:
...........................................................................................................................................
.......................................................................................................................................[2]
...........................................................................................................................................
.......................................................................................................................................[2]
...........................................................................................................................................
.......................................................................................................................................[3]
(b) Describe how the database has been sorted to produce the one shown.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
(c) Identify, giving reasons, the key field in the database. Give reasons why the other fields are
not suitable.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
11 Normalisation is often used when converting a set of data into a meaningful database.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[8]
12 Encoding of data can be thought of as applying a code such as letters, symbols and numbers
to data for conversion into a cipher. It can also be thought of as a form of analogue to digital
conversion such as used by codec software. At times it is the term applied to the coding of data.
Evaluate the need for encoding data and analyse the different methods that can be used to encode
data.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[8]
BLANK PAGE
BLANK PAGE
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.
Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.
Published
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.
Cambridge International will not enter into discussions about these mark schemes.
Cambridge International is publishing the mark schemes for the October/November 2018 series for most
Cambridge IGCSE™, Cambridge International A and AS Level components and some Cambridge O Level
components.
These general marking principles must be applied by all examiners when marking candidate answers.
They should be applied alongside the specific content of the mark scheme or generic level descriptors
for a question. Each question paper and mark scheme will also comply with these marking principles.
• the specific content of the mark scheme or the generic level descriptors for the question
• the specific skills defined in the mark scheme or in the generic level descriptors for the question
• the standard of response required by a candidate as exemplified by the standardisation scripts.
Marks awarded are always whole marks (not half marks, or other fractions).
• marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit
is given for valid answers which go beyond the scope of the syllabus and mark scheme,
referring to your Team Leader as appropriate
• marks are awarded when candidates clearly demonstrate what they know and can do
• marks are not deducted for errors
• marks are not deducted for omissions
• answers should only be judged on the quality of spelling, punctuation and grammar when these
features are specifically assessed by the question as indicated by the mark scheme. The
meaning, however, should be unambiguous.
Rules must be applied consistently e.g. in situations where candidates have not followed
instructions or in the application of generic level descriptors.
Marks should be awarded using the full range of marks defined in the mark scheme for the question
(however; the use of the full mark range may be limited according to the quality of the candidate
responses seen).
Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should
not be awarded with grade thresholds or grade descriptors in mind.
2 Six from: 6
Each packet sent by network A takes a different route through the network
Each packet has source/destination address stored in header
Each router has a stored lookup table of IP addresses/routes to the
destination (if known)
Routing table is stored at control plane of router
Used to choose next router/router to send packet to
Static routes are pre-programmed to show route to destination B to C to E to
G
Dynamic routing protocols build up table of preferred routes between
connected networks B to C to F to G if router E is inefficient/out of action/in
heavy demand
If destination is unknown router B will send packet to next known router, C
or D
If C/D router does not know destination to H then packet is sent onto next
router, E or F.
6 Six from: 6
7 Eight from: 8
8 Eight from: 8
10 Six from: 6
11 Six from: 6
Published
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.
Cambridge International will not enter into discussions about these mark schemes.
Cambridge International is publishing the mark schemes for the October/November 2018 series for most
Cambridge IGCSE™, Cambridge International A and AS Level components and some Cambridge O Level
components.
These general marking principles must be applied by all examiners when marking candidate answers.
They should be applied alongside the specific content of the mark scheme or generic level descriptors
for a question. Each question paper and mark scheme will also comply with these marking principles.
• the specific content of the mark scheme or the generic level descriptors for the question
• the specific skills defined in the mark scheme or in the generic level descriptors for the question
• the standard of response required by a candidate as exemplified by the standardisation scripts.
Marks awarded are always whole marks (not half marks, or other fractions).
• marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit
is given for valid answers which go beyond the scope of the syllabus and mark scheme,
referring to your Team Leader as appropriate
• marks are awarded when candidates clearly demonstrate what they know and can do
• marks are not deducted for errors
• marks are not deducted for omissions
• answers should only be judged on the quality of spelling, punctuation and grammar when these
features are specifically assessed by the question as indicated by the mark scheme. The
meaning, however, should be unambiguous.
Rules must be applied consistently e.g. in situations where candidates have not followed
instructions or in the application of generic level descriptors.
Marks should be awarded using the full range of marks defined in the mark scheme for the question
(however; the use of the full mark range may be limited according to the quality of the candidate
responses seen).
Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should
not be awarded with grade thresholds or grade descriptors in mind.
2 Eight from: 8
Level 0 (0 marks)
Response with no valid content.
Advantages:
Bluetooth® requires minimal setup e.g. just a few button presses and
(possibly) a 4 digit code so is easy to use/setup or pair/bond devices c.f.
other network types
Bluetooth® is low energy technology so suitable for mobile devices
Bluetooth® is standardised so easy to implement/most devices will connect
readily
Bluetooth® is standard in a range of devices e.g. smartphones, speakers,
headsets
Bluetooth® is not easy to intercept nor will it easily interfere with other
device connections
3 Disadvantages:
Bluetooth® is short-range
Is affected by obstacles/walls that attenuate signals
Drains battery power if range is at maximum
Bluetooth® – enabled technology can be more expensive than non-enabled
devices
Bluetooth® has limited bandwidth.
4 Six from: 6
The extra firewalls means that any attacker that gets past the first firewall
would have to get past the second to access the company LAN
An attacker could not be sure how many other firewalls would be found on
the network
One firewall is an external firewall and one is an internal firewall and could
have different security
The internal firewall security protects the data one LAN segment
The external firewall security only has to deal with data from the internet
The internal services are now protected by both firewalls.
8 Eight from: 8
Face, hand geometry, and iris fit this parameter are easy to read
quickly/highly collectable at the door
Face, hand geometry, iris can be collected by machine/ computer system/
have a M/H
Fingerprint, facial thermogram, retina and iris have a M/H /highly unique to
individuals....
...but can be found in every individual
Iris, retina, voice and facial thermogram are acceptable to staff both in
original collection and use at the door...
...must not be intrusive/embarrassing when collected/read
parameter/have a M/H
Face, voice and DNA fit this parameter are difficult/not easy to circumvent
to prevent copying/use by several individuals
Fingerprint, retina, iris, DNA do not change over time/be permanent so
readings are repeatable
...facial thermogram is not permanent
Voice is most acceptable, but not very unique
Facial thermogram is unique, acceptable and easily collectable, but
changes over time so would need to be re-measured often
Fingerprint, Iris, Retina are most unique, collectable and accepted.
10 Eight from: 8
11 Six from: 6
CAM can produce items quicker than manual machines due to higher
machining speeds
CAM shows greater consistency of product as every finished product is the
same
CAM can have higher production rate as it can run continuously without
much supervision
CAM can produce more elegant/sophisticated shapes with greater ease
than manual machining/methods
CAM is more expensive than manual machinery so adds to production
costs
Costs may be offset by greater efficiency in e.g. speed of
production/volume production
CAM programs/CNC can take a long time to produce
Need to be accurate/correct to ensure production of item is properly
carried out.
12 Six from: 6
Published
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.
Cambridge International will not enter into discussions about these mark schemes.
Cambridge International is publishing the mark schemes for the October/November 2018 series for most
Cambridge IGCSE™, Cambridge International A and AS Level components and some Cambridge O Level
components.
These general marking principles must be applied by all examiners when marking candidate answers.
They should be applied alongside the specific content of the mark scheme or generic level descriptors
for a question. Each question paper and mark scheme will also comply with these marking principles.
• the specific content of the mark scheme or the generic level descriptors for the question
• the specific skills defined in the mark scheme or in the generic level descriptors for the question
• the standard of response required by a candidate as exemplified by the standardisation scripts.
Marks awarded are always whole marks (not half marks, or other fractions).
• marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit
is given for valid answers which go beyond the scope of the syllabus and mark scheme,
referring to your Team Leader as appropriate
• marks are awarded when candidates clearly demonstrate what they know and can do
• marks are not deducted for errors
• marks are not deducted for omissions
• answers should only be judged on the quality of spelling, punctuation and grammar when these
features are specifically assessed by the question as indicated by the mark scheme. The
meaning, however, should be unambiguous.
Rules must be applied consistently e.g. in situations where candidates have not followed
instructions or in the application of generic level descriptors.
Marks should be awarded using the full range of marks defined in the mark scheme for the question
(however; the use of the full mark range may be limited according to the quality of the candidate
responses seen).
Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should
not be awarded with grade thresholds or grade descriptors in mind.
1 4
Peer-to-peer networks must have a central server.
The server will determine which users can access the files on a 3
client-server network.
2 4
The colours used in a dialogue interface are of key importance.
3 Eight from: 8
The purpose of storage devices is to store data and software for later use
The purpose of storage devices is to hold data even when the computer is
turned off so the data can be used whenever needed/to have non-
volatile/permanent/backup copies of data/keep archives
Stored data may be loaded back into the CPU for further processing or sent
to an output device
The device writes data to the medium and reads it from the medium
The CPU is able to write data to the hard disk/tape in the form of formatted
files
The CPU is also able to read data and software from the hard disk/tape in
readiness for processing to take place
There is no distinction between software and data as far as the storage
device is concerned – both are a form of digital data
Optical devices such as CD, DVD and Blu-Ray drives all make use of a
laser to burn dark pits onto the medium
Each dark pit is a binary digit e.g. 1 whilst the absence of a pit is the
opposite binary bit e.g. 0 if the pit is a 1
Small areas of a tape/disk are magnetised to represent 1 or 0
Hard disks and magnetic tape have surfaces coated with a magnetically
sensitive material such as iron oxide
Solid state drives make use of electrical charge to store the data
Reading data involves retrieving data from the surface and transferring it
into the computer’s memory for use.
4 Six from: 6
5 Four from: 4
General public:
More people are able to use personal video-conferencing systems as
equipment/broadband has become affordable to the general public
More people are able to use personal video-conferencing systems as
hardware has improved in quality
Availability of freeware has made software-based video-conferencing
accessible to many
Enables more people to stay in contact with family/friends when far
apart/when it is difficult to travel
Hard-of-hearing/people with speech difficulties use video-conferencing as a
means of communicating with each other in sign language
Can result in loss of social interaction
Medicine:
Patients who are bed-ridden may contact nurses and physicians (to show
symptoms)
Doctors and/or other paramedical professionals can discuss cases across
large distances
Rural areas can use this technology for diagnostic purposes
Doctors can teach student doctors/student doctors can observe surgical
operations
Education:
Video-conferencing provides students with the opportunity to learn by
participating with students from other countries/schools
Teachers and lecturers worldwide can be virtually brought to remote or
otherwise isolated educational facilities
Students who are ill can still take part in lessons
Students from diverse communities and backgrounds can come together to
learn about one another
Through video-conferencing, students can virtually visit museums and
educational facilities
Universities with several campuses can collaborate and share lecturers.
9(a) =IF(C4>500,(C4-500)*0.1,"") 5
=IF() – 1 mark
C4>500, – 1 mark
(C4-500) – 1 mark
*0.1 – 1 mark
,"" – 1 mark
9(b) =SUMIFS(E3:E14,C3:C14,">800",B3:B14,"Adults") 7
9(c) =COUNTBLANK(E3:E14) 2
COUNTBLANK() – 1 mark
E3:E14 – 1 mark
Highlight columns A to G
Use format tool and column width tool and enter 20
Highlight column F, use format tool and column width tool and enter
12 / move cursor over right hand edge of letter F and drag to 12pt
Highlight cells C3:G16 and select format and format cells
Select currency
Choose symbol (format) $ and enter 0 for decimal places.
Reg_No = – 1 mark
“L*” – 1 mark
11 Eight from: 8
Advantages:
Any change to one record which is needed can instantly be made to any
related records
The database does not have redundant data making the file size smaller so
less money needs to be spent on storage
There is no data duplication so there are fewer errors in the data
There is no data duplication so there is less chance of storing incorrect
copies of the data
Modifying a table is easier as there is less data to modify
Disadvantages:
A larger number of tables requires more relationships to be designed taking
more time
Making data atomic may not always be the best solution such as date of
birth can be separated into day, month and year but this may serve no
purpose
Data may be stored as codes rather than meaningful data making it difficult
for humans to read/level of detail can be lost
With more tables setting up queries can become more difficult
You can end up with more tables than an un-normalised database making it
difficult to keep track of data
May require greater expertise (which may need to be bought in).
Level 0 (0 marks)
Response with no valid content.
Coding:
speeds up data entry
uses less storage space
enables faster searching for data
increases the accuracy of data entry
data is easier to validate
coarsening of data – light blue/dark blue can both have same code
Is difficult to code value judgements
coding can obscure the meaning of the data
12 Encryption:
It allows protection of sensitive data such as credit card numbers and
personal information from computer hackers
Without encryption information could be intercepted and altered or misused
by outsiders
It can be used to create digital signatures to authenticate e-mail
If the encryption key is lost the data is effectively lost
Encrypting data and creating the keys necessary to encrypt and decrypt the
data requires expensive systems
Public key encryption is based on complicated mathematics so computers
have to work very hard to both encrypt and decrypt data using the system
making such systems very slow
Many systems use a third party to certify the reliability of public keys and if
the certification authority is compromised, the criminal that did it could issue
false certificates fooling people into sending data
Users can have a false sense of security forgetting that once the data is
decrypted it becomes vulnerable to attack again
Codecs:
Video and music files are large so are difficult to transfer across the Internet
quickly
Without codecs, downloads would take three to five times longer than they
do now
There are many different types of codec and it is not always clear which
codec to get to play the video/music files
It is common to need ten to twelve codecs to play a user's music and
movies
There is always loss of quality.
Published
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.
Cambridge International will not enter into discussions about these mark schemes.
Cambridge International is publishing the mark schemes for the October/November 2018 series for most
Cambridge IGCSE™, Cambridge International A and AS Level components and some Cambridge O Level
components.
These general marking principles must be applied by all examiners when marking candidate answers.
They should be applied alongside the specific content of the mark scheme or generic level descriptors
for a question. Each question paper and mark scheme will also comply with these marking principles.
• the specific content of the mark scheme or the generic level descriptors for the question
• the specific skills defined in the mark scheme or in the generic level descriptors for the question
• the standard of response required by a candidate as exemplified by the standardisation scripts.
Marks awarded are always whole marks (not half marks, or other fractions).
• marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit
is given for valid answers which go beyond the scope of the syllabus and mark scheme,
referring to your Team Leader as appropriate
• marks are awarded when candidates clearly demonstrate what they know and can do
• marks are not deducted for errors
• marks are not deducted for omissions
• answers should only be judged on the quality of spelling, punctuation and grammar when these
features are specifically assessed by the question as indicated by the mark scheme. The
meaning, however, should be unambiguous.
Rules must be applied consistently e.g. in situations where candidates have not followed
instructions or in the application of generic level descriptors.
Marks should be awarded using the full range of marks defined in the mark scheme for the question
(however; the use of the full mark range may be limited according to the quality of the candidate
responses seen).
Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should
not be awarded with grade thresholds or grade descriptors in mind.
1 4
Verifying data is checking that data is correct.
A range check is the best check to make sure transposition has not
occurred when typing in a bar code.
A type check will prevent a letter of the alphabet being typed into a 3
numeric field.
2 4
A scanner can be both an input and output device.
3 Trojan Horse: 8
Two from:
Worm:
Two from:
Spyware:
Two from:
Adware:
Two from:
5 Four from: 4
A function is also a formula, but the parts have been predefined by the
spreadsheet software
Formulae can be as simple or as complex as the user wants
Instead of having to accurately type out the details of the formula a function
acts as a shortcut to carry them out
A formula can contain a function, but it is possible to write a formula without
a function
A function is provided by the spreadsheet software
Most functions have criteria, but not always as with RAND()
A formula is something that is user-created and can include spreadsheet
functions
Must have at least one similarity and one example to gain full marks.
6 Four from: 4
Developers can be freer to test all of the aspects of the machine without
worrying about damaging an expensive machine
Can provide results that are generally not measurable in some experiments
(e.g. all weather conditions)
Computer simulation can allow you to see how a system might respond
before you design or modify it, thus avoiding mistakes
It is cheaper as there is no need to make different prototypes to test them
out
It is safer to use a model and simulation for nuclear power plants/learning to
drive/fly
Designing an item as a model on a computer before the real item is built
saves time
Models allow accurate prediction of changes in trends or patterns
Critical situations can be investigated without risk
Critical situations can be created more quickly
Can be slowed down to study behaviour more closely.
The maximum reliable speed which could be achieved is usually lower than
that which modern video-conferencing systems require. 1 mark
SDSL is more expensive than ADSL but a better choice for high-quality
video-conferencing as allows much higher bandwidth. 1 mark
One from:
Format check to check that correct format has been followed in B10 –
1 mark
Would have trapped two letters and two digits entered instead of one letter
followed by three digits – 1 mark
8(b) =VALUE(LEFT(A2,3)) 4
VALUE() – 1 mark
LEFT(A2, 3) – 1 mark
Two from:
Highlight D2 and select format (format cells)/right click and select format
cells
Select currency
Set to $ and 2 decimal places.
9 Five from: 5
10(a) Cars: 10
Field1 Field2 Field3 Field4 Field5
Award one mark for two correct fields, two marks for three correct fields,
three marks for four correct fields, four marks for five correct fields
Agents:
Field1 Field2 Field3 Field4
Showrooms:
Field1 Field2 Field3
Award one mark for two correct fields, two marks for three correct fields.
10(b) 8
Agents Showrooms
Agent ID PK 1 1 Showroom ID PK
Agent first name Showroom
Agent second name District
Agent email
Cars
Car ID PK
Make
Model
∞ Agent ID FK
ShowroomID ∞
FK
Maximum 8 from:
Level 0 (0 marks)
Response with no valid content.
Hard disks can be portable and easy to move from device to device unlike
ROM/RAM
Data in RAM can be accessed much faster than the data on a hard disk
Hard disk drives are electromechanical devices and more prone to failure
than RAM/ROM – no moving parts
In a normal computer configuration RAM size is much smaller than the hard
disk size
12 Eight from: 8
Advantages:
Cost of buying a server is saved
does not need a server because individual workstations are used to
access the files
No need to pay for System Administrator/network technicians because each
user sets their own permissions as to which files they are willing to share
Much easier to set up than a client-server network as it does not need
specialist knowledge
The over-all cost of building and maintaining this type of network is
comparatively cheaper
If one computer fails it will not disrupt any other part of the network except
the files on that computer are not available to other users at that time/in
client-server network, if server goes down whole network gets affected
Disadvantages:
Files and folders are difficult to recover as they cannot be centrally backed
up/each computer has to have its own back-up system
Files and resources are more difficult to share
There is less security other than permissions/users often do not need to log
onto their workstations.
The system is not centralised so it is difficult to administer/one person
cannot determine the accessibility setting of whole network
Each computer is fulfilling more than one role, it may be printing or file
sharing so performance can be slower
Security is more expensive as each computer must have its own anti-virus
scanner
Difficult to have more than a few users
If sharing a large database which increases in size computers would need to
increase their storage capacity/client-server which only needs to upgrade
server
Because each computer might be being accessed by others it can slow
down the performance for the user unlike client-server
Ensuring that viruses are not introduced to the network it is the responsibility
of each individual user/client-server has central virus protection distributed
to each computer.
Published
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.
Cambridge International will not enter into discussions about these mark schemes.
Cambridge International is publishing the mark schemes for the October/November 2018 series for most
Cambridge IGCSE™, Cambridge International A and AS Level components and some Cambridge O Level
components.
These general marking principles must be applied by all examiners when marking candidate answers.
They should be applied alongside the specific content of the mark scheme or generic level descriptors
for a question. Each question paper and mark scheme will also comply with these marking principles.
• the specific content of the mark scheme or the generic level descriptors for the question
• the specific skills defined in the mark scheme or in the generic level descriptors for the question
• the standard of response required by a candidate as exemplified by the standardisation scripts.
Marks awarded are always whole marks (not half marks, or other fractions).
• marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit
is given for valid answers which go beyond the scope of the syllabus and mark scheme,
referring to your Team Leader as appropriate
• marks are awarded when candidates clearly demonstrate what they know and can do
• marks are not deducted for errors
• marks are not deducted for omissions
• answers should only be judged on the quality of spelling, punctuation and grammar when these
features are specifically assessed by the question as indicated by the mark scheme. The
meaning, however, should be unambiguous.
Rules must be applied consistently e.g. in situations where candidates have not followed
instructions or in the application of generic level descriptors.
Marks should be awarded using the full range of marks defined in the mark scheme for the question
(however; the use of the full mark range may be limited according to the quality of the candidate
responses seen).
Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should
not be awarded with grade thresholds or grade descriptors in mind.
1 4
Peer-to-peer networks must have a central server.
The server will determine which users can access the files on a 3
client-server network.
2 4
The colours used in a dialogue interface are of key importance.
3 Eight from: 8
The purpose of storage devices is to store data and software for later use
The purpose of storage devices is to hold data even when the computer is
turned off so the data can be used whenever needed/to have non-
volatile/permanent/backup copies of data/keep archives
Stored data may be loaded back into the CPU for further processing or sent
to an output device
The device writes data to the medium and reads it from the medium
The CPU is able to write data to the hard disk/tape in the form of formatted
files
The CPU is also able to read data and software from the hard disk/tape in
readiness for processing to take place
There is no distinction between software and data as far as the storage
device is concerned – both are a form of digital data
Optical devices such as CD, DVD and Blu-Ray drives all make use of a
laser to burn dark pits onto the medium
Each dark pit is a binary digit e.g. 1 whilst the absence of a pit is the
opposite binary bit e.g. 0 if the pit is a 1
Small areas of a tape/disk are magnetised to represent 1 or 0
Hard disks and magnetic tape have surfaces coated with a magnetically
sensitive material such as iron oxide
Solid state drives make use of electrical charge to store the data
Reading data involves retrieving data from the surface and transferring it
into the computer’s memory for use.
4 Six from: 6
5 Four from: 4
General public:
More people are able to use personal video-conferencing systems as
equipment/broadband has become affordable to the general public
More people are able to use personal video-conferencing systems as
hardware has improved in quality
Availability of freeware has made software-based video-conferencing
accessible to many
Enables more people to stay in contact with family/friends when far
apart/when it is difficult to travel
Hard-of-hearing/people with speech difficulties use video-conferencing as a
means of communicating with each other in sign language
Can result in loss of social interaction
Medicine:
Patients who are bed-ridden may contact nurses and physicians (to show
symptoms)
Doctors and/or other paramedical professionals can discuss cases across
large distances
Rural areas can use this technology for diagnostic purposes
Doctors can teach student doctors/student doctors can observe surgical
operations
Education:
Video-conferencing provides students with the opportunity to learn by
participating with students from other countries/schools
Teachers and lecturers worldwide can be virtually brought to remote or
otherwise isolated educational facilities
Students who are ill can still take part in lessons
Students from diverse communities and backgrounds can come together to
learn about one another
Through video-conferencing, students can virtually visit museums and
educational facilities
Universities with several campuses can collaborate and share lecturers.
9(a) =IF(C4>500,(C4-500)*0.1,"") 5
=IF() – 1 mark
C4>500, – 1 mark
(C4-500) – 1 mark
*0.1 – 1 mark
,"" – 1 mark
9(b) =SUMIFS(E3:E14,C3:C14,">800",B3:B14,"Adults") 7
9(c) =COUNTBLANK(E3:E14) 2
COUNTBLANK() – 1 mark
E3:E14 – 1 mark
Highlight columns A to G
Use format tool and column width tool and enter 20
Highlight column F, use format tool and column width tool and enter
12 / move cursor over right hand edge of letter F and drag to 12pt
Highlight cells C3:G16 and select format and format cells
Select currency
Choose symbol (format) $ and enter 0 for decimal places.
Reg_No = – 1 mark
“L*” – 1 mark
11 Eight from: 8
Advantages:
Any change to one record which is needed can instantly be made to any
related records
The database does not have redundant data making the file size smaller so
less money needs to be spent on storage
There is no data duplication so there are fewer errors in the data
There is no data duplication so there is less chance of storing incorrect
copies of the data
Modifying a table is easier as there is less data to modify
Disadvantages:
A larger number of tables requires more relationships to be designed taking
more time
Making data atomic may not always be the best solution such as date of
birth can be separated into day, month and year but this may serve no
purpose
Data may be stored as codes rather than meaningful data making it difficult
for humans to read/level of detail can be lost
With more tables setting up queries can become more difficult
You can end up with more tables than an un-normalised database making it
difficult to keep track of data
May require greater expertise (which may need to be bought in).
Level 0 (0 marks)
Response with no valid content.
Coding:
speeds up data entry
uses less storage space
enables faster searching for data
increases the accuracy of data entry
data is easier to validate
coarsening of data – light blue/dark blue can both have same code
Is difficult to code value judgements
coding can obscure the meaning of the data
12 Encryption:
It allows protection of sensitive data such as credit card numbers and
personal information from computer hackers
Without encryption information could be intercepted and altered or misused
by outsiders
It can be used to create digital signatures to authenticate e-mail
If the encryption key is lost the data is effectively lost
Encrypting data and creating the keys necessary to encrypt and decrypt the
data requires expensive systems
Public key encryption is based on complicated mathematics so computers
have to work very hard to both encrypt and decrypt data using the system
making such systems very slow
Many systems use a third party to certify the reliability of public keys and if
the certification authority is compromised, the criminal that did it could issue
false certificates fooling people into sending data
Users can have a false sense of security forgetting that once the data is
decrypted it becomes vulnerable to attack again
Codecs:
Video and music files are large so are difficult to transfer across the Internet
quickly
Without codecs, downloads would take three to five times longer than they
do now
There are many different types of codec and it is not always clear which
codec to get to play the video/music files
It is common to need ten to twelve codecs to play a user's music and
movies
There is always loss of quality.
Write your centre number, candidate number and name on all the work you hand in.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.
At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.
DC (SC/TP) 163073/3
© UCLES 2019 [Turn over
2
1 Tick the four most accurate statements regarding solid state drives (SSDs), hard disk
drives (HDDs), magnetic tape drives and their associated media.
Hard disks are metal platters with a magnetic coating that stores data
Hard disk drives have no moving parts and so are not at risk of being damaged
SSDs have a faster data transfer rate than magnetic tape drives
Magnetic tapes are used in laptop computers more than hard disks
SSDs still cost more per gigabyte than hard disk drives
SSDs make more noise than the sound of hard disk drives when in use
2 Tick the four most accurate statements regarding control and monitoring systems and
the use of sensors.
✓
A temperature sensor is able to directly control the temperature of water in a
washing machine
A pressure sensor is often used to monitor the amount of pollution in a river
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[4]
4 The quality of a sound recording when processed by audio editing software depends on the
sampling resolution of the recording.
Describe, using examples, what is meant by sampling resolution and explain how it affects audio
file sizes.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[5]
5 A headteacher is updating the school’s record-keeping system. For the new system he is
considering using off-the-shelf software. When the new system is running the secretary will need
to enter all the students’ data. This will require accurate entry of the data.
(a) Define what is meant by the term ‘software’ and describe, giving examples of each, application
and system software.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[4]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[3]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[3]
(d) Describe the different methods of verification the secretary could use.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[4]
Using examples, explain why the characteristics of spreadsheets are suitable for producing
financial models.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[8]
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[6]
8 A car hire company keeps its records in a database consisting of two tables. Parts of these tables
are shown below.
Customer Table
Car Table
(a) Describe how you would use database features to create a relational database from these
two tables.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[4]
(b) The manager is carrying out a survey of cars hired in certain areas. She wishes to know
which cars with an engine size under 1.8 litres have been rented by people living in the
Chorlton area. She only wishes to know the full names of the customers, their phone number
and the make of the car.
Complete the grid below to show how the conditions for such a query would be created.
Field:
Table:
Sort:
Show:
Criteria:
or:
[6]
(c) Explain why it would be extremely difficult to validate the Licence field. Include in your
explanation, a detailed description of three validation checks, other than a presence check,
which could normally be used on any alphanumeric field from the database shown on page 8.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[6]
9 Below is a spreadsheet of a company’s balance sheet. It shows its expenditure, income and profit
for each year between 2009 and 2018.
A B C D E F G H I J K L M
1
2 Expenditure
Total
3 Wages Utilities Stock expenditure Income Profit
4 2009 350250 54565 475623 €880,438 €925,365 €44,927 very bad year
5 2010 467032 61022 519429 €1,047,483 €1,097,652 €50,169 bad year
6 2011 476414 68124 567178 €1,111,716 €1,185,858 €74,142 bad year
7 2012 512209 75936 619224 €1,207,369 €1,342,020 €134,651 good year
8 2013 553156 84530 675954 €1,313,640 €1,518,483 €204,843 good year
9 2014 648589 93983 737790 €1,480,362 €1,717,886 €237,524 good year
10 2015 732877 104381 805191 €1,642,449 €1,943,211 €300,762 good year
11 2016 774954 115819 878658 €1,769,431 €2,197,828 €428,397 good year
12 2017 838925 128401 958737 €1,926,063 €2,485,546 €559,483 good year
13 2018 868577 142241 1046023 €2,056,841 €2,810,667 €753,826 good year
14
15 >2011 <2017
16
Variable
17 average 644357
18
(a) Write down the formula which uses a function, in cell G4, to calculate the Total expenditure
for 2009.
= ............................................................................................................................................[1]
(b) The percentage profit is calculated by dividing the Profit by the Income. The company
secretary has entered a formula in M4 which displays a message:
Write down the formula he used in cell M4 which would be replicated in cells M5 to M13.
= ................................................................................................................................................
...............................................................................................................................................[6]
You can use the space below for any working you need.
(c) The manager wants to be able to find the Variable average of the wages bill for any sequence
of years between 2009 and 2018.
He has set up the spreadsheet to calculate the average between 2011 and 2017.
To calculate the average between any other sequence of years he will just change the
conditions >2011 and <2017.
Write down the formula he will need to use in C17 to calculate the Variable average.
= ................................................................................................................................................
...............................................................................................................................................[6]
You can use the space below for any working you need.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[8]
11 A business needs to search its database to find all the customers it has in the Chinese city of
Beijing.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[8]
BLANK PAGE
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.
Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of
Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge.
Write your centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.
At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.
DC (NF/CT) 180077
© UCLES 2019 [Turn over
2
1 Explain, with suitable examples, why computer graphics image editing software allows users to
save bitmap images in different file formats.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
.................................................................................................................................................... [6]
2 In JavaScript code, the sort() function is used to sort lists into ascending order.
(a) Explain, in detail, why, when using the sort() function, the list in Fig. 2.1 is sorted correctly, but
the list in Fig. 2.2 is not.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
(b) Write a line of JavaScript code that could be used to sort the list of insects in Fig. 2.1 into
descending order.
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
3 An online retailer uses a simple form on its website to enable customers to contact its After Sales
department by email. The form looks like this:
Comment:
Send Reset
1 <html>
2 <body>
3
4 <h2>Send an email to aftersales@mycompany.com:</h2>
5
6 <form action="mailto: aftersales@mycompany.com" method="post"
enctype="text/plain">
7
8 Your Name:<br>
9
10 Your email address:<br>
11
12 Comment:<br>
13
14
15
16 </form>
17 </body>
18 </html>
19
20
(a) Explain what the different parts of the code in line 6 do.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [6]
(b) Create some additional lines of code that could be inserted into the script at appropriate
locations to collect the name and email address of the customer. Indicate, with reference to
the line numbers, where your additional code should be inserted.
[4]
[6]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [8]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
.................................................................................................................................................... [6]
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
.................................................................................................................................................... [6]
7 The manager of a company has decided to contact existing customers to gather detailed feedback
about a product. She needs responses from a large number of customers as quickly as possible.
Use the information given in Fig. 7.1 to select, with reasons, the most appropriate method of
asking the customers for their feedback.
Administered by:
Criteria
Post Telephone Email In person
Low cost 3 3
Fig. 7.1
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
.................................................................................................................................................... [4]
8 An online store sells goods through its website. The website has an ‘automated online assistant’ to
help the customer through the purchasing process. An ‘automated online assistant’ on a website
is a computer program that uses artificial intelligence to provide a customer with service and
assistance.
(a) Describe how the components of an ‘automated online assistant’ provide help to the customer.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [8]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
.................................................................................................................................................... [8]
© UCLES 2019 9626/31/M/J/19
13
10 A typical animation has 24 frames for every second of running time (24 fps).
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24
Frame number
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
(b) Suggest one reason why the animator might choose to draw the animation on ‘ones’ instead
of ‘twos’.
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [1]
(c) Describe the effect of drawing the ball in this animation on ‘fours’ instead of ‘twos’.
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [1]
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
.................................................................................................................................................... [6]
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
.................................................................................................................................................... [6]
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.
Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of
Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge.
Write your centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.
At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.
DC (SC/CB) 172052/1
© UCLES 2019 [Turn over
2
1 (a) Describe how the features of a 4G cellular communications system improve the ability of a
smartphone to complete the download of a video file from the internet.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
Describe two ways that these improvements may affect the use of smartphones.
1 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[2]
2 Lasers can be used to create a data link between devices without using cables.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [1]
3 An author has written the source code of a web page that will be used when a person applies for a
driving licence. The code, shown in Fig. 3.1, is intended to check that a person is at least 16 years
of age.
The lines of the code are numbered only for your convenience when referring to the code.
The JavaScript code is in lines 8 to 19.
1 <html>
2 <body>
3 <p>You can apply for a licence to drive when you are 16 years
old.</p>
4 <p>To check if you are old enough to drive, input your age and
click the button:</p>
5 <input id="AgeNow" value="16" />
6 <button onclick="CheckAgFunction()">Check now</button>
7 <p id="AgeCheck"></p>
8
9 function CheckAgeFunction()
10 var AgeNow;
11 AgeNow = Number(document.getElementById("AgeNow").value);
12 if (isNaN(AgeNow)) {
13 CanApply = "Please enter your age in numbers.";
14 } else {
15 CanApply = (AgeNow >15)? "You are too young to apply
for a licence.": "You are old enough to apply for a licence.";
16 }
17 document.getElementById("AgeCheck).innerHTML = CanApply;
18 }
19
20 </body>
21 </html>
Fig. 3.1
Testing has shown that the code contains a number of errors of different types which must be
corrected before the code will perform as expected.
Identify the line numbers containing the errors. Explain why each of the errors prevents the code
from running correctly and how each should be corrected. Use the table for your response.
[8]
4 Analyse the use of focus groups as a method of gathering feedback about a new product before it
is made available for sale.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
.................................................................................................................................................... [8]
5 Fig. 5.1 shows a table of tasks for a building project. The tasks F, G, H, I, J and K, need to be
carried out between the stages A, B, C, D and E. The project starts with stage A and ends with
stage E. Stages B and C are milestones.
Time (months)
Task taken to Milestones
complete task
Task starts at Task ends at
F 4 A C
G 5 A B
H 3 B E
I 2 C D
J 3 D E
K 3 C E
Fig. 5.1
(a) (i) Draw an activity network diagram to represent the data in the table shown in Fig. 5.1.
[5]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [2]
6 A packet switched network has routers at nodes labelled A, B, C, D, E, F, G and H. Each router
stores its own ‘routing table’ which shows how it is connected to the other routers.
(a) Complete the diagram by drawing routers C, D, E, F and G with connection lines to show how
the routers are inter-connected to communicate with each other.
A B H
[3]
Router A regularly sends out packets to check that router H is reachable. When H receives a
packet from A it sends a packet back to confirm that it is reachable.
Assume that each router takes zero time units to receive, process and resend a packet and that
each packet takes six time units to travel from one router to the next.
(b) (i) Describe the shortest route that a packet can take from router A to router H.
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [1]
(ii) Calculate the shortest time taken for router A to receive an acknowledgement from router
H confirming that H is reachable.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [2]
(c) (i) Assuming that the packets visit each router only once, calculate the longest time it could
take for router A to receive an acknowledgement from router H confirming that H is
reachable.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [2]
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [1]
(d) An additional router, J, is to be added to reduce the time for packets to travel from router A
to router H to a minimum. However, no further connections can be directly made to routers A
and H.
(i) Describe where J would be placed to reduce the travel time to a minimum.
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [1]
(ii) Calculate the new minimum time that it would take for A to receive an acknowledgement
that H was reachable.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [2]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
(b) Describe how a network interface card is involved in the sending and receiving of data.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [7]
8 The photograph in Fig. 8.1 has been edited and is shown in Fig. 8.2.
Describe in detail how image editing tools could have been used to change the photograph in
Fig. 8.1 to that shown in Fig. 8.2.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
.................................................................................................................................................... [2]
(a) Describe two properties of the filled shape that can be changed with the use of colour
gradients.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
(b) Describe the types of gradient that can be used when filling a shape with colour.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
10 Homer uses headphones to listen to the audio from movies playing on his television. Homer is
trying to decide whether to use Bluetooth or cables to connect his headphones to the TV while he
watches the movies.
Choose, with reasons, the most appropriate of these methods so that Homer can hear the
soundtrack while watching movies.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
.................................................................................................................................................... [5]
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
.................................................................................................................................................... [8]
12 Explain how perpetrator analysis could be used when planning for disaster recovery.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
.................................................................................................................................................... [6]
13 Many countries have enacted laws to govern the use of personal data.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
.................................................................................................................................................... [8]
BLANK PAGE
BLANK PAGE
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.
Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of
Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge.
Write your centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.
At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.
DC (ST/CT) 172381/2
© UCLES 2019 [Turn over
2
1 Explain, with suitable examples, why computer graphics image editing software allows users to
save bitmap images in different file formats.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
.................................................................................................................................................... [6]
2 In JavaScript code, the sort() function is used to sort lists into ascending order.
(a) Explain, in detail, why, when using the sort() function, the list in Fig. 2.1 is sorted correctly, but
the list in Fig. 2.2 is not.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
(b) Write a line of JavaScript code that could be used to sort the list of insects in Fig. 2.1 into
descending order.
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
3 An online retailer uses a simple form on its website to enable customers to contact its After Sales
department by email. The form looks like this:
Comment:
Send Reset
1 <html>
2 <body>
3
4 <h2>Send an email to aftersales@mycompany.com:</h2>
5
6 <form action="mailto: aftersales@mycompany.com" method="post"
enctype="text/plain">
7
8 Your Name:<br>
9
10 Your email address:<br>
11
12 Comment:<br>
13
14
15
16 </form>
17 </body>
18 </html>
19
20
(a) Explain what the different parts of the code in line 6 do.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [6]
(b) Create some additional lines of code that could be inserted into the script at appropriate
locations to collect the name and email address of the customer. Indicate, with reference to
the line numbers, where your additional code should be inserted.
[4]
[6]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [8]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
.................................................................................................................................................... [6]
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
.................................................................................................................................................... [6]
7 The manager of a company has decided to contact existing customers to gather detailed feedback
about a product. She needs responses from a large number of customers as quickly as possible.
Use the information given in Fig. 7.1 to select, with reasons, the most appropriate method of
asking the customers for their feedback.
Administered by:
Criteria
Post Telephone Email In person
Low cost 3 3
Fig. 7.1
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
.................................................................................................................................................... [4]
8 An online store sells goods through its website. The website has an ‘automated online assistant’ to
help the customer through the purchasing process. An ‘automated online assistant’ on a website
is a computer program that uses artificial intelligence to provide a customer with service and
assistance.
(a) Describe how the components of an ‘automated online assistant’ provide help to the customer.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [8]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
.................................................................................................................................................... [8]
© UCLES 2019 9626/33/M/J/19
13
10 A typical animation has 24 frames for every second of running time (24 fps).
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24
Frame number
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
(b) Suggest one reason why the animator might choose to draw the animation on ‘ones’ instead
of ‘twos’.
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [1]
(c) Describe the effect of drawing the ball in this animation on ‘fours’ instead of ‘twos’.
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [1]
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
.................................................................................................................................................... [6]
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
.................................................................................................................................................... [6]
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.
Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of
Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge.
Write your centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.
At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.
DC (SC/TP) 163071/3
© UCLES 2019 [Turn over
2
1 The coding of data refers to using M for male and F for female, for example.
Tick the four most accurate statements regarding the coding of data.
Codes are not too complicated so there are never any errors on data entry
Coded data makes the computer slower when searching for data
[4]
2 The management of a hotel is introducing a computer system for producing bills for their customers.
They are considering which type of printer to use.
Tick the four most accurate statements regarding different types of printer, if used in the
hotel reception area.
A dot matrix printer would produce higher quality output than an inkjet printer
An inkjet printer would be slower at producing output than a dot matrix printer
A laser printer can operate in harsh conditions, unlike a dot matrix printer
A laser printer toner cartridge is more expensive to buy than an inkjet cartridge
Multi-part stationery is easier to use with laser printers than with dot matrix
printers
Inkjet printers are cheaper to buy than dot matrix printers
[4]
© UCLES 2019 9626/11/M/J/19
3
45612, fred, π, £, ≥ or
Explain, by describing what is meant by information, why these are just items of data.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[6]
4 Most schools have introduced e-safety lessons because teachers are becoming concerned about
the way their students use the internet when not in school. One of their concerns is that students
may be revealing personal information about themselves.
Describe the problems associated with this and other problems that arise from students using the
internet.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[6]
5 Many companies with different branches have Local Area Networks (LANs) which connect to form
a Wide Area Network (WAN).
Compare and contrast the characteristics of a LAN and a WAN owned by one company.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[6]
6 Louis has partly typed up the notes from his IT lesson. He wants to complete these at home.
Sophia, a fellow student, tells him that it may be difficult as he has been using proprietary software.
Explain what is meant by proprietary and open-source file formats, giving reasons why open-source
file formats are needed.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[5]
7 An operating system is system software that manages computer hardware and software resources.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[4]
8 There are a number of ways that fraudsters can obtain money from customers’ bank accounts.
(a) Describe how the fraudster would use vishing to obtain a customer’s personal data.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[3]
(b) Describe how the fraudster would use smishing to obtain a customer’s personal data.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[3]
9 Paolo is the owner of a small company with ten workers. He is developing a spreadsheet
to calculate the payroll. He has started by importing a text file of the workers’ names. The list
consisted of each worker’s family name followed by a comma then a space then their first name.
He wants to split the names into separate family names and first names by finding the position of
the comma in each cell in column A.
He has discovered a new function, LOCATE, which gives the position of the first occurrence of a
single character in a word.
For example, =LOCATE(“e”,I4) gives the result 2.
A B C D E F G H I J K L M
Position of Rate per Hours
1 Name comma Family name First name Job Weekly pay hour worked
2
3 Smith, John Polishing 450 15 30
4 McDonnell, Louise Secretary 500 10 50
5 Hernandes, Juan Welding 450 10 45
6 Kennedy, Sean Orders 500 16 31.25
7 Gustaffsson, Johan Fitter 500 20 25
8 Davies, Iueuan Electrician 550 11 50
9 Lopez, Ramon Manager 500 25 20
10 Garcia, Isabel Painting 550 20 27.5
11 Costa, Albertina Invoices 450 15 30
12 Fernandez, Mariela Sales 550 11 50
13
(a) Using this LOCATE function, write down the formula he would use in cell C3. The formula
must be easy to replicate.
= ............................................................................................................................................[2]
You can use the space below for any working you need.
(b) He will use a formula in cell E3 to produce Smith. Making use of cell C3, write down the
formula, without using the MID function, which must be easy to replicate.
= ............................................................................................................................................[3]
You can use the space below for any working you need.
(c) He will use a formula in cell F3 to produce John. Making use of cell C3, write down the
formula, without using the MID function, which must be easy to replicate.
...............................................................................................................................................[3]
You can use the space below for any working you need.
(d) Describe the steps he would use to format the Weekly pay column so that the only difference
that would be made would be to place a $ sign in front of the value.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[3]
© UCLES 2019 9626/11/M/J/19 [Turn over
10
(e) Using only the sort feature on columns I and J, explain how you would be able to get the
following values in the given cells. You need to ensure data integrity is maintained.
(i) 500 in cell J6 with Secretary in cell I6 and Davies, Iueuan in A12.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[3]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[3]
10 A car park has a barrier which operates automatically. It opens when a car approaches it and
closes when the car is clear of the barrier.
Describe, including the use of sensors, how a microprocessor controls this operation.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[4]
11 Maria, the A level students’ secretary, has been given the task of creating a database. It will store
the records of each subject taught and the records of the teachers involved. She has decided to
produce a relational database.
The Teacher records will have the fields Teacher_ID, Family_name, First_name, Subject_ID and
Number_of_classes. The Subject records will have the fields Subject_code, Subject_name,
Subject_level and Number_of_lessons.
(a) Complete the diagram below to show how the tables will be combined.
[4]
(b) Using the design of your database from part (a), describe how you would create it.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[4]
12 A government database stores the licence plates of cars. In this particular country they all follow
the same pattern, e.g.
BG136KG
CD125FH
FT342LM
NQ439SR
Apart from a presence check, describe two appropriate validation checks which could be applied
to licence plates. For each check give an appropriate example of invalid data that would be
rejected. Each example must be different.
1 .......................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
2 .......................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[4]
13 IT professionals often use command line interfaces (CLIs) to communicate with computers. Office
workers, however, prefer graphical user interfaces (GUIs). In the home, gesture based interfaces
(GBIs) are increasingly being used.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[8]
14 Many students use the internet in school to search for information to help with their classwork.
Apart from e-safety, discuss the benefits and drawbacks of students using the internet for this
purpose.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[8]
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.
Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of
Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge.
Write your centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.
At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.
DC (SC/TP) 163072/3
© UCLES 2019 [Turn over
2
1 Tick the four statements referring to asymmetric encryption which are true.
A trojan horse just enables a virus to be transmitted. It never deletes data itself
[4]
3 People in a village are aware that the local river is being polluted. They are concerned that this is
being caused by a nearby factory.
Describe how computers and sensors could be used to monitor the level of pollution in the river in
order to determine whether the factory is responsible for the pollution.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[5]
4 Some people get confused when trying to establish what is data, information or knowledge. The
sequence of numbers 192.168.1.254 could be an example of data.
Using this example, or another of your choice, explain how data, information and knowledge are
linked.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[4]
5 A large company with branches in many countries has decided to install a Virtual Private Network
(VPN).
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[4]
Describe two effects of video‑conferencing for each of the following groups of people:
1 .......................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
2 .......................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
Business people
1 .......................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
2 .......................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
1 .......................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
2 .......................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
[6]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[3]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[3]
8 The owners of a bank are considering changing its system of reading cheques from Magnetic Ink
Character Recognition (MICR) to Optical Character Recognition (OCR).
Give two advantages and two disadvantages of using OCR instead of MICR.
Advantage 1 ......................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
Advantage 2 ......................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
Disadvantage 1 .................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
Disadvantage 2 .................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[4]
Describe how the knowledge base is used to interact with the other components when an expert
system is used to solve a problem.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[5]
10 An examinations officer has created a spreadsheet containing a list of students and their dates of
birth. It will be used to calculate each student’s age in years. This is the age that they will be on the
date of a science exam which is on 21/05/2019.
A B C D E F G H
1
Number of
Family First Date of birth exams
2 name name (dd/mm/yyyy) Age entered for 21/05/2019
3
Write down the formula she used. This formula should be easy to replicate.
You can assume for the purpose of this exercise that the number of days in a year averages
out to 365.25.
= ............................................................................................................................................[4]
You can use the space below for any working you need.
(b) (i) The spreadsheet is to be sorted in ascending order of Age and then descending order of
Number of exams entered for.
.......................................................................................................................................[2]
You can use the space below for any working you need.
(ii) The original spreadsheet is to be sorted in descending order of Age and then ascending
order of Number of exams entered for.
Write down the values which would be displayed in D17 and E17.
.......................................................................................................................................[2]
You can use the space below for any working you need.
(c) A teacher wanted to know the number of students aged 17 taking three exams.
Write down the formula containing a counting function she used in cell G4 to calculate this
number. This formula should work even if the data changes.
= ............................................................................................................................................[5]
You can use the space below for any working you need.
(d) The teacher now wants to know the number of students aged 16 taking four exams.
Write down the formula containing a counting function she used in cell G5 to calculate this
number. This formula should work even if the data changes.
...............................................................................................................................................[3]
You can use the space below for any working you need.
BLANK PAGE
11 A library database consists of one table containing details of all the books in a library and another
table containing details of all the borrowers. Parts of the tables are shown below.
Books table
Borrowers table
(a) You have been asked to create a query which will output only the names and phone numbers
of all the borrowers who have a family name beginning with G and also live in Midtown.
Describe the steps you would have to follow in order to create this query, without using a
query wizard or a parameter query.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[5]
(b) You have been asked to create a query which will output only the titles and authors of all the
books published by Panda Books which have a replacement cost of less than €20.
(i) Describe the steps you would have to follow in order to create this query, without using a
query wizard or a parameter query.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[3]
(ii) Describe how you would set up the query in (b)(i) as a parameter query.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[3]
(c) Explain why the above tables (on page 14) do not constitute a relational database and what
would need to be added to make them so.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[3]
12 Validation is often used to check that data entered into a computer is sensible. A customer orders
database contains details of the Customer ID number, the value of the order placed and the date
the order was placed. Any new order, when it is entered, needs to be validated.
Using these examples of database fields, analyse the use of the following different validation
rules – range check, type check, length check and format check.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[8]
13 Many driving schools are asking IT companies to develop simulators for teaching customers to
drive.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[8]
BLANK PAGE
Permission to reproduce items where third‑party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer‑related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.
Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of
Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge.
Published
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.
Cambridge International will not enter into discussions about these mark schemes.
Cambridge International is publishing the mark schemes for the May/June 2019 series for most
Cambridge IGCSE™, Cambridge International A and AS Level and Cambridge Pre-U components, and
some Cambridge O Level components.
These general marking principles must be applied by all examiners when marking candidate answers.
They should be applied alongside the specific content of the mark scheme or generic level descriptors
for a question. Each question paper and mark scheme will also comply with these marking principles.
• the specific content of the mark scheme or the generic level descriptors for the question
• the specific skills defined in the mark scheme or in the generic level descriptors for the question
• the standard of response required by a candidate as exemplified by the standardisation scripts.
Marks awarded are always whole marks (not half marks, or other fractions).
• marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit
is given for valid answers which go beyond the scope of the syllabus and mark scheme,
referring to your Team Leader as appropriate
• marks are awarded when candidates clearly demonstrate what they know and can do
• marks are not deducted for errors
• marks are not deducted for omissions
• answers should only be judged on the quality of spelling, punctuation and grammar when these
features are specifically assessed by the question as indicated by the mark scheme. The
meaning, however, should be unambiguous.
Rules must be applied consistently e.g. in situations where candidates have not followed
instructions or in the application of generic level descriptors.
Marks should be awarded using the full range of marks defined in the mark scheme for the question
(however; the use of the full mark range may be limited according to the quality of the candidate
responses seen).
Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should
not be awarded with grade thresholds or grade descriptors in mind.
Some graphics software may not support all file types so different export
options allows images to be shared e.g. use of JPEG / GIF is almost
universal
Images can be saved as compressed images / files to save storage space /
allow use in various scenarios / situations e.g. use of JPEG allows
compression by various amounts but the more compression the lower the
quality
GIF allows areas to be made transparent whereas JPEG does not support
this
Different file types support different colour depths for use in various
situations e.g. JPEG supports more colours than GIF
Quality of the image is affected by choice of filetype e.g. TIFF retains better
quality than JPEG / GIF when compressed
Bitmap (BMP) files restrict the use of the images to e.g. Windows OS so
availability of other types allows cross-platform use.
Mark allocation:
method="post"
Specifies the HTTP method to be used when submitting the form
In this case post means not to display the submitted data / used for sensitive
or private / personal data / make the submitted data invisible in the field / will
not allow bookmarking / is not saved in browser history
Post can send unlimited amounts of data so no need to specify the size
enctype="text/plain">
Specifies the encoding of the data
As plain text.
Line
Code
number
3(c) 6
Line
Code
number
Six from:
Risk to data from unauthorised access through remote access via network /
internet
Data can be (more easily) lost / stolen while being replicated / distributed
across remote servers
Large number of people can access the data which leads to theft of data as
there are more people who can be compromised / make errors
Data travels over more networks’ so is more easily compromised / lost /
stolen / corrupted
Supplier of the storage may not be reliable / security aware to same degree
as owner of the data
Supplier of storage may go out of business / change their serve conditions /
be purchased by rival companies
Performance of cloud storage may not be as good as that of local storage
leading to increased access times
Owner of data may have no idea where the data is stored so may not be
aware that is being stored in another country
Owner of data is not responsible for e.g. backups so is reliant on third party
systems to maintain their data integrity
Data is extremely difficult to delete from the cloud
Legal regulations referring to the data / storage systems may be different in
different countries.
Can allow access to data at any time / from anywhere with internet
connection provided one has valid User ID / password
Data can be accessed using different hardware so no need to carry
hardware with you
Company need only purchase / pay for the actual amount of storage needed
Energy use by company can be reduced by not having (large) server farms
for data storage
Number of IT staff can be reduced saving the company the cost of their
employment
Supplier of storage is responsible for e.g. backups / disaster recovery / virus
protection / security of the data.
5 Six from: 6
7 Four from: 4
9 Command word: Evaluate: discuss the importance of, weigh up, the 8
advantages and disadvantages, judge the overall effectiveness, weigh
up your opinions.
Level 0 (0 marks):
Response with no valid content.
Physical barriers such as wall / doors / bars / use of floors other than ground
floor which are cheap and easy to make use of / make use of existing
resources which lowers costs
Use of CCTV which can be placed overtly to deter unauthorised persons
just by their presence or by a warning / notice that watching is occurring /
can be cost effective as a deterrent
Video surveillance can be used to watch large areas with few staff
Physical presence of guards / security staff shows persons that a security
system is in operation
... can deal with issues quickly / immediately
Security lighting / automatic lights / sensor-controlled lights can illuminate
when persons present to act as deterrent / highlight intruders / warn
intruders that they have been seen and these have low cost if e.g. solar
powered
Computer devices can be easily / cheaply / quickly fixed / attached to large
objects / shelving to deter theft
Physical locks require keys that may be lost / key fobs etc may be lost or
stolen / given to unauthorised persons
Combinations to locks can be forgotten
Animator only needs to draw 12 frames instead of the full 24 so saves time /
effort
...fewer animators / less computer time needed for the whole project
(Drawing on ‘twos’) makes slow animations look / appear smoother to the
eye
Less precision / accuracy is needed than for drawing on ‘ones’ (‘ones’
animation does not look jerky) so drawing can be done faster / with less skill
from animator
(Drawing on ‘twos’) makes animations appear more lively / active than when
drawn on ‘ones’.
Six from:
Advantages:
First person / heads up display via headsets can enhance monitoring of
processes in real time from wearers point of view
Can allow enhanced monitoring of employee activity via wearable devices
on shop floor
Can track every step of activity in manufacturing by employee activity
Can allow enhanced / better manufacturing processes via wearable devices
that view / transmit live data from activity
Faults can be directly entered into fault database / expert system of
company
Can improve employee safety due to ability to remotely control machinery
while on shop floor / using wearable devices
Sensors can provide information about environment for working
Disadvantages:
Positioning of devices on body can lead to inaccuracies in the data / actions
performed
Wearable devices need power so have to carry heavy batteries
Wearable devices need charging so have downtime.
Staff may not wish to be monitored.
Published
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.
Cambridge International will not enter into discussions about these mark schemes.
Cambridge International is publishing the mark schemes for the May/June 2019 series for most
Cambridge IGCSE™, Cambridge International A and AS Level and Cambridge Pre-U components, and
some Cambridge O Level components.
These general marking principles must be applied by all examiners when marking candidate answers.
They should be applied alongside the specific content of the mark scheme or generic level descriptors
for a question. Each question paper and mark scheme will also comply with these marking principles.
• the specific content of the mark scheme or the generic level descriptors for the question
• the specific skills defined in the mark scheme or in the generic level descriptors for the question
• the standard of response required by a candidate as exemplified by the standardisation scripts.
Marks awarded are always whole marks (not half marks, or other fractions).
• marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit
is given for valid answers which go beyond the scope of the syllabus and mark scheme,
referring to your Team Leader as appropriate
• marks are awarded when candidates clearly demonstrate what they know and can do
• marks are not deducted for errors
• marks are not deducted for omissions
• answers should only be judged on the quality of spelling, punctuation and grammar when these
features are specifically assessed by the question as indicated by the mark scheme. The
meaning, however, should be unambiguous.
Rules must be applied consistently e.g. in situations where candidates have not followed
instructions or in the application of generic level descriptors.
Marks should be awarded using the full range of marks defined in the mark scheme for the question
(however; the use of the full mark range may be limited according to the quality of the candidate
responses seen).
Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should
not be awarded with grade thresholds or grade descriptors in mind.
3 8
Line 8 script is not opened so web Add <script> to open the script
browser cannot interpret it
Line 19 script is not closed so web Add </script> to close the script
browser cannot interpret it
Mark allocation:
Three from:
When sending:
NIC is notified that frame has been created by OS in a buffer
NIC accesses / reads buffer / memory directly by DMA
NIC determines address and creates data frame
NIC transmits completed frame to transmission medium
NIC notifies OS that frame has been sent
When receiving:
NIC monitors transmission medium for frames
NIC reads frame from transmission medium into buffer using DMA
NIC checks frame contents and calculates checksum to verify integrity of
data
NIC interrupts host OS to indicate that a frame has arrived
8 Two from: 2
10 Five from: 5
Advantages
Removes virus / malicious software that could delete / edit / destroy data
Protect against spyware to prevent theft of confidential / personal
information thus preventing unauthorised access to bank accounts leading
to financial loss
Can help / may protect against spam / phishing emails thus preventing the
divulgence of confidential / personal information
Protect against identity theft that may be a result of stolen confidential /
personal information
Protect against redirection of automatic payments (‘stealware’ or
‘chargeware / affiliate fraud’) to help prevent ’click fraud’
Can help protect / stop unwanted / unauthorised use of computer for crypto-
currency mining
11 Disadvantages
Anti-virus software must be kept up to date in order to combat the most
recent viruses / malicious software
Anti-virus software must be running all the time so places a performance
‘overhead’ on a computer system that may make the system slow / sluggish
/ unresponsive
Anti-virus software will not detect all / every instance / type of malicious
software so perpetrators can find ways around it
...infected websites use malicious code which is often not picked up by anti-
virus software.
12 Six from: 6
Perpetrators are the attackers and include e.g. script kiddies, crackers,
hackers, terrorists, business competitors, (foreign) governments who carry
out the crimes / intrusions
Each type of perpetrator has different skills / aims that can be identified by
an analysis
.. the higher the skill, the higher the risk of crime being perpetrated
Analysis of their actions is carried out by the company / victim agents /
representatives who design / implement the plan for disaster recovery
Allocation of resources to disaster recovery from cyber threats depends on
likelihood of perpetrators succeeding / wishing to / probability of attack on
the company
Analysis will define / determine the type of resource allocated e.g. firewalls /
antivirus / antispyware software
Intrusion detection systems can be deployed to combat the type of
perpetrator identified by the analysis
Resources can be targeted at the type of intruder / risk identified by the
analysis of who / what is likely to be of concern.
Published
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.
Cambridge International will not enter into discussions about these mark schemes.
Cambridge International is publishing the mark schemes for the May/June 2019 series for most
Cambridge IGCSE™, Cambridge International A and AS Level and Cambridge Pre-U components, and
some Cambridge O Level components.
These general marking principles must be applied by all examiners when marking candidate answers.
They should be applied alongside the specific content of the mark scheme or generic level descriptors
for a question. Each question paper and mark scheme will also comply with these marking principles.
• the specific content of the mark scheme or the generic level descriptors for the question
• the specific skills defined in the mark scheme or in the generic level descriptors for the question
• the standard of response required by a candidate as exemplified by the standardisation scripts.
Marks awarded are always whole marks (not half marks, or other fractions).
• marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit
is given for valid answers which go beyond the scope of the syllabus and mark scheme,
referring to your Team Leader as appropriate
• marks are awarded when candidates clearly demonstrate what they know and can do
• marks are not deducted for errors
• marks are not deducted for omissions
• answers should only be judged on the quality of spelling, punctuation and grammar when these
features are specifically assessed by the question as indicated by the mark scheme. The
meaning, however, should be unambiguous.
Rules must be applied consistently e.g. in situations where candidates have not followed
instructions or in the application of generic level descriptors.
Marks should be awarded using the full range of marks defined in the mark scheme for the question
(however; the use of the full mark range may be limited according to the quality of the candidate
responses seen).
Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should
not be awarded with grade thresholds or grade descriptors in mind.
Some graphics software may not support all file types so different export
options allows images to be shared e.g. use of JPEG / GIF is almost
universal
Images can be saved as compressed images / files to save storage space /
allow use in various scenarios / situations e.g. use of JPEG allows
compression by various amounts but the more compression the lower the
quality
GIF allows areas to be made transparent whereas JPEG does not support
this
Different file types support different colour depths for use in various
situations e.g. JPEG supports more colours than GIF
Quality of the image is affected by choice of filetype e.g. TIFF retains better
quality than JPEG / GIF when compressed
Bitmap (BMP) files restrict the use of the images to e.g. Windows OS so
availability of other types allows cross-platform use.
Mark allocation:
method="post"
Specifies the HTTP method to be used when submitting the form
In this case post means not to display the submitted data / used for sensitive
or private / personal data / make the submitted data invisible in the field / will
not allow bookmarking / is not saved in browser history
Post can send unlimited amounts of data so no need to specify the size
enctype="text/plain">
Specifies the encoding of the data
As plain text.
Line
Code
number
3(c) 6
Line
Code
number
Six from:
Risk to data from unauthorised access through remote access via network /
internet
Data can be (more easily) lost / stolen while being replicated / distributed
across remote servers
Large number of people can access the data which leads to theft of data as
there are more people who can be compromised / make errors
Data travels over more networks’ so is more easily compromised / lost /
stolen / corrupted
Supplier of the storage may not be reliable / security aware to same degree
as owner of the data
Supplier of storage may go out of business / change their serve conditions /
be purchased by rival companies
Performance of cloud storage may not be as good as that of local storage
leading to increased access times
Owner of data may have no idea where the data is stored so may not be
aware that is being stored in another country
Owner of data is not responsible for e.g. backups so is reliant on third party
systems to maintain their data integrity
Data is extremely difficult to delete from the cloud
Legal regulations referring to the data / storage systems may be different in
different countries.
Can allow access to data at any time / from anywhere with internet
connection provided one has valid User ID / password
Data can be accessed using different hardware so no need to carry
hardware with you
Company need only purchase / pay for the actual amount of storage needed
Energy use by company can be reduced by not having (large) server farms
for data storage
Number of IT staff can be reduced saving the company the cost of their
employment
Supplier of storage is responsible for e.g. backups / disaster recovery / virus
protection / security of the data.
5 Six from: 6
7 Four from: 4
9 Command word: Evaluate: discuss the importance of, weigh up, the 8
advantages and disadvantages, judge the overall effectiveness, weigh
up your opinions.
Level 0 (0 marks):
Response with no valid content.
Physical barriers such as wall / doors / bars / use of floors other than ground
floor which are cheap and easy to make use of / make use of existing
resources which lowers costs
Use of CCTV which can be placed overtly to deter unauthorised persons
just by their presence or by a warning / notice that watching is occurring /
can be cost effective as a deterrent
Video surveillance can be used to watch large areas with few staff
Physical presence of guards / security staff shows persons that a security
system is in operation
... can deal with issues quickly / immediately
Security lighting / automatic lights / sensor-controlled lights can illuminate
when persons present to act as deterrent / highlight intruders / warn
intruders that they have been seen and these have low cost if e.g. solar
powered
Computer devices can be easily / cheaply / quickly fixed / attached to large
objects / shelving to deter theft
Physical locks require keys that may be lost / key fobs etc may be lost or
stolen / given to unauthorised persons
Combinations to locks can be forgotten
Animator only needs to draw 12 frames instead of the full 24 so saves time /
effort
...fewer animators / less computer time needed for the whole project
(Drawing on ‘twos’) makes slow animations look / appear smoother to the
eye
Less precision / accuracy is needed than for drawing on ‘ones’ (‘ones’
animation does not look jerky) so drawing can be done faster / with less skill
from animator
(Drawing on ‘twos’) makes animations appear more lively / active than when
drawn on ‘ones’.
Six from:
Advantages:
First person / heads up display via headsets can enhance monitoring of
processes in real time from wearers point of view
Can allow enhanced monitoring of employee activity via wearable devices
on shop floor
Can track every step of activity in manufacturing by employee activity
Can allow enhanced / better manufacturing processes via wearable devices
that view / transmit live data from activity
Faults can be directly entered into fault database / expert system of
company
Can improve employee safety due to ability to remotely control machinery
while on shop floor / using wearable devices
Sensors can provide information about environment for working
Disadvantages:
Positioning of devices on body can lead to inaccuracies in the data / actions
performed
Wearable devices need power so have to carry heavy batteries
Wearable devices need charging so have downtime.
Staff may not wish to be monitored.
Published
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.
Cambridge International will not enter into discussions about these mark schemes.
Cambridge International is publishing the mark schemes for the May/June 2019 series for most
Cambridge IGCSE™, Cambridge International A and AS Level and Cambridge Pre-U components, and
some Cambridge O Level components.
These general marking principles must be applied by all examiners when marking candidate answers.
They should be applied alongside the specific content of the mark scheme or generic level descriptors
for a question. Each question paper and mark scheme will also comply with these marking principles.
• the specific content of the mark scheme or the generic level descriptors for the question
• the specific skills defined in the mark scheme or in the generic level descriptors for the question
• the standard of response required by a candidate as exemplified by the standardisation scripts.
Marks awarded are always whole marks (not half marks, or other fractions).
• marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit
is given for valid answers which go beyond the scope of the syllabus and mark scheme,
referring to your Team Leader as appropriate
• marks are awarded when candidates clearly demonstrate what they know and can do
• marks are not deducted for errors
• marks are not deducted for omissions
• answers should only be judged on the quality of spelling, punctuation and grammar when these
features are specifically assessed by the question as indicated by the mark scheme. The
meaning, however, should be unambiguous.
Rules must be applied consistently e.g. in situations where candidates have not followed
instructions or in the application of generic level descriptors.
Marks should be awarded using the full range of marks defined in the mark scheme for the question
(however; the use of the full mark range may be limited according to the quality of the candidate
responses seen).
Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should
not be awarded with grade thresholds or grade descriptors in mind.
1 4
Data becomes easier to interpret
Codes are not too complicated so there are never any errors on
data entry
Coded data makes the computer slower when searching for data
2 4
Laser printers produce very high quality output 3
Dot matrix printers need the ink cartridge changed more frequently
than inkjet printers
Multi-part stationery is easier to use with laser printers than with dot
matrix printers
3 Six from: 6
4 Six from: 6
Other problems
Access to unsuitable video / internet games
An inability to evaluate the quality, accuracy and relevance of information on
the internet
Plagiarism and copyright infringement
Illegal downloading of music or video files
giving rise to the potential for excessive use which may affect the social
and emotional development and learning of the student
Access to illegal, harmful or inappropriate images or other content
5 Six from: 6
Must have at least one difference and one similarity to gain full marks
6 Five from: 5
Open source formats are often called free file formats if they are not covered
by any copyrights/patents
Open file formats can be used by both proprietary and open source software
A proprietary file format has been created by a software company using a
particular encoding scheme...
...designed by the company such that the decoding of this stored data is
only easily done with software that the company itself has developed
The specification of the data encoding format is usually kept secret
It can be published but then its use is restricted through licences such that
only the company itself/ users with licences may use it
7 Four from: 4
9(a) =LOCATE(“,”,A3)
=LOCATE(,A3) 1 mark 1
“,” 1 mark 1
9(b) =LEFT(A3,C3-1)
=LEFT() 1
9(c) =RIGHT(A3,LEN(A3)-C3-1)
=RIGHT(A3, ) 1
LEN(A3) 1
-C3-1) 1
10 Four from: 4
11(a)
Teacher record table Subject record table
ᴕ Teacher_ID 1 ᴕ Subject_code
Family_name Subject_name
First_name Subject_level
Subject_ID Number_of_lessons
∞
Number_of_classes
All Teacher records and Subject records with correctly titled tables 1
Format check to ensure that all licence plates are two letters followed by 1
three digits followed by two letters
Any suitable example not consisting of two letters followed by three digits 1
followed by two letters
13 Eight from: 8
Users with physical handicaps may not be able to use a keyboard or mouse
For reasons of hygiene a doctor may not be allowed to touch a display or
device so need to use gesture based interface
Appropriate gestures is a more hygienic way to control the device
Gestures may be a quicker way of initiating a response from a device
Certain gestures may not be socially acceptable which is not a problem with
the other interfaces
Some gestures may be unintentional but still initiate a reaction from the
device
GUIs tend to be more accurate than relying on gestures
CLI requires user to have to learn many commands unlike the others
CLI commands are more difficult to edit
CLI is more difficult to view different items on one screen when multitasking
CLI processing speed tends to be faster than the others
CLI uses less memory than the others
CLI is less likely to change over time whereas GUIs tend to change regularly
meaning less need to learn how to use a new system
Level 0 (0 marks)
Response with no valid content.
Benefits
Internet tends to be up to date
Internet has vast amounts of information/ wide range of information/ wide
variety of sources
Use of search engines makes it quicker to find information than looking in
books
Multimedia sources are available on the internet unlike text books
Interactive sites can be found on the internet unlike text books
Drawbacks
Danger of accessing inappropriate websites.
Can take long time to find required information
Can access biased/inaccurate websites
Lack of expertise leads to inefficient searching
Easy to plagiarise information
The internet is not regulated
Internet provides a variety of answers so it is difficult to decide which answer
is correct
Published
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.
Cambridge International will not enter into discussions about these mark schemes.
Cambridge International is publishing the mark schemes for the May/June 2019 series for most
Cambridge IGCSE™, Cambridge International A and AS Level and Cambridge Pre-U components, and
some Cambridge O Level components.
These general marking principles must be applied by all examiners when marking candidate answers.
They should be applied alongside the specific content of the mark scheme or generic level descriptors
for a question. Each question paper and mark scheme will also comply with these marking principles.
• the specific content of the mark scheme or the generic level descriptors for the question
• the specific skills defined in the mark scheme or in the generic level descriptors for the question
• the standard of response required by a candidate as exemplified by the standardisation scripts.
Marks awarded are always whole marks (not half marks, or other fractions).
• marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit
is given for valid answers which go beyond the scope of the syllabus and mark scheme,
referring to your Team Leader as appropriate
• marks are awarded when candidates clearly demonstrate what they know and can do
• marks are not deducted for errors
• marks are not deducted for omissions
• answers should only be judged on the quality of spelling, punctuation and grammar when these
features are specifically assessed by the question as indicated by the mark scheme. The
meaning, however, should be unambiguous.
Rules must be applied consistently e.g. in situations where candidates have not followed
instructions or in the application of generic level descriptors.
Marks should be awarded using the full range of marks defined in the mark scheme for the question
(however; the use of the full mark range may be limited according to the quality of the candidate
responses seen).
Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should
not be awarded with grade thresholds or grade descriptors in mind.
1 4
It is often referred to as public key encryption 9
The public key and the private key are published to everyone who
wants to send a message
Anyone with a copy of the public key can read encrypted data
2 4
A virus corrupts files but does not delete them
3 Five from: 5
4 Four from: 4
6 Six from: 6
Legislators
Two from:
Local government representatives would no longer have to attend a meeting
far from their home leading to savings in travel expenses
Representatives can take part in and observe a meeting happening in more
than one location
Problems with video transmissions could lead to misunderstandings / delays
in passing laws
Saves the task of booking a room for a meeting
Business people
Two from:
Do not have to pay for air / train tickets / car running costs to meet with
customers
Do not have to pay for hotel accommodation to meet with customers
Saves the cost of hiring a venue for a meeting
When vital workers in a business have to travel, the business is left
short- handed, possibly for days
Flight cancellations, airport delays, traffic jams will no longer be reasons or
excuses for missing meetings and conferences
Can increase productivity as a worker who has a sick child, for example,
may be able to hold an important meeting even if they have to stay home for
the day
Workers can easily share a word-processed document / spreadsheet with a
manager
Much less personal interaction
Two from:
• Can hold discussions with more than one person who normally would
not travel just for an interview
• Can speak with correspondents based in different countries
simultaneously
• Do not have to wait for eye-witnesses to travel to the tv centre
• Presenters do not have to travel to dangerous areas
• Interviewees do not have to travel and risk arrest / terrorists / attack.
7(a) A primary key is a field in a table which is unique and enables you to identify 1
every record in that table.
A compound key is a primary key that combines more than one foreign key 1
to make a unique value.
The bank will have an electronic copy of the cheque to refer in case of
customer complaints
Can read all the data on the cheque / not limited to MICR characters
Cheques can be processed after being deposited at ATMs
Cheques can be processed having been sent by phone (camera)
9 Five from: 5
10(a) =INT((G$2-C4)/365.25)
INT() 1
(G$2 1
-C4) 1
/365.25 1
10(b)(i) 16 1
4 1
10(b)(ii) 16 1
3 1
10(c) =COUNTIFS(D4:D23,17,E4:E23,3)
=COUNTIFS() 1
(D4:D23 1
10(d) =COUNTIFS(D4:D23,16,E4:E23,4)
=COUNTIFS(D4:D23«.) 1
,16,E4:E23 1
Select query design, in the table row select Books/add Books table and in
the field row, select the fields Title, Author, Publisher and ReplacementCost
In Show row untick Publisher and ReplacementCost
In criteria row under Publisher enter Panda Books
In criteria row under ReplacementCost enter <20
There is no field in the Borrowers table which contains similar data to any
field in the Books table
A field needs to be added to the Borrowers table containing the ISBN
number of the book borrowed
A link / relationship would need to be created between ISBN number in the
Books table and this new field in the Borrower table
ISBN in the borrowers table will be the foreign key
Or a field needs to be added to the Books table containing the ID of the
borrower
A link / relationship would need to be created between ID in the Borrowers
table and this new field in the Books table
ID in the books table will be the foreign key.
12 Eight from: 8
A range check is used to check that data is within the boundaries of a given
range and could be used on the value of the order placed / the date the
order was placed
Data must be greater than a lower limit and less than an upper limit / day
must be greater than 0 and less than 32 / month must be greater than 0 and
less than 13 / year must be greater than« and less than« (accept any
reasonable example)
A type check is used to check that data is of the correct data type and could
be used on the value of the order placed / individual components of the date
the order was placed
Value of order placed must be numeric / components of date must be
numeric
A format check is to check that the data is in the correct format and could be
used on Customer id number / date order placed
Customer ID might be in the form of one letter followed by 6 digits / date
order placed might be 2 numbers followed by a dash followed by 2 numbers
followed by a dash followed by 4 numbers (accept any reasonable example)
A length check is to check that data is of the correct length and could be
used on the Customer ID number / date order placed
Any reasonable example of a length check
Level 0 (0 marks)
Response with no valid content.
Advantages:
Driving schools can test all aspects of driving without worrying about
damaging an expensive car
Can provide results that are generally difficult to measure such as reaction
times
Computer simulation can allow you to see how a system might respond
before you design or modify it avoiding mistakes
It is safer to use a model and simulation for car driving
Can be slowed down to study behaviour more closely
Is easier to create a simulation of a critical event rather than waiting for it to
happen in real life
Is easier to create a simulation of different driving conditions rather than
waiting for it to happen in real life
Disadvantages:
Sometimes there is not sufficient data to produce a mathematical model
Sometimes it is impossible to create simulations that can accurately predict
the occurrence / effects of human behaviour
The formula and functions that are used may not provide an accurate
description of the system resulting in inaccurate output from the simulation
Sometimes simulations can require the use of a computer system with a fast
processor and large amounts of memory which are very expensive
May give drivers a false sense of security regarding their ability to drive.
Published
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.
Cambridge International will not enter into discussions about these mark schemes.
Cambridge International is publishing the mark schemes for the May/June 2019 series for most
Cambridge IGCSE™, Cambridge International A and AS Level and Cambridge Pre-U components, and
some Cambridge O Level components.
These general marking principles must be applied by all examiners when marking candidate answers.
They should be applied alongside the specific content of the mark scheme or generic level descriptors
for a question. Each question paper and mark scheme will also comply with these marking principles.
• the specific content of the mark scheme or the generic level descriptors for the question
• the specific skills defined in the mark scheme or in the generic level descriptors for the question
• the standard of response required by a candidate as exemplified by the standardisation scripts.
Marks awarded are always whole marks (not half marks, or other fractions).
• marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit
is given for valid answers which go beyond the scope of the syllabus and mark scheme,
referring to your Team Leader as appropriate
• marks are awarded when candidates clearly demonstrate what they know and can do
• marks are not deducted for errors
• marks are not deducted for omissions
• answers should only be judged on the quality of spelling, punctuation and grammar when these
features are specifically assessed by the question as indicated by the mark scheme. The
meaning, however, should be unambiguous.
Rules must be applied consistently e.g. in situations where candidates have not followed
instructions or in the application of generic level descriptors.
Marks should be awarded using the full range of marks defined in the mark scheme for the question
(however; the use of the full mark range may be limited according to the quality of the candidate
responses seen).
Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should
not be awarded with grade thresholds or grade descriptors in mind.
1 4
Hard disks are metal platters with a magnetic coating that stores data 9
Magnetic tape drives have moving parts and so are at risk of being
damaged
SSDs have a faster data transfer rate than magnetic tape drives 9
Magnetic tapes are used in laptop computers more than hard disks
SSDs still cost more per gigabyte than hard disk drives 9
SSDs make more noise than the sound of hard disk drives when in
use
2 4
A temperature sensor is able to directly control the temperature of
water in a washing machine
3 Four from: 4
4 Five from: 5
Three from:
6 Eight from: 8
Absolute and relative cell referencing makes sure you only increment the parts
of a formula you need to
allows you to change prices / costs of individual items to see the effect
Cell protection makes sure that the cells you want do not change by
accident
such as fixed costs such as overheads
User interface forms makes it easier to input quantities / costs into the model
Macros make it easier to create more complex formulae or functions
such as comparing different costs simultaneously
Automatic re-calculation means it is not necessary to evaluate a formula every
time you change it
such as changing individual costs / prices
Conditional formatting allows you to highlight certain values that match
specific criteria
such as seeing at a glance which items are making a profit
Values can be changed to ask whatif questions
Graphs can be used to show trends and illustrate forecasts
such as which goods are likely to make profits over time
Goalseek can be used to determine which variables need to be changed to
achieve a target or goal
such as how many goods need to be sold / what price needs to be charged
to make a given profit.
7 Six from: 6
This type of encoding is used to reduce the size of audio and video files
Encoded media file is sometimes similar in quality to the original but has much
smaller file size
however, video compression can be lossy
the compressed video lacks some information present in the original
video
decompressed video has lower quality than the original as there is
insufficient information to accurately reconstruct the original video
Each audio and video file format has a corresponding coder-decoder / codec
program
The codec is used to code it into the appropriate format and then decodes for
playback
Encoding involves the use of a code to change original data into a form that
can be used by an external process
Encoding / decoding often refers to the process of analogue-to-digital / digital-
to-analogue conversion
Can apply to images, audio, video, signals from sensors / control systems.
8(b) 6
Field: FamilyName FirstName Phone Engine Residence Make
Sort:
Show: 9 9 9 9
or:
A format check tests to see if the data is in the correct format such as 5 digits
followed by a space followed by 6 digits for the Phone field
Would be impossible to apply here as all the licence plates all follow a different
pattern
such as 3 letters followed by a space then 3 digits VSE 648, 2 letters
followed by a space then 5 characters SB A5526, 4 digits followed by a space
then 2 letters then a space then 2 digits 1233 CD 33
Lookup check could be used on Make in Car table as there would probably be
a limited number of car makes
Almost impossible to apply here as there are so many possible licence plate
numbers
9(a) =SUM(C4:E4) 1
9(c) =AVERAGEIFS(C4:C13,A4:A13,C15,A4:A13,D15) 6
=AVERAGEIFS() 1 mark
(C4:C13 1 mark
,A4:A13 1 mark
,C15, 1 mark
A4:A13 immediately after ,C15, 1 mark
,D15) 1 mark
Level 0 (0 marks)
Response with no valid content.
Client-server:
A centralised database of usernames and passwords on a server makes
client-server networks more secure
In a client–server network, if the server goes the down whole network gets
affected
With a client-server network users do not need to worry about making
backup
this is managed centrally by a network manager
Upgrading the network is easier with a client-server network as it is easier to
just upgrade the server
Easier for users to access the server in a client-server network using
alternative devices
As new information is uploaded in a database, each computer need not have
its own storage capacity increased as may be the case in peer-to-peer
networks
10 Peer-to-peer:
There is no need to pay for a network manager with a peer-to-peer network
With a peer-to-peer network you do not have to worry about buying expensive
hardware such as servers
does not need a server because individual workstations are used to access
the files
With a peer-to-peer network everything is decentralised so it is more difficult to
manage the network
Much easier to set up than a client-server network as it does not need
specialist knowledge
Because each computer might be being accessed by others it can slow down
the performance for the user unlike client-server
The over-all cost of building and maintaining this type of network is
comparatively cheaper.
11 Eight from: 8
Write your centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.
At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.
DC (JP/CB) 164153/3
© UCLES 2019 [Turn over
2
1 Tick the four statements, referring to different types of application software, which are true.
You must always use web authoring software when creating web pages
2 Tick the four most accurate statements, referring to the digital divide.
The digital divide can exist between the educated and uneducated
The digital divide can exist between those living in rural areas and those living in
urban areas
The digital divide does not exist between people from different economic classes
Most tribal communities have universal mobile phone coverage in their community
The digital divide only refers to those who can and cannot access the internet
The price of connection to the internet tends not to vary between countries
[4]
3 A student is researching the topic of her new assignment. She has been provided with a series of
hard copy magazine articles. She has been told by her tutor that these are probably more reliable
than searching the World Wide Web for information.
Compare and contrast the use of these two types of data sources for her research.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
.................................................................................................................................................... [6]
4 There are many types of systems software including interpreters and device drivers.
(a) In order for a computer to output to a printer it uses a printer driver. This is just one of many
device drivers a computer uses.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
5 A teacher has reminded her students to proof read their assignments before they hand them in.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
.................................................................................................................................................... [4]
6 Many mobile phone companies, in the past, persuaded customers to move from 3G to 4G.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
.................................................................................................................................................... [6]
© UCLES 2019 9626/12/F/M/19 [Turn over
6
7 Mumbai Stores is a company which has a chain of shops. The company stores the customers’
reference number, and the value of the goods they have purchased, in a transaction file. Any
payments the customers have made on their account at the end of the month are also stored in
the same file.
The Goods_bought field contains only the value of goods bought using the account’s credit
facilities.
The Master file shows the customers reference number, the money they owe from the previous
month (Old_balance) and the money they now owe (New_balance).
The New_balance has to be calculated by using the Old_balance, Goods_bought and any
Payment made. All these values are in rupees.
(a) Describe the processes that must happen to the Transaction file before the Master file can be
updated.
. ..................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
. ..................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
(b) Using this data, explain how the Master file is updated using the Transaction file shown. You
may assume that the only transaction being carried out is the calculation of the New_balance.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [6]
(c) Each customer has a credit limit of 20000₹. Customers must make a payment of at least
2000₹ each month.
Using examples from the Transaction file, explain why it would be appropriate to use a range
check on one field and a limit check on another field.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [5]
8 Rishu has been asked by the directors of the company she works for to set up a fully functioning
video-conferencing room. It will be used by several workers at the same time to communicate with
the directors who will be in a different building.
Describe, including a use of each item, the hardware she will need to purchase.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
.................................................................................................................................................... [6]
9 Describe the differences between health issues and safety (apart from e-safety) issues experienced
by employees in an IT-based work environment.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
.................................................................................................................................................... [6]
10 Jasvir owns a gardening equipment hire shop. She has developed a simple database system
which contains information about the equipment. Each record contains the following data:
Equipment_name, Manufacturer, Equipment_code (a six character code), Hire_price, Number_
of_days_hired, Date_hired, Customer_number and Loyalty_customer (Y/N).
Design an appropriate online data entry form for one item of equipment, clearly indicating the
amount of space required for each field. Use the computer screen shown below for your design.
Where appropriate allow the user to enter data by clicking the mouse rather than entering text.
[8]
11 Juanita is the company secretary of a small business in the USA. She has created a spreadsheet
to calculate the payroll.
The spreadsheet is shown below.
A B C D E F G H I J K L
1 Roles
2 L F OS M D
Office
Labourer Fitter Manager Director
3 secretary
4 $15 $25 $22 $40 $80 Hourly rate
5 Job codes Job title Hours worked Weekly pay
6
7 John Vercoe L Labourer 40 $600
8 Lauren Hall OS Office secretary 38 $836
9 Chloe Rhodes F Fitter 39 $975
10 Owen Williams OS Office secretary 42 $924
11 Lotte Charles L Labourer 35 $525
12 Jeannie Burke OS Office secretary 38 $836
13 Jimmy Lee F Fitter 40 $1,000
14 Dawid Jones F Fitter 32 $800
15 Li Sun Wu M Manager 45 $1,800
16 Charlotte Watson D Director 50 $4,000
17 Joe Norfolk M Manager 41 $1,640
18 Joanne Floyd F Fitter 38 $950
19 Anthony Campbell F Fitter 40 $1,000
20 Linda Stuart L Labourer 38 $570
21 Kate Smith L Labourer 37 $555
22 Sam Smith OS Office secretary 40 $880
23 Duncan Rydell L Labourer 36 $540
24 Tony Thomson L Labourer 37 $555
25 Dougie Ryder OS Office secretary 41 $902
26
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
(b) She entered a formula in E7 using the named range and the information in column B to
calculate the weekly pay for John Vercoe.
Write down the formula she used. This formula should be easy to replicate.
= ................................................................................................................................................
............................................................................................................................................. [6]
You can use the space below for any working you need.
12 A recent development in backing storage of laptop computers has been the increased use of solid
state drives (SSDs). However hard disk drives (HDDs) are still used in many laptops.
Evaluate the use of SSDs and HDDs for storing data in laptop computers.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
.................................................................................................................................................... [8]
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
.................................................................................................................................................... [8]
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.
Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of
Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge.
Write your centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.
At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.
DC (RW/CB) 164157/3
© UCLES 2019 [Turn over
2
1 Errors in JavaScript code can cause the code to fail to execute when run by a web browser. The
code shown is intended to display a table on a web page when run in a web browser.
The line numbers are shown only for your convenience when referencing the code in your
answers.
1 <html>
2 <body>
3 <script language="JavaScript">
4 tableout = "<table border='1' width='300' cellspacing='0'
cellpadding='3'>"
5 for (b = 1; b <= 10; b++) {
6 tableout = tableout + "<tr>":
7 for (g = 1; g <= 10; g++) {
8 tableout = tableout + "<td>" + b * g + "</td>";
9 }
10 tableout = tableout + "</tr>";
11 }
12 tableout = tableout + "</table>";
13 document.write (tableout);
14 </script>
15 </body>
16 </html>
(a) The code does not run as intended in web browsers because there is an error in the code.
Describe how the error in the code prevents the web browser from running as intended.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
(b) Errors can be ‘trapped’ in order that the performance of the web browser is not affected.
Explain how you can use error handling techniques to trap errors in JavaScript code.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [5]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
(b) Two types of online tutorial are ‘recorded’ and ‘interactive’. ‘Recorded’ tutorials do not require
user input, but ‘interactive’ tutorials do.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
3 Evaluate the use of quantum cryptography when transmitting confidential data over public
networks.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
.................................................................................................................................................... [8]
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [1]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
(c) Discuss the impact on society of the use of image editing on photographs in fashion
magazines.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [8]
(a) Describe two benefits of being able to produce artificial blood vessels by 3D printing.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
(b) Describe how 3D printing could be used, apart from producing drugs at home, to improve the
effectiveness of the manufacture of prescription drugs.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
(c) Describe the drawbacks of using 3D printing at home to produce prescription drugs.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
6 A company sells glass for installation into rectangular windows. The company cannot make glass
for windows with dimensions smaller than width 12 cm and height 8 cm. The price of a window
is calculated by working out the area of the window and multiplying it by the cost per square
centimetre (cm2), which is 20₹.
a
Area of window = a × b
Price = area × cost per cm2
b
A spreadsheet with formulas has been created to carry out these calculations.
A B C D
1 These cells will be validated
using a range check
2 Input a 14 cm
3 Input b 9 cm
4
5
6 Area is: 126 cm2
7 Cost per cm2 is: 20 rupees
8 Price is: 2520 rupees
9
10
A test plan must be created to fully test the spreadsheet before the company use it.
Use this table to design a suitable test plan for this spreadsheet.
[8]
© UCLES 2019 9626/32/F/M/19 [Turn over
12
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
.................................................................................................................................................... [8]
8 The owners of a bank are replacing its current system by transferring all accounts and processes
to a new computer system. They have to be sure that the new system will carry out all the functions
of the old system.
It is essential that there is no interruption in the services provided by the bank’s computer system
to its staff and customers.
Choose the most appropriate method of implementation and explain how the new system will be
implemented.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
.................................................................................................................................................... [8]
9 The manager of a small shop is creating a new relational database that will store details of the
goods sold by the shop. It will also store details of the suppliers of these goods. The manager
collects the details that are shown on the labels attached to the goods. He gathers the details of
the suppliers from a notebook that he keeps. Five examples of labels are shown:
Price $2 Price $3
Sell by date N/A Sell by date Dec 2019
Item Rice
Quantity/pkt 5 ½ kg sack
The shop can obtain all of its goods from any of these four suppliers:
Shop Suppliers Inc Sugar Suppliers plc General Shop Cash & Carry Goods
Bury St Edmunds Wholesalers
PO Box 2300 2500 Newmarket Rd 65a Board View
Suffolk Cambridge
Pennsylvania Av IP66 7ES CB6 5PE Milford Haven
Washington DC Dyfed
United Kingdom
20500 UK
SA85 2NX
Create a suitable data dictionary for the new relational database to store the shop’s goods and
supplier details.
[8]
It uses message, circuit and packet switching technologies for the communications.
Describe the differences between these three technologies as used in communicating these
messages.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
.................................................................................................................................................... [8]
11 A company has developed a new product. Its market research department has decided to use
chat rooms to gather information from potential customers about the product.
Explain why they would use a chat room rather than other social networking methods to gather the
customer information.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
.................................................................................................................................................... [6]
BLANK PAGE
BLANK PAGE
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.
Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of
Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge.
Published
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.
Cambridge International will not enter into discussions about these mark schemes.
Cambridge International is publishing the mark schemes for the March 2019 series for most Cambridge
IGCSE™, Cambridge International A and AS Level components and some Cambridge O Level components.
These general marking principles must be applied by all examiners when marking candidate answers.
They should be applied alongside the specific content of the mark scheme or generic level descriptors
for a question. Each question paper and mark scheme will also comply with these marking principles.
• the specific content of the mark scheme or the generic level descriptors for the question
• the specific skills defined in the mark scheme or in the generic level descriptors for the question
• the standard of response required by a candidate as exemplified by the standardisation scripts.
Marks awarded are always whole marks (not half marks, or other fractions).
• marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit
is given for valid answers which go beyond the scope of the syllabus and mark scheme,
referring to your Team Leader as appropriate
• marks are awarded when candidates clearly demonstrate what they know and can do
• marks are not deducted for errors
• marks are not deducted for omissions
• answers should only be judged on the quality of spelling, punctuation and grammar when these
features are specifically assessed by the question as indicated by the mark scheme. The
meaning, however, should be unambiguous.
Rules must be applied consistently e.g. in situations where candidates have not followed
instructions or in the application of generic level descriptors.
Marks should be awarded using the full range of marks defined in the mark scheme for the question
(however; the use of the full mark range may be limited according to the quality of the candidate
responses seen).
Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should
not be awarded with grade thresholds or grade descriptors in mind.
1 4
You can use word processing software to create tables of data 3
You must always use web authoring software when creating web
pages
2 4
The digital divide can exist between the educated and uneducated 3
The digital divide can exist between those living in rural areas and
3
those living in urban areas
The digital divide does not exist between people from different
economic classes
The digital divide only refers to those who can and cannot access
the internet
3 Six from: 6
5 Four from: 4
6 Six from: 6
Similarities:
Both are types of mobile network
Both allow smart phones to access the WWW
Both allow video calling on phones
Both allow emails to be sent by phone
Both allow videos and music to be downloaded to a phone
Both allow phones to be used as a SATNAV
Differences:
4G has faster download speeds than 3G
4G enables smoother browsing with web pages failing to load, very rare
unlike 3G
4G allows videos and music to be streamed without the buffering and
freezing found on 3G networks
Batteries last longer on 3G than on 4G
3G data allowance tends to be cheaper than 4G
Use a range check on the Payment field between 2000 and 20000
As customers must make a payment of at least 2000₹ and customers have
a credit limit of 20000₹
Have a limit check on the Goods_bought field as they cannot be more than
20000₹
customers have a credit limit of 20000₹
It is impossible to spend less than 0₹
so a lower limit to the range is unnecessary
A limit check has only one limit but a range check has two – an upper and
lower limit
8 Six from: 6
9 Six from: 6
Health issues tend to be RSI/carpal tunnel syndrome, lower back pain, eye
strain, headaches, upper back pain, neck pain, shoulder pain (must have at
least two)
10 Eight from: 8
Click the Name box at the left end of the formula bar 1
Or
Select G2:K4 1
On the Formulas tab, in the Defined Names group, click Define Name 1
In the New Name dialog box type Roles and press enter 1
11(b) =D7*HLOOKUP(B7,Roles,3,FALSE) 6
12 Eight from: 8
Evaluation based on:
Level 0 (0 marks)
Response with no valid content.
Disk encryption:
Advantages
Files encrypted by one user cannot be opened by another user if they do not
possess appropriate permissions
After encryption a file remains encrypted regardless of where it is moved
Encryption can be used on any files including executable files
Users with permission to decrypt a file are able to work with the file without
experiencing any restrictions/difficulties
Other users receive a restricted access notification when they attempt to
access the encrypted file
Disadvantages
If the password is lost or reset it becomes impossible to gain access to files
on the drive
If the operating system fails it becomes impossible to gain access to files
If the operating system has to be reinstalled it becomes impossible to gain
access to files...
...data can be lost irreversibly
13 Email encryption:
Advantages
As modern technology becomes more sophisticated, so do hackers so
sophisticated encryption is essential
Passwords on email accounts are not enough
Email providers tend not to automatically encrypt email messages nor
attachments
Without encryption a person/malware could potentially read someone's
emails
The recipient’s email provider server may not be secured
Without encryption, messages can be stored as plain text, making it easy for
anyone to read and understand
When encrypting emails, the text stored in the message and files are
scrambled up both in storage and transit...
...the only way to unscramble and read the content is to use a decryption
key
Disadvantages
Hackers can still intercept and delete emails
Encrypting emails to a new recipient using a private key requires the key to
be sent which can be intercepted by a hacker
Managing digital certificates can become complex and time consuming.
Published
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.
Cambridge International will not enter into discussions about these mark schemes.
Cambridge International is publishing the mark schemes for the March 2019 series for most Cambridge
IGCSE™, Cambridge International A and AS Level components and some Cambridge O Level components.
These general marking principles must be applied by all examiners when marking candidate answers.
They should be applied alongside the specific content of the mark scheme or generic level descriptors
for a question. Each question paper and mark scheme will also comply with these marking principles.
• the specific content of the mark scheme or the generic level descriptors for the question
• the specific skills defined in the mark scheme or in the generic level descriptors for the question
• the standard of response required by a candidate as exemplified by the standardisation scripts.
Marks awarded are always whole marks (not half marks, or other fractions).
• marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit
is given for valid answers which go beyond the scope of the syllabus and mark scheme,
referring to your Team Leader as appropriate
• marks are awarded when candidates clearly demonstrate what they know and can do
• marks are not deducted for errors
• marks are not deducted for omissions
• answers should only be judged on the quality of spelling, punctuation and grammar when these
features are specifically assessed by the question as indicated by the mark scheme. The
meaning, however, should be unambiguous.
Rules must be applied consistently e.g. in situations where candidates have not followed
instructions or in the application of generic level descriptors.
Marks should be awarded using the full range of marks defined in the mark scheme for the question
(however; the use of the full mark range may be limited according to the quality of the candidate
responses seen).
Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should
not be awarded with grade thresholds or grade descriptors in mind.
Add specific code to deal with the errors transparently/without affecting the
web browser
Specify block of code to be tested
Add some code produce output that depends on (the type of) error
encountered
Use try() block of code to be tested
Use catch() to define the error handling code
Use final() to allow code to be executed/run
Use throw() to display information about the error/error message
Specify the text to be displayed on screen as a result of the error.
A self-study activity
Has a specific learning outcome
Delivered via internet/network.
3 Command word: Evaluate: discuss the importance of, weigh up, the 8
advantages and disadvantages, judge the overall effectiveness, weigh up
your opinions.
Candidates will explain the benefits and drawbacks of the use of quantum
cryptography when transmitting confidential data over public networks.
For the most part, the information will be relevant and presented in a
structured and coherent format.
There may be a reasoned conclusion/opinion.
Subject specific terminology will be used appropriately and for the most part
correctly.
4(c) Command word: Discuss: give important arguments for and against. Often 8
requires a conclusion.
6 Eight from: 8
Test Number/No.
What is being tested
Type of test data used
Expected result
Actual result
Comments on results
Action (to be) taken
Use of normal, extreme and abnormal data for inputs a and b/in cells B2 and
B3
Example data given/used for test
Test of (any) message that appears when invalid data entered
Calculation of area by formula in cell B6
Calculation of total price by formula in cell B8.
7 Command word: Evaluate: discuss the importance of, weigh up, the 8
advantages and disadvantages, judge the overall effectiveness, weigh up
your opinions.
Eight from:
8 Eight from: 8
Install and start the new system alongside the old system
Copy/set up all accounts services to the new system
Allow some staff and some/new customers to use services on new system
Switch all services to new system once it is installed and running
Compare results from new system/performance of new system with
old/current system over a period of time
Period of time long enough to test/try all provided services
Keep old/current system running to ensure that no features are lost/in case
new system fails
Ensure that all services are duplicated properly/in full
No perceived difference in services by staff or customers
Revert to old/current system if new system needs to be
updated/amended/maintained during testing/parallel running time period
Once new system has proved successful complete switch to new system
Retain old system as backup in case of failure of new system for a period of
time/archive.
Mark allocation:
10 Eight from: 8
Packet switching breaks the message into discrete data packets whereas
message and circuit may not do so
Packet switching can introduce delays as packets may travel via different
routes whereas message and circuit switching do not
Packet and message switching make more efficient use of the capacity of
the transmission medium than does circuit switching
Circuit switching keeps the circuit connected for the whole of the duration of
the transmission whereas message and switching do not
Circuit switching uses the full bandwidth of the transmission medium
whereas message and packet switching do not
Circuit switching can guarantee a higher quality of service compared to the
other methods
Message switching can be less secure because messages are stored
(temporarily) at nodes
Circuit switching can guarantee a higher level of security of data compared
to the other methods
Others can use the same communication channel when packet switching is
used whereas this is not possible when message and circuit switching is
used.
11 Six from: 6
Write your centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.
At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.
DC (CE/SG) 168823/2
© UCLES 2019 [Turn over
2
1 Tick the four most accurate statements regarding the benefits of gathering data from direct data
sources.
You have full control over the method used to collect the data
A much larger sample size can be used than is possible with indirect data sources
There may be an opportunity to sell the data to other people for them to use
You do not have to spend time interviewing people or giving out questionnaires
The source of the data is known exactly, making it easier to judge its reliability
[4]
2 Tick the four most accurate statements regarding the gathering of personal data by unauthorised
persons.
Pharming involves sending a website URL, inviting the receiver to go to the website
Smishing involves using text messages to persuade people to give out personal
information
Phishing involves installing malicious software on the victim’s computer
Pharming involves creating a fake website that looks like an actual bank’s website
Phishing involves the sending of fake emails in order to advertise the bank
Vishing involves the fraudster’s computer redirecting a customer’s phone call to his
own phone
Banks can ask you from time to time to send them your full password to check you
are authorised to use that account
Vishing involves receiving a phone call from a fraudster
Smishing is the same as vishing but never involves the use of a phone
[4]
...................................................................................................................................................
............................................................................................................................................. [1]
(b) Giving brief descriptions of two examples, define the term utility software.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
.................................................................................................................................................... [4]
5 When creating queries, a function IIf() is often used. A table containing a list of where people live
and their status could exist so that a query could be constructed:
IIf([Living_in]=“own home”,“own”,“other”)
This would look in a list of where people lived for the words ‘own home’ and would output the word
‘own’ if a match were found. If it was not ‘own home’ then the word ‘other’ is output.
(a) Complete the nested query that would be used to output ‘rented’ for anyone living in
accommodation owned by a landlord. This is indicated by the word ‘landlord’ in the Living_in
field (see table on page 5).
............................................................................................................................................. [6]
You can use the space below for any working you need.
Describe the steps required to produce this output (from the query in part (a)), without using a
wizard.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [5]
6 John, a user interface designer, has been asked by a systems analyst to design an interface for a
proposed information system. He will need to consider a mental model of the potential users of the
system.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
(b) Describe the features of a user interface which need to be considered when planning its
design. Where appropriate, give examples of each feature.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [5]
7 A hospital has installed video-conferencing equipment so that senior doctors in the hospital can
stay in touch with other doctors who work in areas away from the hospital.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
.................................................................................................................................................... [8]
8 Roger has decided to set up a mail order company. He needs to create a database of customer
records and orders. He is not sure whether to create a flat file database or a relational database.
Explain the differences between a flat file database and a relational database.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
.................................................................................................................................................... [8]
9 Computer networks can often be classified as consisting of two types, peer-to-peer and client-
server networks.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
.................................................................................................................................................... [5]
10 Expert systems often use a mixture of forward chaining and backward chaining to determine the
probable solution to a problem.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
11 Here is a spreadsheet showing the medal winners at some of the 2016 Olympics swimming
events.
A B C D E F G H I J K L M N O P Q
Average
Code of speed
1 Country code Country name Gold Silver Bronze Swimmer Distance Stroke Gender Position country Time (secs) (m/s) Name of country
2
3 AUS Australia 1 0 1 Kyle Chalmers 100m Freestyle M 1 AUS 47.58 2.10 Australia
4 BEL Belgium 0 1 0 Pieter Timmers 100m Freestyle M 2 BEL 47.80 2.09 Belgium
5 CAN Canada 1 1 0 Nathan Adrian 100m Freestyle M 3 USA 47.85 2.09 United States
6 CHN China 1 0 0 Penny Oleksiak 100m Freestyle F 1 CAN 52.70 1.90 Canada
7 GBR Great Britain 1 0 0 Simone Manuel 100m Freestyle F 2 USA 52.71 1.90 United States
8 RSA South Africa 0 2 0 Sarah Sjostrom 100m Freestyle F 3 SWE 52.99 1.89 Sweden
9 SWE Sweden 1 1 1 Adam Peaty 100m Breaststroke M 1 GBR 57.13 1.75 Great Britain
10 USA United States 1 1 4 Cameron Van der Burgh 100m Breaststroke M 2 RSA 58.69 1.70 South Africa
11 Codey Miller 100m Breaststroke M 3 USA 58.87 1.70 United States
12 Sarah Sjostrom 100m Butterfly F 1 SWE 55.48 1.80 Sweden
13 Penny Oleksiak 100m Butterfly F 2 CAN 56.46 1.77 Canada
14 Dana Vollmer 100m Butterfly F 3 USA 56.63 1.77 United States
15 Yang Sun 200m Freestyle M 1 CHN 104.65 1.91 China
16 Chad Le Clos 200m Freestyle M 2 RSA 105.20 1.90 South Africa
17 Conor Dwyer 200m Freestyle M 3 USA 105.23 1.90 United States
18 Katie Ledecky 200m Freestyle F 1 USA 113.73 1.76 United States
19 Sarah Sjostrom 200m Freestyle F 2 SWE 114.08 1.75 Sweden
20 Emma McKeon 200m Freestyle F 3 AUS 114.92 1.74 Australia
(a) Write down the formula which should go in cell D3 to calculate the number of gold medals
that Australia won in the events. The formula should be easily replicable to show the number
of gold medals won by the other countries.
The formula should work even if the swimmer details are changed.
= .......................................................................................................................................... [6]
You can use the space below for any working you need.
(b) The average speed of each swimmer is calculated by dividing the distance swum by the time
taken in seconds.
Write down the formula which should go in cell P3 to calculate Kyle Chalmers’ speed. The
formula should be easily replicable to show the speeds of the other swimmers.
= .......................................................................................................................................... [5]
You can use the space below for any working you need.
(c) Explain how you would amend the spreadsheet so that the cells between M3 to M20 could
only accept the country codes listed. If any other code was input an error message informing
the user an error had occurred would be output.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
(d) Explain how you would sort the data so that all the female swimmers were grouped together
before the male swimmers and with the furthest distance at the top.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
12 The principal of a college wishes to keep records of all his students’ details including exam scores.
He is not sure whether he should use a spreadsheet or a database to do this.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
.................................................................................................................................................... [8]
BLANK PAGE
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.
Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of
Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge.
Write your centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.
At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.
DC (KN) 188711
© UCLES 2019 [Turn over
2
1 An online retailer sells his goods through his website. He has used e-business software to create
an online store.
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
(b) Apart from the shopping cart, describe, including their use, the software or software modules
that the retailer used to set up the online store.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [8]
2 (a) Describe three different networking protocols that would be used for data transfer on a LAN.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
(b) Describe how data is transmitted between a device and a wireless access point.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
(c) Some of the company’s devices can connect to other devices using Bluetooth instead of
WiFi.
Compare and contrast the use of Bluetooth with WiFi for data transfer.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [6]
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
.................................................................................................................................................... [3]
4 Evaluate the use of questionnaires in comparison to interviews and observation when collecting
data.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
.................................................................................................................................................... [8]
5 A software company has employed a team of programmers to create a new computer game.
The project must be completed within four weeks. The team will work five days each week. The
programming team have divided the project into eight activities. Some activities can be carried out
at the same time while others have to wait until the preceding activity or activities are completed.
(a) Complete the chart below to create a Gantt chart from the table.
Use the following chart for any working out you need. Please note, any work in this grid will NOT be
marked.
(b) Identify the activities which form the critical path and give the length of this path.
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
6 Discuss the benefits and drawbacks of using ethernet cables containing copper within a computer
network.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
.................................................................................................................................................... [8]
7 (a) Describe the benefits of using back-ups to prevent loss of data from computer systems.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
(b) Describe the drawbacks of using back-ups to prevent loss of data from computer systems.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
.................................................................................................................................................... [6]
BLANK PAGE
9 A company has two sites, A and B. Its staff work in either of the two sites and can access their files
offsite because the company uses cloud computing technology for storing files.
The connections at the locations marked X provide security for the company’s data.
Wireless
Access Points
D Hotel C
Mobile use of X rooms
laptops and
smartphones Internet
cafe
Wireless
Access Points
Wireless
Access Points
Site B Company private network
Wireless
Access Points
Mobile use of
smartphones
and laptops
(a) Explain the role of the hardware and software that would be at locations marked as X.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [8]
(b) Explain why staff are discouraged from accessing their files from locations C and D.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
10 A new photograph of a person in her office is required but the person is not available for the photo
shoot.
Explain how the image of the person in Fig. 10.1 was extracted and placed in Fig. 10.2.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
.................................................................................................................................................... [6]
BLANK PAGE
11 The area of a rectangle can be calculated using the JavaScript embedded in a web page as
shown below.
1 <html>
2 <body>
3 <script>
4 var length = parseFloat(prompt("Enter length of the rectangle : "));
5 var width = parseFloat(prompt("Enter width of the rectangle : "));
6
7 var calc_area = (length * width);
8
9 document.write("<br>");
10 document.write("<h3> Area of a rectangle</h3>");
11 document.write("<font face='arial' size='3'>")
12 document.write(" The sides of the rectangle are " + length + " by " +
width + ".</font><br>");
13 document.write("<font face='arial' size='3'>")
14 document.write(" The area of the rectangle is " + calc_area +
".</font><br>");
15
16 </script>
17 </body>
18 </html>
19
Explain, with reference to the code shown, how the JavaScript collects the dimensions of the
rectangle, calculates the area and displays the area on-screen.
The lines of the code are numbered only for your convenience when referring to the code.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
.................................................................................................................................................... [6]
BLANK PAGE
BLANK PAGE
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.
Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of
Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge.
Write your centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.
At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.
DC (PQ/CB) 175866/3
© UCLES 2019 [Turn over
2
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
(b) Describe how node editing can be used to change a vector image.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
2 A director of a building company is overseeing a large number of projects that are managed using
project management software.
Describe, with reasons, the most appropriate type of project management software that each of
the mentioned personnel could use to manage the projects.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
.................................................................................................................................................... [6]
This script is intended to display the contents of three variables on a web page.
Line numbers are provided only for your convenience when referring to the code.
1 <html>
2 <body>
3
4 <p id="names"> </p>
5 <script>
6 var statementtxt1 = "It's only me, 'Hardeep'";
7 var statementtxt2 = "His name is "Peter"";
8 var statementtxt3 = "We call her Jasmine";
9 document.getElementById( 'names' ).innerHTML = statementtxt1 + "<br>"
+ statementtxt2 + "<br>" + statementtxt3;
10 </script>
11 </body>
12 </html>
Explain, giving reasons, why no output is produced when this JavaScript is executed by a web
browser as part of a web page.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
.................................................................................................................................................... [3]
BLANK PAGE
Line numbers are provided only for your convenience when referring to the code.
1 <html>
2 <body>
3 <p id="foodcrops"></p>
4 <script>
5 var crops = ["corn", "rice", "maize", "sugarcane"];
6 var i = 0;
7 var show = "";
8 while (crops[i]) {
9 show += crops[i] + "<br>";
10 i++;
11 }
12 document.getElementById("foodcrops").innerHTML = show;
13 </script>
14 </body>
15 </html>
(a) Explain, in detail, how the JavaScript code produces this list from an array.
corn
rice
maize
sugarcane
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
© UCLES 2019 9626/32/O/N/19
7
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [8]
(b) Explain how you would amend the existing JavaScript code to add ‘beans’ to the array so that
it would produce this list.
beans
corn
rice
maize
sugarcane
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
.................................................................................................................................................... [8]
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
.................................................................................................................................................... [6]
7 Robotic delivery systems are being used by organisations to deliver goods direct to customers.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
.................................................................................................................................................... [8]
8 A bank stores details of customer accounts on its computer system. Customers and staff can
access the accounts by logging in to the bank’s website.
(a) Describe the security methods that could be used to ensure that the person logging in is
authorised to do so.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [6]
(b) The bank insists that its staff use a VPN when accessing the accounts from outside the bank’s
intranet.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [6]
9 Compare and contrast the use of a Massive Open Online Course (MOOC) with the use of online
tutorials.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
.................................................................................................................................................... [6]
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
.................................................................................................................................................... [4]
11 Fig. 11.1 shows a photograph of a scene. Fig. 11.2 shows the same scene after the photograph
has been edited with image editing software.
Describe how image editing tools could have been used to change the photograph in Fig. 11.1 into
that in Fig. 11.2.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
.................................................................................................................................................... [8]
12 A new app has been created for smartphones, but is unreliable due to some unknown coding
errors.
A group of testers has been asked to locate the errors and suggest, in a report, corrections that
should be made to the code before the app is ready for sale. The testers have been given a list of
milestones to record their progress. These are shown:
Milestones to be reached:
1 Check that the plan will solve the unreliability issue.
2 Create a plan to correct the code.
3 Create a theory as to which lines/areas/blocks/sections of code are causing the unreliability.
4 Document the results of the testing in a report.
5 Download and install app on the smartphone.
6 Identify the problem with the code by running the app.
7 Suggest corrections that could correct the unreliability.
8 Test the suggested corrections.
9 Test the theory to see if the unreliability can be replicated elsewhere.
List, by writing the number of the milestone, the order in which these milestones should be reached
by the testers.
.............................
.............................
.............................
.............................
.............................
.............................
.............................
.............................
............................. [5]
13 Computer Aided Design software has been used to create a design for a new kitchen as shown:
Describe how the software tools would have been used to create the plan and the images from it.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
.................................................................................................................................................... [4]
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
.................................................................................................................................................... [4]
BLANK PAGE
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.
Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of
Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge.
Write your centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.
At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.
DC (JP/CB) 176306/3
© UCLES 2019 [Turn over
2
1 An online retailer sells his goods through his website. He has used e-business software to create
an online store.
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
(b) Apart from the shopping cart, describe, including their use, the software or software modules
that the retailer used to set up the online store.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [8]
2 (a) Describe three different networking protocols that would be used for data transfer on a LAN.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
(b) Describe how data is transmitted between a device and a wireless access point.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
(c) Some of the company’s devices can connect to other devices using Bluetooth instead of
WiFi.
Compare and contrast the use of Bluetooth with WiFi for data transfer.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [6]
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
.................................................................................................................................................... [3]
4 Evaluate the use of questionnaires in comparison to interviews and observation when collecting
data.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
.................................................................................................................................................... [8]
5 A software company has employed a team of programmers to create a new computer game.
The project must be completed within four weeks. The team will work five days each week. The
programming team have divided the project into eight activities. Some activities can be carried out
at the same time while others have to wait until the preceding activity or activities are completed.
(a) Complete the chart below to create a Gantt chart from the table.
Use the following chart for any working out you need. Please note, any work in this grid will NOT be
marked.
(b) Identify the activities which form the critical path and give the length of this path.
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
6 Discuss the benefits and drawbacks of using ethernet cables containing copper within a computer
network.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
.................................................................................................................................................... [8]
7 (a) Describe the benefits of using back-ups to prevent loss of data from computer systems.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
(b) Describe the drawbacks of using back-ups to prevent loss of data from computer systems.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
.................................................................................................................................................... [6]
BLANK PAGE
9 A company has two sites, A and B. Its staff work in either of the two sites and can access their files
offsite because the company uses cloud computing technology for storing files.
The connections at the locations marked X provide security for the company’s data.
Wireless
Access Points
D Hotel C
Mobile use of X rooms
laptops and
smartphones Internet
cafe
Wireless
Access Points
Wireless
Access Points
Site B Company private network
Wireless
Access Points
Mobile use of
smartphones
and laptops
(a) Explain the role of the hardware and software that would be at locations marked as X.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [8]
(b) Explain why staff are discouraged from accessing their files from locations C and D.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
10 A new photograph of a person in her office is required but the person is not available for the photo
shoot.
Explain how the image of the person in Fig. 10.1 was extracted and placed in Fig. 10.2.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
.................................................................................................................................................... [6]
BLANK PAGE
11 The area of a rectangle can be calculated using the JavaScript embedded in a web page as
shown below.
1 <html>
2 <body>
3 <script>
4 var length = parseFloat(prompt("Enter length of the rectangle : "));
5 var width = parseFloat(prompt("Enter width of the rectangle : "));
6
7 var calc_area = (length * width);
8
9 document.write("<br>");
10 document.write("<h3> Area of a rectangle</h3>");
11 document.write("<font face='arial' size='3'>")
12 document.write(" The sides of the rectangle are " + length + " by " +
width + ".</font><br>");
13 document.write("<font face='arial' size='3'>")
14 document.write(" The area of the rectangle is " + calc_area +
".</font><br>");
15
16 </script>
17 </body>
18 </html>
19
Explain, with reference to the code shown, how the JavaScript collects the dimensions of the
rectangle, calculates the area and displays the area on-screen.
The lines of the code are numbered only for your convenience when referring to the code.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
.................................................................................................................................................... [6]
BLANK PAGE
BLANK PAGE
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.
Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of
Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge.
Write your centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.
At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.
DC (PQ) 183622
© UCLES 2019 [Turn over
2
1 Tick the four most accurate statements regarding the benefits of gathering data from direct data
sources.
You have full control over the method used to collect the data
A much larger sample size can be used than is possible with indirect data sources
There may be an opportunity to sell the data to other people for them to use
You do not have to spend time interviewing people or giving out questionnaires
The source of the data is known exactly, making it easier to judge its reliability
[4]
2 Tick the four most accurate statements regarding the gathering of personal data by unauthorised
persons.
Pharming involves sending a website URL, inviting the receiver to go to the website
Smishing involves using text messages to persuade people to give out personal
information
Phishing involves installing malicious software on the victim’s computer
Pharming involves creating a fake website that looks like an actual bank’s website
Phishing involves the sending of fake emails in order to advertise the bank
Vishing involves the fraudster’s computer redirecting a customer’s phone call to his
own phone
Banks can ask you from time to time to send them your full password to check you
are authorised to use that account
Vishing involves receiving a phone call from a fraudster
Smishing is the same as vishing but never involves the use of a phone
[4]
...................................................................................................................................................
............................................................................................................................................. [1]
(b) Giving brief descriptions of two examples, define the term utility software.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
.................................................................................................................................................... [4]
5 When creating queries, a function IIf() is often used. A table containing a list of where people live
and their status could exist so that a query could be constructed:
IIf([Living_in]=“own home”,“own”,“other”)
This would look in a list of where people lived for the words ‘own home’ and would output the word
‘own’ if a match were found. If it was not ‘own home’ then the word ‘other’ is output.
(a) Complete the nested query that would be used to output ‘rented’ for anyone living in
accommodation owned by a landlord. This is indicated by the word ‘landlord’ in the Living_in
field (see table on page 5).
............................................................................................................................................. [6]
You can use the space below for any working you need.
Describe the steps required to produce this output (from the query in part (a)), without using a
wizard.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [5]
6 John, a user interface designer, has been asked by a systems analyst to design an interface for a
proposed information system. He will need to consider a mental model of the potential users of the
system.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
(b) Describe the features of a user interface which need to be considered when planning its
design. Where appropriate, give examples of each feature.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [5]
7 A hospital has installed video-conferencing equipment so that senior doctors in the hospital can
stay in touch with other doctors who work in areas away from the hospital.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
.................................................................................................................................................... [8]
8 Roger has decided to set up a mail order company. He needs to create a database of customer
records and orders. He is not sure whether to create a flat file database or a relational database.
Explain the differences between a flat file database and a relational database.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
.................................................................................................................................................... [8]
9 Computer networks can often be classified as consisting of two types, peer-to-peer and client-
server networks.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
.................................................................................................................................................... [5]
10 Expert systems often use a mixture of forward chaining and backward chaining to determine the
probable solution to a problem.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
11 Here is a spreadsheet showing the medal winners at some of the 2016 Olympics swimming
events.
A B C D E F G H I J K L M N O P Q
Average
Code of speed
1 Country code Country name Gold Silver Bronze Swimmer Distance Stroke Gender Position country Time (secs) (m/s) Name of country
2
3 AUS Australia 1 0 1 Kyle Chalmers 100m Freestyle M 1 AUS 47.58 2.10 Australia
4 BEL Belgium 0 1 0 Pieter Timmers 100m Freestyle M 2 BEL 47.80 2.09 Belgium
5 CAN Canada 1 1 0 Nathan Adrian 100m Freestyle M 3 USA 47.85 2.09 United States
6 CHN China 1 0 0 Penny Oleksiak 100m Freestyle F 1 CAN 52.70 1.90 Canada
7 GBR Great Britain 1 0 0 Simone Manuel 100m Freestyle F 2 USA 52.71 1.90 United States
8 RSA South Africa 0 2 0 Sarah Sjostrom 100m Freestyle F 3 SWE 52.99 1.89 Sweden
9 SWE Sweden 1 1 1 Adam Peaty 100m Breaststroke M 1 GBR 57.13 1.75 Great Britain
10 USA United States 1 1 4 Cameron Van der Burgh 100m Breaststroke M 2 RSA 58.69 1.70 South Africa
11 Codey Miller 100m Breaststroke M 3 USA 58.87 1.70 United States
12 Sarah Sjostrom 100m Butterfly F 1 SWE 55.48 1.80 Sweden
13 Penny Oleksiak 100m Butterfly F 2 CAN 56.46 1.77 Canada
14 Dana Vollmer 100m Butterfly F 3 USA 56.63 1.77 United States
15 Yang Sun 200m Freestyle M 1 CHN 104.65 1.91 China
16 Chad Le Clos 200m Freestyle M 2 RSA 105.20 1.90 South Africa
17 Conor Dwyer 200m Freestyle M 3 USA 105.23 1.90 United States
18 Katie Ledecky 200m Freestyle F 1 USA 113.73 1.76 United States
19 Sarah Sjostrom 200m Freestyle F 2 SWE 114.08 1.75 Sweden
20 Emma McKeon 200m Freestyle F 3 AUS 114.92 1.74 Australia
(a) Write down the formula which should go in cell D3 to calculate the number of gold medals
that Australia won in the events. The formula should be easily replicable to show the number
of gold medals won by the other countries.
The formula should work even if the swimmer details are changed.
= .......................................................................................................................................... [6]
You can use the space below for any working you need.
(b) The average speed of each swimmer is calculated by dividing the distance swum by the time
taken in seconds.
Write down the formula which should go in cell P3 to calculate Kyle Chalmers’ speed. The
formula should be easily replicable to show the speeds of the other swimmers.
= .......................................................................................................................................... [5]
You can use the space below for any working you need.
(c) Explain how you would amend the spreadsheet so that the cells between M3 to M20 could
only accept the country codes listed. If any other code was input an error message informing
the user an error had occurred would be output.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
(d) Explain how you would sort the data so that all the female swimmers were grouped together
before the male swimmers and with the furthest distance at the top.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
12 The principal of a college wishes to keep records of all his students’ details including exam scores.
He is not sure whether he should use a spreadsheet or a database to do this.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
.................................................................................................................................................... [8]
BLANK PAGE
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.
Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of
Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge.
Write your centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.
At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.
DC (JP/FC) 168818/3
© UCLES 2019 [Turn over
2
1 Tick the four most accurate statements regarding gathering data from indirect data sources.
The sample size is always smaller than if you used a direct data source
The purpose for which data was collected originally may be quite different from the
purpose of the current research
There may be no data available. The data required has simply never been recorded
Compared to direct data sources, using indirect data sources is always very expensive
when preparing and carrying out the gathering of data
[4]
2 Tick the four most accurate statements regarding internal hardware components.
A hard disk drive usually has less storage capacity than the RAM within a computer
ROM is the memory used to store documents the user is currently working on
RAM stores the start up instructions of a computer even when it is switched off
The arithmetic logic unit and the control unit are part of the CPU in a computer
[4]
3 A hockey club secretary is planning to computerise the players’ records. For this system she is
considering using custom written software.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
Without describing its components explain how an expert system helps the doctor come to a
decision regarding the diagnosis.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
.................................................................................................................................................... [4]
5 Here is a spreadsheet showing the top European goal scorers in the 2018 Football World Cup
qualification matches.
(a) Write down the formula which should go in cell H3 to display the name of the country for
Robert Lewandowski. The formula must be easily replicable.
= .......................................................................................................................................... [5]
You can use the space below for any working you need.
(b) Explain, in detail, the steps you would take to amend the spreadsheet so that the players will
be put in order of the average number of goals scored per games played for each player. The
highest average number should be first in the list.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [6]
Describe, using examples, what an intranet is and how it could be extended into an extranet.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
.................................................................................................................................................... [8]
7 Sadiq has written a program that he now wishes to convert using a compiler.
(a) There are two types of software. Name them, indicating which type a compiler is.
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [1]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
8 Kelvin was given the task of creating a relational database to combine all his company’s customer
records and sales records (invoices). The tables that were created are shown here.
Customer table
Invoices table
You can assume that all values shown include the maximum and minimum allowed in each field.
(a) Complete the data dictionary below for the Invoices table. You can assume that all values
shown are typical. All field sizes should be appropriate.
[6]
(b) Kelvin wishes to add a calculated field showing the total cost for each customer.
Describe the steps he would need to follow in order to create this calculated field using a
query without using a wizard.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [6]
(c) The following data was typed in error. For each item explain how validation could have
prevented the error and explain what would be allowed.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [2]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [2]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [2]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [2]
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
.................................................................................................................................................... [8]
10 Many organisations make use of Management Information Systems (MIS). Explain what a typical
MIS consists of, including the role of an MIS manager.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
.................................................................................................................................................... [6]
11 Juanita, an office manager, has just been given the task of producing customer invoices. Each
invoice will need to have three copies. She is trying to decide between using a dot matrix printer or
an inkjet printer to produce the invoices.
(a) Give three detailed advantages of Juanita choosing a dot matrix printer.
1 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
3 ................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
(b) Give three detailed disadvantages of Juanita choosing a dot matrix printer.
1 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
3 ................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
12 Laura, the manager of a new company, has just purchased some computers for workers to use.
With the increase in the use of ransomware by hackers she has decided that the workers will not
be allowed access to the internet. However, she needs to decide whether or not to connect the
computers together to form a network.
Without referring to the internet, discuss the advantages and disadvantages of networking these
computers.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
.................................................................................................................................................... [8]
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.
Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of
Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge.
Published
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.
Cambridge International will not enter into discussions about these mark schemes.
Cambridge International is publishing the mark schemes for the October/November 2019 series for most
Cambridge IGCSE™, Cambridge International A and AS Level components and some Cambridge O Level
components.
These general marking principles must be applied by all examiners when marking candidate answers.
They should be applied alongside the specific content of the mark scheme or generic level descriptors
for a question. Each question paper and mark scheme will also comply with these marking principles.
• the specific content of the mark scheme or the generic level descriptors for the question
• the specific skills defined in the mark scheme or in the generic level descriptors for the question
• the standard of response required by a candidate as exemplified by the standardisation scripts.
Marks awarded are always whole marks (not half marks, or other fractions).
• marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit
is given for valid answers which go beyond the scope of the syllabus and mark scheme,
referring to your Team Leader as appropriate
• marks are awarded when candidates clearly demonstrate what they know and can do
• marks are not deducted for errors
• marks are not deducted for omissions
• answers should only be judged on the quality of spelling, punctuation and grammar when these
features are specifically assessed by the question as indicated by the mark scheme. The
meaning, however, should be unambiguous.
Rules must be applied consistently e.g. in situations where candidates have not followed
instructions or in the application of generic level descriptors.
Marks should be awarded using the full range of marks defined in the mark scheme for the question
(however; the use of the full mark range may be limited according to the quality of the candidate
responses seen).
Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should
not be awarded with grade thresholds or grade descriptors in mind.
Uses radio waves in 2.4 GHz/5 Ghz frequency ranges/(900 MHz and
3.6/60 GHz frequency bands)
Data frames are modulated onto carrier wave
Spread spectrum used for higher power levels
Two channels used for full duplex exchange of data/most WiFi is half-duplex
WiFi network uses SSID to identify itself
Access point and device must be connected to same WiFi network/SSID to be
able to exchange data
Data is encrypted for security during transmission
Devices must use IEEE 802.11 protocols/standards
IEEE 802.11 has a number of variants a/b/g/n/ac(/ad/ah/aj/ax/ay/az) (must
have 3 to gain this extra mark)
14 channels on 2.4 GHz which are 5 MHz spaced/device uses channels
spaced apart to reduce channel interference.
3 Three from: 3
Alpha testing is carried out by the developers whereas beta testing is carried
out by users
Alpha testing includes both black box testing and white box testing
Alpha Testing is carried out before the launch of software product into the
market
Beta testing is always a black box testing or a functional testing
Beta Testing is done at the time of software product marketing
4 Command word: Evaluate: discuss the importance of, weigh up, the 8
advantages and disadvantages, judge the overall effectiveness, weigh up
your opinions.
Eight from:
Advantages:
Disadvantages:
6 Command word: Discuss: give important arguments for and against. Often 8
requires a conclusion.
Candidates will evaluate in detail the benefits and drawbacks of the use of
copper cables
The information will be relevant, clear, organised and presented in a
structured and coherent format.
There may be a reasoned conclusion/opinion.
Subject specific terminology will be used accurately and appropriately.
Candidates will explain the benefits and drawbacks of the use of copper
cables
For the most part, the information will be relevant and presented in a
structured and coherent format.
There may be a reasoned conclusion/opinion.
Subject specific terminology will be used appropriately and for the most part
correctly.
Candidates will describe at least one benefit and at least one drawback of the
use of copper cables
Answers may be in the form of a list.
There will be little or no use of specialist terms.
Benefits:
Drawbacks:
8 Six from: 6
For 8 marks, must have at least 1 mark from each of firewall, router and
encryption.
Locations B and C are open to the public/any device can connect so there is
no secure connection at these locations
Data may not be encrypted
Location B could be used by hackers using Man in Middle (MIM) to route data
through hacker computer
Location B may be susceptible to fake/spoof/unauthorised wireless access
points/connections
Location B may be susceptible to intercepting wireless signals from company
devices as there is no check on users of cafes/can sit anywhere without
reason/identification.
10 Six from: 6
11 Six from: 6
Published
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.
Cambridge International will not enter into discussions about these mark schemes.
Cambridge International is publishing the mark schemes for the October/November 2019 series for most
Cambridge IGCSE™, Cambridge International A and AS Level components and some Cambridge O Level
components.
These general marking principles must be applied by all examiners when marking candidate answers.
They should be applied alongside the specific content of the mark scheme or generic level descriptors
for a question. Each question paper and mark scheme will also comply with these marking principles.
• the specific content of the mark scheme or the generic level descriptors for the question
• the specific skills defined in the mark scheme or in the generic level descriptors for the question
• the standard of response required by a candidate as exemplified by the standardisation scripts.
Marks awarded are always whole marks (not half marks, or other fractions).
• marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit
is given for valid answers which go beyond the scope of the syllabus and mark scheme,
referring to your Team Leader as appropriate
• marks are awarded when candidates clearly demonstrate what they know and can do
• marks are not deducted for errors
• marks are not deducted for omissions
• answers should only be judged on the quality of spelling, punctuation and grammar when these
features are specifically assessed by the question as indicated by the mark scheme. The
meaning, however, should be unambiguous.
Rules must be applied consistently e.g. in situations where candidates have not followed
instructions or in the application of generic level descriptors.
Marks should be awarded using the full range of marks defined in the mark scheme for the question
(however; the use of the full mark range may be limited according to the quality of the candidate
responses seen).
Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should
not be awarded with grade thresholds or grade descriptors in mind.
2 Six from: 6
Director would use desktop PMS because he requires high quality graphics
Managing Director would use desktop PMS because he requires high quality
graphics/only needs to oversee/view final work so only needs to use desktop
Director does not need to share/collaborate with others on amends but just
oversee them so only needs to use desktop
Project managers could use desktop or web-based as based in office
so will probably be using a desktop computer which can also access the
internet
Project managers need to share/collaborate/amend work from supervisors
and so more likely to use web-based software as not all desktop software
facilitates collaboration
Project supervisors could use web-based PMS as can use remotely
Some supervisors may need to use mobile devices (may not have desktop
software installed but can access the internet) so would need to use web-
based software.
3 Three from: 3
5 Command word: Discuss: give important arguments for and against. Often 8
requires a conclusion.
Use of smartphones during physical exercise can reduce the benefits of the
physical exercise
Can be a source of harm to student well-being e.g. constant use, dependency
on device reduces personal social interaction
Can be a source of distraction from tasks in hand
Can be used to harass other individuals
Can be used to cheat in examinations
Can reduce ability to engage in verbal/face-to-face conversations with others
Can create poor behaviour e.g. intolerance/withdrawal from society/social
life/aggression towards others
6 Six from: 6
Can transmit data long distances along thin fibre optic cables
Laser light is coherent so is not easily lost by dispersion
Can carry vast amounts of data/implement very high bandwidths for data
transmission
Can be used in free space/just air so no need for cables
Can be used in a vacuum so can be used between spacecraft
Immune to electromagnetic interference
Increased security as difficult to intercept in fibre/free space
No licence to use is required (for use in free space) in most areas of the world
Can be used to power devices in free space.
7 Command word: Evaluate: discuss the importance of, weigh up, the 8
advantages and disadvantages, judge the overall effectiveness, weigh up
your opinions.
9 Two from: 6
MOOC and online tutorials both use the World Wide Web
MOOC and online tutorials are both interactive using multimedia
With both, courses are either bought off-the shelf or custom built
Students will learn in isolation i.e.as individuals
Four from:
10 Four from: 4
Bit rate represents the amount of information/data that is stored per unit time
in the streamed/recorded video
Bandwidth of available connections determines bit rate that can be used for
the video
If transmission medium does not have sufficient bandwidth to carry the
required bit rate the video will stall/be jerky/impose constant buffering
... and reduce the viewer’s quality of experience of the video
Video can be sampled at different bit rates/compressed to different bit rates
Low bit rates produce video that lacks detail/is pixelated/shows motion in jerky
steps
The more bits that are used the higher the quality of the video e.g.
... 16 kbit/s is suitable only for video phone applications as detail is
lacking/any significant movement pixelates the image
... 2.5 Mbit/s is suitable for low quality internet streaming
... 9.6 Mbit/s is DVD quality
... 8 to 15 Mbit/s is HD quality
... 40 Mbit/s will allow 1080p/Blu-ray disc quality for the video.
11 Eight from: 8
Freehand select tool to draw around existing lamp post/select lamp post
Copy/paste tools to copy lamp post to clipboard (leaving existing in place)
Create new layer for additional lamp post/paste new lamp post into
layer/image
Position new lamp post to precise position required
Colour picker tool to select colour to be painted into edges of added image
and paint tool used to fill pixels around image to make it ‘blend’ in
Use of appropriate brush size
Finalising image:
56 39 27 18 4
Max 5 from:
Editing tools:
14 Four from: 4
Advantages:
You can see inside the patient without the need for surgery
Can look at patient’s condition from more angles than using exploratory
surgery
Can see what's happening with the anatomy while carrying out a procedure
Makes training more realistic – three dimensional rather than two
Disadvantages:
Published
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.
Cambridge International will not enter into discussions about these mark schemes.
Cambridge International is publishing the mark schemes for the October/November 2019 series for most
Cambridge IGCSE™, Cambridge International A and AS Level components and some Cambridge O Level
components.
These general marking principles must be applied by all examiners when marking candidate answers.
They should be applied alongside the specific content of the mark scheme or generic level descriptors
for a question. Each question paper and mark scheme will also comply with these marking principles.
• the specific content of the mark scheme or the generic level descriptors for the question
• the specific skills defined in the mark scheme or in the generic level descriptors for the question
• the standard of response required by a candidate as exemplified by the standardisation scripts.
Marks awarded are always whole marks (not half marks, or other fractions).
• marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit
is given for valid answers which go beyond the scope of the syllabus and mark scheme,
referring to your Team Leader as appropriate
• marks are awarded when candidates clearly demonstrate what they know and can do
• marks are not deducted for errors
• marks are not deducted for omissions
• answers should only be judged on the quality of spelling, punctuation and grammar when these
features are specifically assessed by the question as indicated by the mark scheme. The
meaning, however, should be unambiguous.
Rules must be applied consistently e.g. in situations where candidates have not followed
instructions or in the application of generic level descriptors.
Marks should be awarded using the full range of marks defined in the mark scheme for the question
(however; the use of the full mark range may be limited according to the quality of the candidate
responses seen).
Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should
not be awarded with grade thresholds or grade descriptors in mind.
Uses radio waves in 2.4 GHz/5 Ghz frequency ranges/(900 MHz and
3.6/60 GHz frequency bands)
Data frames are modulated onto carrier wave
Spread spectrum used for higher power levels
Two channels used for full duplex exchange of data/most WiFi is half-duplex
WiFi network uses SSID to identify itself
Access point and device must be connected to same WiFi network/SSID to be
able to exchange data
Data is encrypted for security during transmission
Devices must use IEEE 802.11 protocols/standards
IEEE 802.11 has a number of variants a/b/g/n/ac(/ad/ah/aj/ax/ay/az) (must
have 3 to gain this extra mark)
14 channels on 2.4 GHz which are 5 MHz spaced/device uses channels
spaced apart to reduce channel interference.
3 Three from: 3
Alpha testing is carried out by the developers whereas beta testing is carried
out by users
Alpha testing includes both black box testing and white box testing
Alpha Testing is carried out before the launch of software product into the
market
Beta testing is always a black box testing or a functional testing
Beta Testing is done at the time of software product marketing
4 Command word: Evaluate: discuss the importance of, weigh up, the 8
advantages and disadvantages, judge the overall effectiveness, weigh up
your opinions.
Eight from:
Advantages:
Disadvantages:
6 Command word: Discuss: give important arguments for and against. Often 8
requires a conclusion.
Candidates will evaluate in detail the benefits and drawbacks of the use of
copper cables
The information will be relevant, clear, organised and presented in a
structured and coherent format.
There may be a reasoned conclusion/opinion.
Subject specific terminology will be used accurately and appropriately.
Candidates will explain the benefits and drawbacks of the use of copper
cables
For the most part, the information will be relevant and presented in a
structured and coherent format.
There may be a reasoned conclusion/opinion.
Subject specific terminology will be used appropriately and for the most part
correctly.
Candidates will describe at least one benefit and at least one drawback of the
use of copper cables
Answers may be in the form of a list.
There will be little or no use of specialist terms.
Benefits:
Drawbacks:
8 Six from: 6
For 8 marks, must have at least 1 mark from each of firewall, router and
encryption.
Locations B and C are open to the public/any device can connect so there is
no secure connection at these locations
Data may not be encrypted
Location B could be used by hackers using Man in Middle (MIM) to route data
through hacker computer
Location B may be susceptible to fake/spoof/unauthorised wireless access
points/connections
Location B may be susceptible to intercepting wireless signals from company
devices as there is no check on users of cafes/can sit anywhere without
reason/identification.
10 Six from: 6
11 Six from: 6
Published
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.
Cambridge International will not enter into discussions about these mark schemes.
Cambridge International is publishing the mark schemes for the October/November 2019 series for most
Cambridge IGCSE™, Cambridge International A and AS Level components and some Cambridge O Level
components.
These general marking principles must be applied by all examiners when marking candidate answers.
They should be applied alongside the specific content of the mark scheme or generic level descriptors
for a question. Each question paper and mark scheme will also comply with these marking principles.
• the specific content of the mark scheme or the generic level descriptors for the question
• the specific skills defined in the mark scheme or in the generic level descriptors for the question
• the standard of response required by a candidate as exemplified by the standardisation scripts.
Marks awarded are always whole marks (not half marks, or other fractions).
• marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit
is given for valid answers which go beyond the scope of the syllabus and mark scheme,
referring to your Team Leader as appropriate
• marks are awarded when candidates clearly demonstrate what they know and can do
• marks are not deducted for errors
• marks are not deducted for omissions
• answers should only be judged on the quality of spelling, punctuation and grammar when these
features are specifically assessed by the question as indicated by the mark scheme. The
meaning, however, should be unambiguous.
Rules must be applied consistently e.g. in situations where candidates have not followed
instructions or in the application of generic level descriptors.
Marks should be awarded using the full range of marks defined in the mark scheme for the question
(however; the use of the full mark range may be limited according to the quality of the candidate
responses seen).
Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should
not be awarded with grade thresholds or grade descriptors in mind.
1 4
You only have to gather as much or as little data as you need. 3
You can obtain the data faster than using an indirect data source.
You have full control over the method used to collect the data. 3
A much larger sample size can be used than is possible with indirect
data sources.
There may be an opportunity to sell the data to other people for them
3
to use.
The source of the data is known exactly making it easier to judge its
3
reliability.
2 4
Pharming involves sending a website URL, inviting the receiver to go
to the site.
Banks can ask you from time to time to send them your full password
to check you are authorised to use that account.
Two from:
Examples are:
4 Four from: 4
Go to query design
Load/Select the table
Select the fields, Second_name, Name1, Living_in
In fourth column, in field row/ type the query expression
Replace Expr1 with Status
Make sure all fields have the Show option ticked
Save the query
Run the query
7 Eight from: 8
Benefits
Both groups of doctors will not waste time travelling to a conference/meeting
with each other
Both groups of doctors will save expense of travelling to a conference/meeting
with each other
All doctors will save time by not staying overnight
Doctors less likely to be fatigued if they have not had to travel long distances
so able to perform better at the meeting
Saves doctors time printing out large amounts of documents
Doctors are less likely to misplace documents «
« as electronic documents can be viewed online
It is safer as accidents can happen on the roads
Meetings can be called at short notice saving doctors time in preparation for a
meeting
It is more environmentally friendly as less car movement is needed
It makes it easier for the doctors who do not work in the hospital to liaise
when necessary/allows hospital doctors to share new treatments with other
doctors
Hospital doctors can demonstrate procedures/treatments to other doctors
Drawbacks
Confidential documents may need to be seen in their original form by both
sets of doctors
There can be poor quality of the video because of bandwidth problems
Lack of bandwidth can lead to problems with time lag
Not all countries have sufficient bandwidth to support video conferencing
Interruption to, or breakdowns of, the transmission can occur
Power cuts/outages are common in some countries, leading to breakdown of
transmission
Both sets of doctors may be concerned that hackers may attempt to hack into
the video conference
Hackers could gain access to patient details
Some video conferences do not have a password/you can just dial into a
video conference so hackers could gain access easily
Difficult to allow doctors to answer in turn
Might be difficult to see all doctors to see who is contributing
Doctors may be put off by the camera, as many people are self-conscious
when being videoed
Doctors away from the hospital may incur costs due to obtaining video
conferencing equipment
8 Eight from: 8
9 Five from: 5
Forward chaining starts with the available data and uses inference rules to
extract more data ...
... until a goal is reached
An inference engine using forward chaining searches the inference rules until
it finds one where the IF statement is known to be true
When such a rule is found, the inference engine uses the ‘Then’ part to cause
the addition of new information
Inference engines will iterate through this process until a goal is reached
Because the data entered determines which rules are selected and used, this
method is called data-driven
11(a) =COUNTIFS($M$3:$M$20,$A3,$L$3:$L$20,1) 6
or
=COUNTIFS($L$3:$L$20,1,$M$3:$M$20,$A3)
11(b) =VALUE(LEFT(I3,3))/O3 5
=VALUE() – 1 mark
(LEFT() – 1 mark
I3, – 1 mark
3) – 1 mark
/O3 – 1 mark
All cell references must be relative but can have $ in front of letters
11(d) 3
Highlight cells H3:Q20 «
« Sort on column K ascending «
« add a level and sort on Column I descending
Candidates may only address one side of the argument, and give basic
advantages/disadvantages
Answers may be simplistic with little or no relevance.
There will be little or no use of specialist terms.
Level 0 (0 marks)
Benefits of spreadsheets
The amount of learning required by the principal to use spreadsheets is not as
much as that for databases ...
... it’s easier to use spreadsheets and get solutions straight away
Spreadsheets are easier to use to store student data/perform numerical
calculations on exam scores/format cells/adjust layouts to generate output
and reports
Easier to create complex formulae such as exam scores per teaching group in
spreadsheets
Easier to use functions to calculate average exam scores in spreadsheets
Repeated data such as names or classes can be easier to enter using
spreadsheet software
Charts to show student progress are easier to produce using spreadsheets
Drawbacks of spreadsheets
As work gets more complex, such as an increase in the number of students,
spreadsheets become more difficult to change and manage
Spreadsheets are good for creating one-time analysis such as exam scores
for one year, but become problematic as the data grows and evolves over
time
As new rows and columns are added for extra scores and students, ranges
and formulas may need to be modified or new ones created
12 Benefits of databases
Data structure and normalisation are available through multiple tables
Data and referential integrity is inbuilt
Queries and reports on student progress/exam score trends are easier to
create with databases
Drawbacks of databases
They take more skill and training for the principal to use well
Structuring the information so it's easy to edit, query, view, and report can be
difficult for the principal (if normalisation is employed)
Creating a database is more complicated for the principal than just entering
data in the cells of a spreadsheet
It is not as easy to copy and paste blocks of data
Published
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.
Cambridge International will not enter into discussions about these mark schemes.
Cambridge International is publishing the mark schemes for the October/November 2019 series for most
Cambridge IGCSE™, Cambridge International A and AS Level components and some Cambridge O Level
components.
These general marking principles must be applied by all examiners when marking candidate answers.
They should be applied alongside the specific content of the mark scheme or generic level descriptors
for a question. Each question paper and mark scheme will also comply with these marking principles.
• the specific content of the mark scheme or the generic level descriptors for the question
• the specific skills defined in the mark scheme or in the generic level descriptors for the question
• the standard of response required by a candidate as exemplified by the standardisation scripts.
Marks awarded are always whole marks (not half marks, or other fractions).
• marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit
is given for valid answers which go beyond the scope of the syllabus and mark scheme,
referring to your Team Leader as appropriate
• marks are awarded when candidates clearly demonstrate what they know and can do
• marks are not deducted for errors
• marks are not deducted for omissions
• answers should only be judged on the quality of spelling, punctuation and grammar when these
features are specifically assessed by the question as indicated by the mark scheme. The
meaning, however, should be unambiguous.
Rules must be applied consistently e.g. in situations where candidates have not followed
instructions or in the application of generic level descriptors.
Marks should be awarded using the full range of marks defined in the mark scheme for the question
(however; the use of the full mark range may be limited according to the quality of the candidate
responses seen).
Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should
not be awarded with grade thresholds or grade descriptors in mind.
1
It may involve having to purchase more data loggers 4
The sample size is always smaller than if you used a direct data
source
The purpose for which data was collected originally may be quite
3
different from the purpose of the current research
There may be no data available. The data required has simply never
3
been recorded
2 3 4
A motherboard has a collection of chips and controllers known as the
chipset
A hard disk drive usually has less storage capacity than the RAM
within a computer
The arithmetic logic unit and the control unit are part of the CPU in a 3
computer
Costs more to pay programmers to write code specifically for the task/users’
needs/don’t share development costs with other users
Testing is limited to what the programmers think may be required ...
... based on how they think the software will be used
Support is limited to the team of programmers only
Can take a long time to develop the software
There may be a lot of bugs as it has not been tested so thoroughly/has not
been used before
4 Four from: 4
5(a) VLOOKUP(F3,$C$6:$D$17,2,0) 5
VLOOKUP() – 1 mark
(F3 – 1 mark
,$C$6:$D$17 – 1 mark
,2 – 1 mark
,0) – 1 mark
$ before the column letter is optional
6 Eight from: 8
8(a) 6
Attribute Data type Field Format Type of key
size
Number_of_items Numeric/integer – 9 –
Candidates may only address one side of the argument, and give basic
advantages/disadvantages
Answers may be simplistic with little or no relevance.
There will be little or no use of specialist terms.
Level 0 (0 marks)
Disadvantages
HTTPS uses a lot of server resources ...
... requires processing power and memory for encryption
HTTPS introduces latencies/delays
SSL connections take longer to set up with more roundtrips
Browser caching does not work properly
Modern sites will run slowly without browser caching
Need to buy an SSL certificate issued by certificate authorities
It is possible to make your own certificate but other users will not trust it so
you need to buy one
Warnings can arise that despite using SSL a web page is partially serving
insecure content
The browser may not want users to think a site is totally secure but warning
can be off-putting to many users
There are proxy caching problems
Everything is encrypted including packet headers and content
Any caching that might have happened between the points at which data is
encrypted and decrypted is blocked
9 Advantages
Messages can’t be read by any third-party
A certificate guarantees the information a browser is receiving originates at
the expected domain
It’s a guarantee that when a user sends sensitive data, it’s being sent to the
right place, and not to a malicious third party
HTTPS connections make man-in-the-middle attacks much more difficult to
execute
Search engines list HTTPS websites higher than sites without HTTPS
The green padlock indicates that your site provider takes security seriously
and this gives users confidence
She could use carbon copy paper (which requires less filling of the sheet
feeder)
She could use continuous stationery which would require less human
interaction/doesn’t run out of paper as quickly as inkjet
The ink ribbon lasts longer/cheaper to buy than an inkjet cartridge, saving
costs
When the ink runs out on an inkjet printout is less legible, whereas with a dot
matrix printer the print gets fainter but is still legible
The striking of the heads causes a lot of noise which would be distracting in
an office environment
The quality of output is not so good with a maximum of 240 dpi whereas
inkjets output at 1200 dpi
The speed of output is not as high as an inkjet printer, with the fastest dot
matrix only approaching the speed of the slowest inkjet
The cost of a dot matrix printer to buy is far more expensive than a typical
inkjet
Dot matrix has a more limited character set.
12 Eight from: 8
Advantages
Disadvantages
Published
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.
Cambridge International will not enter into discussions about these mark schemes.
Cambridge International is publishing the mark schemes for the October/November 2019 series for most
Cambridge IGCSE™, Cambridge International A and AS Level components and some Cambridge O Level
components.
These general marking principles must be applied by all examiners when marking candidate answers.
They should be applied alongside the specific content of the mark scheme or generic level descriptors
for a question. Each question paper and mark scheme will also comply with these marking principles.
• the specific content of the mark scheme or the generic level descriptors for the question
• the specific skills defined in the mark scheme or in the generic level descriptors for the question
• the standard of response required by a candidate as exemplified by the standardisation scripts.
Marks awarded are always whole marks (not half marks, or other fractions).
• marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit
is given for valid answers which go beyond the scope of the syllabus and mark scheme,
referring to your Team Leader as appropriate
• marks are awarded when candidates clearly demonstrate what they know and can do
• marks are not deducted for errors
• marks are not deducted for omissions
• answers should only be judged on the quality of spelling, punctuation and grammar when these
features are specifically assessed by the question as indicated by the mark scheme. The
meaning, however, should be unambiguous.
Rules must be applied consistently e.g. in situations where candidates have not followed
instructions or in the application of generic level descriptors.
Marks should be awarded using the full range of marks defined in the mark scheme for the question
(however; the use of the full mark range may be limited according to the quality of the candidate
responses seen).
Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should
not be awarded with grade thresholds or grade descriptors in mind.
1 4
You only have to gather as much or as little data as you need. 3
You can obtain the data faster than using an indirect data source.
You have full control over the method used to collect the data. 3
A much larger sample size can be used than is possible with indirect
data sources.
There may be an opportunity to sell the data to other people for them
3
to use.
The source of the data is known exactly, making it easier to judge its
3
reliability.
2 4
Pharming involves sending a website URL, inviting the receiver to go
to the site.
Banks can ask you from time to time to send them your full password
to check you are authorised to use that account.
Two from:
Examples are:
4 Four from: 4
Go to query design
Load/Select the table
Select the fields, Second_name, Name1, Living_in
In fourth column, in field row/ type the query expression
Replace Expr1 with Status
Make sure all fields have the Show option ticked
Save the query
Run the query
7 Eight from: 8
Benefits
Both groups of doctors will not waste time travelling to a conference/meeting
with each other
Both groups of doctors will save expense of travelling to a conference/meeting
with each other
All doctors will save time by not staying overnight
Doctors less likely to be fatigued if they have not had to travel long distances
so able to perform better at the meeting
Saves doctors time printing out large amounts of documents
Doctors are less likely to misplace documents «
« as electronic documents can be viewed online
It is safer as accidents can happen on the roads
Meetings can be called at short notice saving doctors time in preparation for a
meeting
It is more environmentally friendly as less car movement is needed
It makes it easier for the doctors who do not work in the hospital to liaise
when necessary/allows hospital doctors to share new treatments with other
doctors
Hospital doctors can demonstrate procedures/treatments to other doctors
Drawbacks
Confidential documents may need to be seen in their original form by both
sets of doctors
There can be poor quality of the video because of bandwidth problems
Lack of bandwidth can lead to problems with time lag
Not all countries have sufficient bandwidth to support video conferencing
Interruption to, or breakdowns of, the transmission can occur
Power cuts/outages are common in some countries, leading to breakdown of
transmission
Both sets of doctors may be concerned that hackers may attempt to hack into
the video conference
Hackers could gain access to patient details
Some video conferences do not have a password/you can just dial into a
video conference so hackers could gain access easily
Difficult to allow doctors to answer in turn
Might be difficult to see all doctors to see who is contributing
Doctors may be put off by the camera, as many people are self-conscious
when being videoed
Doctors away from the hospital may incur costs due to obtaining video
conferencing equipment
8 Eight from: 8
9 Five from: 5
Forward chaining starts with the available data and uses inference rules to
extract more data ...
... until a goal is reached
An inference engine using forward chaining searches the inference rules until
it finds one where the IF statement is known to be true
When such a rule is found, the inference engine uses the ‘Then’ part to cause
the addition of new information
Inference engines will iterate through this process until a goal is reached
Because the data entered determines which rules are selected and used, this
method is called data-driven
11(a) =COUNTIFS($M$3:$M$20,$A3,$L$3:$L$20,1) 6
or
=COUNTIFS($L$3:$L$20,1,$M$3:$M$20,$A3)
11(b) =VALUE(LEFT(I3,3))/O3 5
=VALUE() – 1 mark
(LEFT() – 1 mark
I3, – 1 mark
3) – 1 mark
/O3 – 1 mark
All cell references must be relative but can have $ in front of letters
11(d) 3
Highlight cells H3:Q20 «
« Sort on column K ascending «
« add a level and sort on Column I descending
Candidates may only address one side of the argument, and give basic
advantages/disadvantages
Answers may be simplistic with little or no relevance.
There will be little or no use of specialist terms.
Level 0 (0 marks)
Benefits of spreadsheets
The amount of learning required by the principal to use spreadsheets is not as
much as that for databases ...
... it’s easier to use spreadsheets and get solutions straight away
Spreadsheets are easier to use to store student data/perform numerical
calculations on exam scores/format cells/adjust layouts to generate output
and reports
Easier to create complex formulae such as exam scores per teaching group in
spreadsheets
Easier to use functions to calculate average exam scores in spreadsheets
Repeated data such as names or classes can be easier to enter using
spreadsheet software
Charts to show student progress are easier to produce using spreadsheets
Drawbacks of spreadsheets
As work gets more complex, such as an increase in the number of students,
spreadsheets become more difficult to change and manage
Spreadsheets are good for creating one-time analysis such as exam scores
for one year, but become problematic as the data grows and evolves over
time
As new rows and columns are added for extra scores and students, ranges
and formulas may need to be modified or new ones created
12 Benefits of databases
Data structure and normalisation are available through multiple tables
Data and referential integrity is inbuilt
Queries and reports on student progress/exam score trends are easier to
create with databases
Drawbacks of databases
They take more skill and training for the principal to use well
Structuring the information so it's easy to edit, query, view, and report can be
difficult for the principal (if normalisation is employed)
Creating a database is more complicated for the principal than just entering
data in the cells of a spreadsheet
It is not as easy to copy and paste blocks of data