ICT Paper 1
ICT Paper 1
ICT Paper 1
Cambridge IGCSE
INSTRUCTIONS
• Answer all questions.
• Use a black or dark blue pen.
• Write your name, centre number and candidate number in the boxes at the top of the page.
• Write your answer to each question in the space provided.
• Do not use an erasable pen or correction fluid.
• Do not write on any bar codes.
• You may use an HB pencil for any diagrams, graphs or rough working.
INFORMATION
• The total mark for this paper is 100.
• The number of marks for each question or part question is shown in brackets [ ].
• No marks will be awarded for using brand names of software packages or hardware.
03_0417_12_2020_1.21
© UCLES 2020 [Turn over
2
1.........................................................................................................................................
2.........................................................................................................................................
[2]
(b) Identify two internal hardware devices from the given list.
1.........................................................................................................................................
2.........................................................................................................................................
[2]
2 Tick (✓) whether the following statements refer to the internet or an intranet.
internet intranet
(✓) (✓)
[2]
3 Chess players can use expert systems to help them practise chess moves.
Name two other applications which involve the use of expert systems.
1 ................................................................................................................................................
..................................................................................................................................................
2 ................................................................................................................................................
..................................................................................................................................................
[2]
4 Smart technology is increasingly being used in everyday life. Many people are now using smart
devices such as smartwatches.
(a) Tick (✓) whether the following statements most appropriately refer to a desktop computer,
a tablet computer or a smartwatch.
desktop tablet
computer computer smartwatch
(✓) (✓) (✓)
[4]
(b) Smartphones are more likely to be used than laptop computers for everyday ICT use.
1.........................................................................................................................................
...........................................................................................................................................
2.........................................................................................................................................
...........................................................................................................................................
3.........................................................................................................................................
...........................................................................................................................................
[3]
5 A school examinations officer has set up a spreadsheet of candidates for the IGCSE examinations.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [5]
(b) The examinations officer is planning to change the range E3 to F6 in the formula to a named
range.
(i) Explain why he should do this rather than using the cell references.
................................................................................................................................
................................................................................................................................
................................................................................................................................
................................................................................................................................
................................................................................................................................
................................................................................................................................ [3]
................................................................................................................................
................................................................................................................................ [1]
(c) A formula has been placed in cell F9. The formula is COUNTIF(A4:A15,''E'')
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [2]
6 A teacher has created a hierarchical file structure to save the registers and marks of each of her
classes on her laptop computer. Part of the structure is shown:
C:
Work
Class_A1
Examination_Marks
Registers
Class_Reports
(a) Write down the file path to locate a document which is stored in the folder Examination_Marks.
C: ......................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [3]
(b) The teacher could have saved the document as a .txt or an .rtf file format.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [2]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [3]
(d) A master document has been created. The teacher will mail merge the personal details of
each student into the document.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [4]
7 A company is considering developing a laptop computer that only uses biometric methods to
authorise user access to this laptop computer. The developers are considering using facial
recognition.
(a) Explain, giving other examples, why biometric methods are considered to be a more secure
way of authorising access to the laptop computer rather than typing in passwords.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [6]
(b) Describe the disadvantages of using facial recognition to authorise access to the laptop
computer.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [4]
8 A headteacher plans to use a computer database to keep records of the members of staff that
teach in her school. She must choose between using a flat file database or a relational database.
(a) Explain the differences between a flat file database and a relational database.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [2]
(b) The school keeps details of the teachers in one file and the subjects they teach in another file.
A teacher teaches more than one subject.
Describe the steps the headteacher would need to take to create a relational database from
this data.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [4]
[4]
10 Arjun is taking a gap year between his studies and will be travelling through Kenya. He needs to
remain in contact with his parents and is considering using either a cell phone or VoIP.
(a) Describe the benefits of using each of these communication methods to stay in contact with
his parents.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
VoIP ..................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[4]
(b) From time to time Arjun’s parents transfer money from their bank account to his bank account
using online banking.
...........................................................................................................................................
........................................................................................................................................... [1]
(c) When Arjun logs onto his online banking he needs to enter his username and password. The
system may also ask him to provide an answer to a security question.
Tick (✓) whether the following are appropriate examples of a security question or not.
[2]
(d) Give three benefits of Arjun using online banking in this scenario.
1.........................................................................................................................................
...........................................................................................................................................
2.........................................................................................................................................
...........................................................................................................................................
3.........................................................................................................................................
...........................................................................................................................................
[3]
(e) Give two drawbacks of Arjun using online banking in this scenario.
1.........................................................................................................................................
...........................................................................................................................................
2.........................................................................................................................................
...........................................................................................................................................
[2]
Discuss how their use has affected the nature of employment in the car production industry.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
.................................................................................................................................................. [6]
12 When people use the internet for shopping and banking it is essential that they use a website that
has a secure server.
(a) Describe the features of a web page that identify it as using a secure server.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [4]
(b) As more and more people use smartphones as computer systems, security can be breached.
Smishing and pharming are ways in which data can be compromised on a smartphone.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [6]
(a) Discuss the advantages and disadvantages of using a multimedia presentation rather than
printed leaflets.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [8]
(b) The sales representative decides to create a multimedia presentation and wishes to place an
image of the new product on one of the slides.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [4]
(c) He searches his company website to find a suitable image for his multimedia presentation.
Part of the markup language from the web page to load the image is shown.
When the markup is run, the words ‘company logo’ are displayed and not the image.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [2]
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable
effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will
be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge Assessment
International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at
www.cambridgeinternational.org after the live examination series.
Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of
Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge.
INSTRUCTIONS
• Answer all questions.
• Use a black or dark blue pen.
• Write your name, centre number and candidate number in the boxes at the top of the page.
• Write your answer to each question in the space provided.
• Do not use an erasable pen or correction fluid.
• Do not write on any bar codes.
• You may use an HB pencil for any diagrams, graphs or rough working.
INFORMATION
• The total mark for this paper is 100.
• The number of marks for each question or part question is shown in brackets [ ].
• No marks will be awarded for using brand names of software packages or hardware.
06_0417_11_2020_1.13
© UCLES 2020 [Turn over
2
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
..................................................................................................................................... [2]
1...................................................................................................................................
.....................................................................................................................................
2...................................................................................................................................
.....................................................................................................................................
[2]
2 Tick (✓) whether the following statements refer to a Command Line Interface (CLI) or a Graphical
User Interface (GUI).
CLI GUI
(✓) (✓)
The user has to type in every
instruction
The user does not need to
learn any of the instructions
Each instruction has to be
typed in correctly
The user is in direct
communication with the
computer
[2]
3 Every computer contains input and output devices and a central processing unit (CPU).
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
..................................................................................................................................... [4]
Name the most appropriate device used to read the following data.
..................................................... .....................................................
0 26815 38221 6
..................................................... .....................................................
[4]
4 A hospital is creating a database to store blood donors’ medical details. The fields in the
database include Health_number, Date_of_birth, Gender and Blood_group.
(a) When a new blood donor wishes to give blood they need to fill in a form.
Each blood donor has a unique health number which uses a 10-digit number, for example
9434765919.
Blood donor
Name a suitable data type for the answers given to each of the questions in the form. For
any numeric field, specify the type of number.
Question 1...................................................................................................................
Question 2...................................................................................................................
Question 3...................................................................................................................
Question 4...................................................................................................................
[4]
(b) In the Blood_group field the only data that can be entered is A, B, AB or O.
Tick (✓) whether each of the following blood groups is an example of abnormal or normal
data.
abnormal normal
Blood group
(✓) (✓)
AB
AO
[2]
(c) The administrator needs a list of all the blood donors in the database with blood group A
as well as in the same list all the blood donors with blood group AB. This list will only
include female blood donors.
To find the blood donor with the health number 9434765919 he will need to type in the
following query.
Health_number = 9434765919
Write a query to find all the female blood group donors with the blood group A as well as
those with AB.
.....................................................................................................................................
..................................................................................................................................... [6]
(d) When the details of a new donor are added to the database the person’s date of birth is
entered.
Explain why the administrator would prefer their date of birth to be stored rather than their
age.
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
..................................................................................................................................... [4]
(e) Name the most appropriate validation check for the Health_number.
.....................................................................................................................................
..................................................................................................................................... [1]
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
..................................................................................................................................... [6]
(b) Smishing is another security issue. Describe the methods which can be used to help
prevent smishing.
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
..................................................................................................................................... [6]
6 Tick (✓) which of the following statements apply to LANs, which apply to WANs and which
apply to WLANs.
[4]
7 The headteacher of a school has decided to replace desktop computers with laptop computers.
Describe the advantages and disadvantages of using a laptop computer rather than a desktop
computer.
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................ [4]
8 Following recent data protection issues the personal data we allow organisations to share about
us may be reduced.
(a) Discuss the benefits and drawbacks of trying to keep personal data confidential and secure.
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
..................................................................................................................................... [6]
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
..................................................................................................................................... [2]
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
..................................................................................................................................... [4]
(a) Tick (✓) which of the following devices used at a POS terminal are only input devices,
which are only output devices and which are both.
Buzzer
Receipt printer
Electronic scales
[6]
(b) A stock file contains data about the goods being sold. Describe the steps needed to update
the stock file when an item is scanned at the point of sale (POS) terminal. Include in your
description how new stock can be ordered automatically.
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
..................................................................................................................................... [6]
10 The network manager at a school has been asked to develop a student registration system to
help staff keep a record of student attendance.
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
..................................................................................................................................... [6]
(b) The school is planning to use fingerprints as a way to record when students arrive in the
class.
Describe the advantages and disadvantages of using fingerprint data entry for student
registration systems rather than magnetic ID cards.
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
..................................................................................................................................... [4]
1...................................................................................................................................
.....................................................................................................................................
2...................................................................................................................................
.....................................................................................................................................
3...................................................................................................................................
.....................................................................................................................................
[3]
11 Most data protection acts include the principle that data should be accurate and, where
necessary, kept up to date.
1..........................................................................................................................................
............................................................................................................................................
2..........................................................................................................................................
............................................................................................................................................
3..........................................................................................................................................
............................................................................................................................................
4..........................................................................................................................................
............................................................................................................................................
[4]
12 The way we buy products using credit cards has changed in recent years. Originally the magnetic
stripe on the back of the card was used with a signature. Then chip and PIN methods were
used, and more recently contactless methods have been introduced.
Discuss the effectiveness of using these different methods to improve security when paying
for goods.
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................ [8]
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable
effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will
be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge Assessment
International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at
www.cambridgeinternational.org after the live examination series.
Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of
Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge.
INSTRUCTIONS
• Answer all questions.
• Use a black or dark blue pen.
• Write your name, centre number and candidate number in the boxes at the top of the page.
• Write your answer to each question in the space provided.
• Do not use an erasable pen or correction fluid.
• Do not write on any bar codes.
• You may use an HB pencil for any diagrams, graphs or rough working.
INFORMATION
• The total mark for this paper is 100.
• The number of marks for each question or part question is shown in brackets [ ].
• No marks will be awarded for using brand names of software packages or hardware.
06_0417_12_2020_1.15
© UCLES 2020 [Turn over
2
1 The 2020 Olympic Games committee is producing a database to show the medal winners in the
cycling events.
It is important that the correct data type is used in each of the fields.
(a) Tick (✓) the most appropriate data type for each of the following fields.
Text
Boolean Numeric
(alphanumeric)
(✓) (✓)
(✓)
Athlete_name
Gold_medal (Y/N)
Age
Name_of_country
[4]
(b) A report has been produced that shows the male gold medal winners from the past three
Olympic Games.
Write down six of the formatting features that have been used in the report.
1.........................................................................................................................................
...........................................................................................................................................
2.........................................................................................................................................
...........................................................................................................................................
3.........................................................................................................................................
...........................................................................................................................................
4.........................................................................................................................................
...........................................................................................................................................
5.........................................................................................................................................
...........................................................................................................................................
6.........................................................................................................................................
...........................................................................................................................................
[6]
........................................................................................................................................... [1]
1.........................................................................................................................................
...........................................................................................................................................
2.........................................................................................................................................
...........................................................................................................................................
[2]
3 Complete the following sentences using the most appropriate network term.
A communication method that wirelessly connects a mobile phone to a car, to allow hands-free
A network device that allows a stand-alone computer, using a dial-up analogue connection, to
[4]
4 A teacher is creating a spreadsheet that will record the grades students achieved in recent tests
and compare the average grades of these tests with the students’ forecast grades. The grading
the teacher is using awards 1 for the highest grade down to 10 for the lowest. The teacher has
created a validation rule on the grade entered.
(a) Give examples of data used to test the validation rule. Your answers for abnormal test data
must be for a different reason in each case.
Normal
Abnormal
Abnormal
Extreme
[4]
(b) Part of the spreadsheet is shown, column G subtracts the Forecast grade from the Average
grade.
(i) Describe the steps the teacher can take to edit the spreadsheet to prevent new data
being typed into the Forecast grade column.
................................................................................................................................
................................................................................................................................
................................................................................................................................
................................................................................................................................
................................................................................................................................
................................................................................................................................
................................................................................................................................
................................................................................................................................
................................................................................................................................
................................................................................................................................ [5]
(ii) The teacher has typed a formula in cell E3. The formula is ROUNDUP(AVERAGE(B3:D3),0)
Explain, in detail, what the formula does.
................................................................................................................................
................................................................................................................................
................................................................................................................................
................................................................................................................................
................................................................................................................................
................................................................................................................................
................................................................................................................................ [4]
(c) The teacher has produced a graph showing the differences between the forecast grade and
the average grade for each student. The graph looks like this.
Describe the steps taken to create the graph. Include in your answer three improvements that
could be made to the graph.
Method...............................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
Improvement 1...................................................................................................................
...........................................................................................................................................
Improvement 2...................................................................................................................
...........................................................................................................................................
Improvement 3...................................................................................................................
...........................................................................................................................................
[6]
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
.................................................................................................................................................. [2]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [6]
(b) Describe the methods which can be used to help prevent phishing.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [6]
7 Complete each sentence using the most appropriate output device from the following list.
........................................................................................................................................... [1]
........................................................................................................................................... [1]
(c) The device that can produce sound as its main output is called a
........................................................................................................................................... [1]
Describe the advantages and disadvantages of using a tablet computer rather than a desktop
computer.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
.................................................................................................................................................. [6]
(a) Describe two drawbacks in terms of lifestyle changes this has produced for the users of such
devices.
1.........................................................................................................................................
...........................................................................................................................................
2.........................................................................................................................................
...........................................................................................................................................
[2]
(b) Many of the microprocessor-controlled devices in our homes use WiFi connections.
Describe the benefits and drawbacks of using WiFi connections in this way.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [6]
10 Music scores can now be produced using computer systems and appropriate software.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
.................................................................................................................................................. [4]
(a) Describe two methods the headteacher could use to gather information about the requirements
of the target audience.
1.........................................................................................................................................
...........................................................................................................................................
2.........................................................................................................................................
...........................................................................................................................................
[2]
(b) The presentation is to be shown on large monitors at the entrance to the school. The school
is planning to embed music into the presentation so that music could be played as the
presentation is shown.
Describe the steps the headteacher would need to take to play music in the background of
the slides.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [4]
(c) After showing the presentation to the parents the headteacher wishes to use the presentation
to show to young children to encourage them to come to the school.
Describe the features that the headteacher must include to make the presentation meet the
needs of an audience of young children.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [4]
12 (a) Describe repetitive strain injury (RSI) and explain what causes it.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [2]
1.........................................................................................................................................
...........................................................................................................................................
2.........................................................................................................................................
...........................................................................................................................................
3.........................................................................................................................................
...........................................................................................................................................
[3]
13 Modern laptop computers tend to use external solid state storage rather than external optical
storage.
Compare and contrast the use of solid state storage with the use of optical storage to store data.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
.................................................................................................................................................. [8]
14 There are two types of storage within a computer, internal memory and backing storage.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
.................................................................................................................................................. [6]
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable
effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will
be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge Assessment
International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at
www.cambridgeinternational.org after the live examination series.
Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of
Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge.
INSTRUCTIONS
• Answer all questions.
• Use a black or dark blue pen.
• Write your name, centre number and candidate number in the boxes at the top of the page.
• Write your answer to each question in the space provided.
• Do not use an erasable pen or correction fluid.
• Do not write on any bar codes.
• You may use an HB pencil for any diagrams, graphs or rough working.
INFORMATION
• The total mark for this paper is 100.
• The number of marks for each question or part question is shown in brackets [ ].
• No marks will be awarded for using brand names of software packages or hardware.
06_0417_13_2020_1.13
© UCLES 2020 [Turn over
2
Tick (✓) the most appropriate type of software for each of the following.
Applications System
(✓) (✓)
Device driver
Linker
Photo-editing software
Spreadsheet
[2]
m
Files - Message
Working_file memo notes File Edit View Insert Format Tools Actions Help
Miscellaneous
Project1
........................................................................................................................................... [1]
1.........................................................................................................................................
...........................................................................................................................................
2.........................................................................................................................................
...........................................................................................................................................
[2]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [2]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [2]
4 Mason is the head of a year group at a school. Every term he needs to send to parents a report on
their child’s progress. This will include a written report and the percentage attendance over the
term.
Each term he loads the comments from his tutors into the word processing software. He then adds
the attendance data from the database. The report is then printed and sent to parents.
He has decided that in future he will use mail merge to print the reports.
(a) Give four advantages of using mail merge instead of typing the reports.
1.........................................................................................................................................
...........................................................................................................................................
2.........................................................................................................................................
...........................................................................................................................................
3.........................................................................................................................................
...........................................................................................................................................
4.........................................................................................................................................
...........................................................................................................................................
[4]
(b) As it is entered, the data on the database is checked using validation routines. The percentage
attendance field uses a range check.
Describe, using the percentage attendance field, the steps that need to be taken to create this
validation routine.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [4]
(c) Before the database can be implemented the validation routines need to be tested.
Describe, using the percentage attendance field, how the validation routine will be tested by
Mason.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [4]
5 The use of laptop computers and tablet computers by people on the move is becoming very popular.
Describe four advantages of using a tablet computer rather than a laptop computer.
1 ................................................................................................................................................
..................................................................................................................................................
2 ................................................................................................................................................
..................................................................................................................................................
3 ................................................................................................................................................
..................................................................................................................................................
4 ................................................................................................................................................
..................................................................................................................................................
[4]
6 The secretary of the Tawara Rowing Club is organising a presentation evening for its members. A
systems analyst is creating a database for the club to store the details of the members. She is also
creating a spreadsheet to show who is attending the presentation evening.
The systems analyst has set up the following fields for the database.
Membership Year
Name_of_person Date_of_birth Contact_email Contact_phone_no Gender
_type _joined
(a) For the following fields write down the most appropriate data type. Each data type must be
different. For any numeric field, specify the type of number.
Gender...............................................................................................................................
Membership_type..............................................................................................................
Year_joined........................................................................................................................
[3]
(b) Design an online data entry form which could be used to enter the details of one member,
using all the fields shown in the table.
In your design include appropriate spacing for each field and navigational aids. Do not include
data in the form.
[8]
(c) A spreadsheet has been created to show which members are attending the presentation
evening and who has paid.
A B C D E F G H I J K
Ahmed
4 Ahmed Othman Junior Y 3 30 Y Senior 20
Othman
Adam
6 Adam Mazian Social N 0 0 N
Mazian
Write down three of the formatting features that have been used in the part of the spreadsheet
shown.
1.........................................................................................................................................
...........................................................................................................................................
2.........................................................................................................................................
...........................................................................................................................................
3.........................................................................................................................................
...........................................................................................................................................
[3]
(d) A formula has been created and placed in cell G3. The formula is:
IF(E3=''Y'',VLOOKUP(D3,J$3:K$5,2)*F3,0)
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [6]
(e) The secretary needs to identify different types of members in the club.
Describe the steps he would take to sort the data by type of member so that Junior members
are at the top of the list.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [3]
7 A train company is improving security on its journeys. They are planning to introduce a facial
recognition system for passengers using their trains.
(a) Discuss the advantages and disadvantages of using facial recognition systems rather than
manually checking tickets.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [6]
(b) Facial recognition is an example of biometrics. Direct data entry devices can be in three forms.
One is biometrics. The second is contactless where the item being read does not touch the
reader. The third is physical where the item being read does touch the reader.
Tick (✓) whether the following are the most appropriate examples of biometrics or contactless
or physical direct data entry.
RFID
Magnetic stripe
Retina scan
Voice recognition
[4]
8 One implication of using a computer system is that people can break the law by hacking into other
computer systems. Cultural, Ethical and Moral implications can also be issues.
Tick (✓) the most appropriate implication for each of the following statements.
[4]
9 Lanfen has purchased a new computer. The computer has no internal storage. All the data is stored
in the cloud.
Compare and contrast computers that use cloud-based storage and computers that have internal
backing storage.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
.................................................................................................................................................. [6]
10 The modern home relies heavily on microprocessor-controlled devices. One of the benefits is that
a worker is able to return home to a warm house having set the heater control to switch on at a
certain time.
(a) Describe four benefits in terms of lifestyle changes that this has produced for the users of
such devices.
1.........................................................................................................................................
...........................................................................................................................................
2.........................................................................................................................................
...........................................................................................................................................
3.........................................................................................................................................
...........................................................................................................................................
4.........................................................................................................................................
...........................................................................................................................................
[4]
(b) The worker has set the heater control to switch on at 16:00 for two hours.
Explain how the microprocessor can operate the automatic heater to turn on and off at the
correct times.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [6]
Name and describe two other methods of implementing a new computer system. For each one
give an advantage and a disadvantage of this method. Your answers must be different in each
case.
Method 1...................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
Advantage 1..............................................................................................................................
..................................................................................................................................................
Disadvantage 1.........................................................................................................................
..................................................................................................................................................
Method 2...................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
Advantage 2..............................................................................................................................
..................................................................................................................................................
Disadvantage 2.........................................................................................................................
..................................................................................................................................................
[8]
12 A student is undertaking research for his studies. He needs to find up-to-date information and has
decided to look for it using the internet.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
.................................................................................................................................................. [6]
13 A school is planning to set up a student work files area. The school is considering allowing students
to log in to the student work files area either using the school’s intranet or the internet.
Discuss the advantages and disadvantages of using the school’s intranet rather than the internet
to access this student work files area.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
.................................................................................................................................................. [8]
BLANK PAGE
BLANK PAGE
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable
effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will
be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge Assessment
International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at
www.cambridgeinternational.org after the live examination series.
Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of
Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge.
2 hours
INSTRUCTIONS
● Answer all questions.
● Use a black or dark blue pen.
● Write your name, centre number and candidate number in the boxes at the top of the page.
● Write your answer to each question in the space provided.
● Do not use an erasable pen or correction fluid.
● Do not write on any bar codes.
● You may use an HB pencil for any diagrams, graphs or rough working.
INFORMATION
● The total mark for this paper is 100.
● The number of marks for each question or part question is shown in brackets [ ].
● No marks will be awarded for using brand names of software packages or hardware.
DC (DH/FC) 215559/5
© UCLES 2020 [Turn over
2
1 Complete the question using an appropriate item from the list given.
Blu-ray disc drive DVD RAM drive Hard disk drive Keyboard Laser printer
1 ................................................................................................................................................
2 ................................................................................................................................................
[2]
1 ................................................................................................................................................
2 ................................................................................................................................................
[2]
Tick (3) whether the following statements refer to the ALU, the Control unit or the Main memory.
Control Main
ALU unit memory
(3) (3) (3)
This is the immediate access storage
This carries out the calculations
This carries out logical decisions
This directs the input and output flow in the CPU
[4]
(a) Complete the following sentences using the most appropriate network device from the list.
Your answers must be different in each case.
A device used to connect a Local Area Network (LAN) to another LAN that uses the same
A device used to convert a computer’s digital signal to an analogue signal for communication
is called ................................................................................................................................... .
A device that connects a number of other devices and sends data to one specific device only
is ............................................................................................................................................. .
................................................................................................................................................. .
[4]
A router is used to connect a LAN to the internet. A message is sent from the router to another
router.
(b) Give the name of the part of the router where the IP addresses are stored.
...................................................................................................................................................
............................................................................................................................................. [1]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [5]
© UCLES 2020 0417/11/O/N/20 [Turn over
4
4 The HTML of a web page consists of a head section and a body section.
(a) The head section can contain the link to the stylesheet.
1 ................................................................................................................................................
2 ................................................................................................................................................
[2]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
5 The Fish Bowl is a large outdoor music arena. It uses an online booking system.
A customer has entered her data into the booking system using an online data entry form.
Number of Adults: 2
Number of Children: 0
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [6]
(b) When a person makes a booking, a ticket will be produced for each person. The ticket will be
sent by email and can then be printed out or used on a smartphone to gain entry to the event.
Design a ticket that includes elements for both visual and electronic checking for the
forthcoming music event.
[6]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
Due to an issue with Question 6b, the question has been removed from the question paper.
7 A new database system has been set up for a bookshop. Part of a record from the database
system is shown. Each field has a validation check which needs to be tested.
(a) For each field identify the most appropriate validation check. Each check must be different.
The validation checks for two fields have already been identified; these types of validation
check must not be used for the other fields.
(b) The Purchase_price field uses a range check. The prices of books range from 1 to 100.
Identify three items of test data which could be used with the Purchase_price field, giving
reasons for your choice. The reasons must be different in each case.
Item 1 ........................................................................................................................................
Reason .....................................................................................................................................
...................................................................................................................................................
Item 2 ........................................................................................................................................
Reason .....................................................................................................................................
...................................................................................................................................................
Item 3 ........................................................................................................................................
Reason .....................................................................................................................................
...................................................................................................................................................
[6]
8 Autonomous vehicles are being tested on some of the world’s roads. These vehicles can travel in
convoys with each vehicle following the one in front with a set distance between them. The whole
operation is computer controlled. If the vehicle in front slows down, then the following vehicle also
slows down to maintain the distance between them.
A proximity sensor is used to detect how close the vehicle is to the vehicle in front.
Describe how the microprocessor would maintain the set distance between the vehicles.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
.................................................................................................................................................... [6]
9 There have been a number of incidents where laptop computers containing highly sensitive
data have been left on trains. Manufacturers are now developing new ways of protecting laptop
computers and their data.
Discuss the effectiveness of different methods which could be used to protect the data.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
.................................................................................................................................................... [8]
10 A student is creating a database for her geography project to show all the earthquakes that
occurred in 2019. She has produced part of the database which is shown.
When she has completed her database, she needs to carry out some searches on the data. To
search for all the earthquakes with a depth of more than 20 km she will need to type the following
search criteria.
Depth(km) >20
(a) Write the search criteria to find all the earthquakes of a magnitude greater than or equal to
6.5, with a depth less than 15 km.
...................................................................................................................................................
............................................................................................................................................. [5]
(b) Give the name of the country that satisfies the search criteria in part (a).
............................................................................................................................................. [1]
The student has transferred the data into a spreadsheet in order to create a graph.
A B C D E F G
(c) (i) She has entered a formula in cell G3. The formula is
COUNTIF(A$3:A$19,F3)
Explain in detail what the formula in G3 does. Include in your answer an explanation of
the use of the $ sign.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [4]
(ii) The student is creating an appropriate chart/graph of the data in cells F3 to G10.
Write down the steps she needs to take to produce a chart/graph of the data on the
same sheet. Your answer must include examples of an appropriate title and labels.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [6]
11 Two types of documentation are written when a new computer system is created. Some items only
appear in the technical documentation and other items only in the user documentation whereas
some items appear in both.
Tick (3) whether the following items only appear in Technical documentation, only appear in
User documentation or appear in Both.
12 A teacher is teaching students about history using a virtual reality (VR) system.
1 ................................................................................................................................................
2 ................................................................................................................................................
3 ................................................................................................................................................
[3]
(b) The teacher carefully monitors the students’ use of the VR system. She only allows them 20
minutes on the device before taking a break. This is to ensure that they remain healthy whilst
using it.
Identify three health problems associated with the prolonged use of VR systems.
Problem 1 .................................................................................................................................
...................................................................................................................................................
Problem 2 .................................................................................................................................
...................................................................................................................................................
Problem 3 .................................................................................................................................
...................................................................................................................................................
[3]
(c) The teacher asks the students to create a presentation for their parents to explain to them
about the history of their town.
Describe the features that the students must include to make the presentation appeal to the
adults.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.
Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of
Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge.
2 hours
INSTRUCTIONS
● Answer all questions.
● Use a black or dark blue pen.
● Write your name, centre number and candidate number in the boxes at the top of the page.
● Write your answer to each question in the space provided.
● Do not use an erasable pen or correction fluid.
● Do not write on any bar codes.
● You may use an HB pencil for any diagrams, graphs or rough working.
INFORMATION
● The total mark for this paper is 100.
● The number of marks for each question or part question is shown in brackets [ ].
● No marks will be awarded for using brand names of software packages or hardware.
DC (DH/SG) 189826/3
© UCLES 2020 [Turn over
2
1 Complete the question using an appropriate item from the list given.
Bar code reader Blu-ray drive DVD drive Hard Disk Drive Keyboard
(a) Identify two solid state storage devices from the list.
1 ................................................................................................................................................
2 ................................................................................................................................................
[2]
(b) Identify two direct data entry devices from the list.
1 ................................................................................................................................................
2 ................................................................................................................................................
[2]
Tick (3) whether the following statements refer to the behaviour layer, content layer or
presentation layer.
Write down the most appropriate item of hardware that fits the following descriptions.
............................................................................................................................................. [1]
............................................................................................................................................. [1]
(c) A hardware device that reads analogue data from the environment.
............................................................................................................................................. [1]
The systems analyst has produced a number of different instructions to show how the system
works. Part of the instructions are shown.
(a) Complete the instructions by writing the most appropriate technical terms to explain how the
windows are operated.
• Data from the sensor is sent to the microprocessor via the ..............................................
...........................................................................................................................................
(b) Circle the two most appropriate input devices associated with the computerised glasshouse.
Discuss the benefits and drawbacks of using computer-controlled systems rather than
humans to build a car.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [6]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [8]
Protocol 1 .................................................................................................................................
Use ...........................................................................................................................................
...................................................................................................................................................
Protocol 2 .................................................................................................................................
Use ...........................................................................................................................................
...................................................................................................................................................
Protocol 3 .................................................................................................................................
Use ...........................................................................................................................................
...................................................................................................................................................
[6]
© UCLES 2020 0417/12/O/N/20 [Turn over
6
6 Khalid keeps a spreadsheet to record his expenses and to plan for future spending. This
spreadsheet is split into two separate sheets, which he has named Plan and Model.
Plan
A B C D
% of % of
1 Income Statement spending income
2 Income 63,784
3
4 Expenditure items
5 Taxes 12,757 22.22% 20%
6 Housing 19,135 33.33% 30%
7 Food 6,378 11.11% 10%
8 Transportation 9,568 16.67% 15%
9 Entertainment / Other 6,378 11.11% 10%
10 Healthcare 3,189 5.56% 5%
11
12 Investment return 4%
13 Income Growth 2.5%
14 Expense Ratio % 90%
15
Model
A B C D E F G
1 Model
2 2020 2021 2022 2023 2024 2025
3
4 Income 63,784 65,379 67,013 68,688 70,406 72,166
5 Investment Income 255 527 816 1,123 1,450
6 Total Income 63,784 65,634 67,540 69,504 71,529 73,616
7
8 Taxes 12,757 13,076 13,403 13,738 14,081 14,433
9 Housing 19,135 19,614 20,104 20,607 21,122 21,650
10 Food 6,378 6,538 6,701 6,869 7,041 7,217
11 Transportation 9,568 9,807 10,052 10,303 10,561 10,825
12 Entertainment / Other 6,378 6,538 6,701 6,869 7,041 7,217
13 Healthcare 3,189 3,269 3,351 3,434 3,520 3,608
14 Total Expenses 57,405 58,842 60,312 61,820 63,366 64,950
15
16 Net Income (Savings) 6,379 6,792 7,228 7,684 8,163 8,666
17
18
19 Balance Sheet
20 Savings 6,379 13,171 20,399 28,083 36,246 44,912
21 Can I afford a car? N N N N Y Y
22
(a) Khalid has entered a formula in cell C4 of the Model sheet. The formula is B4+(B4*Plan!$B13)
Explain, in detail, what the formula does. Include in your answer an explanation of why the $
and the ! are used in the formula.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [5]
(b) He is saving up to buy a new car; this will cost at least $35,000.
Khalid has entered a formula in cell B21 of the Model sheet. The formula is
IF(B20>35000,"Y","N")
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
Plan
A B C D
% of % of
1 Income Statement spending income
2 Income 63,784
3
4 Expenditure items
5 Taxes 12,757 22.22% 20%
6 Housing 19,135 33.33% 30%
7 Food 6,378 11.11% 10%
8 Transportation 9,568 16.67% 15%
9 Entertainment / Other 6,378 11.11% 10%
10 Healthcare 3,189 5.56% 5%
11
12 Investment return 4%
13 Income Growth 2.5%
14 Expense Ratio % 90%
15
(c) Khalid is planning to create an appropriate graph/chart to be placed in a new sheet. The
graph/chart will display the % of income and the names of the expenditure items from the
Plan sheet.
Identify the most appropriate graph/chart he could use and describe the steps he needs to
take to produce this graph/chart in a new sheet.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [7]
7 The owner of a soccer club has employed a systems analyst to create a new computerised system
to store details of club members.
The systems analyst starts by researching the existing system. One way he could do this is to
interview members of the soccer club.
(a) Discuss the benefits and drawbacks of individually interviewing the members.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [6]
(b) When the systems analyst created the new system, he had to choose data types for each
field.
Write down the most appropriate data type for each field. The answers in the table must be
different in each case. The data type for one field has already been identified; this data type
must not be used for the other fields.
Year_joined 2019
Gender F
Date_of_birth 04/11/2000
Cost_of_membership $10.50
[4]
(c) The systems analyst has set the data type for the Membership_number field as text.
Explain why this field has been set for a text data type rather than a numeric data type.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
(d) The owner of the soccer club is planning to create membership cards for all its members
using mail merge. The membership card will include personal data from the new system.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [6]
8 Many supermarkets now use the internet and allow customers to buy their products online.
(a) Explain, in detail, the effects that online shopping has had on supermarkets.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
(b) When customers shop online, they can pay using a debit card.
Describe measures that customers could use to reduce fraud when using a debit card online.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [5]
(c) Smishing, pharming and phishing are three security threats that can occur when using the
internet for shopping.
Tick (3) whether the following statements refer to pharming, phishing or smishing.
1 .......................................................................................................................................................
..........................................................................................................................................................
2 .......................................................................................................................................................
..........................................................................................................................................................
3 .......................................................................................................................................................
..........................................................................................................................................................
4 .......................................................................................................................................................
..........................................................................................................................................................
[4]
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
© UCLES 2020 0417/12/O/N/20 [Turn over
14
11 For each of the following pieces of hardware, explain the strategies you would use to help minimise
health problems.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
12 Describe the differences between using a Graphical User Interface (GUI) and a Command Line
Interface (CLI).
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
.................................................................................................................................................... [4]
BLANK PAGE
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.
Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of
Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge.
2 hours
INSTRUCTIONS
● Answer all questions.
● Use a black or dark blue pen.
● Write your name, centre number and candidate number in the boxes at the top of the page.
● Write your answer to each question in the space provided.
● Do not use an erasable pen or correction fluid.
● Do not write on any bar codes.
● You may use an HB pencil for any diagrams, graphs or rough working.
INFORMATION
● The total mark for this paper is 100.
● The number of marks for each question or part question is shown in brackets [ ].
● No marks will be awarded for using brand names of software packages or hardware.
DC (DH/FC) 189827/3
© UCLES 2020 [Turn over
2
1 A desktop computer consists of both hardware and software. The software is either applications
software or system software.
(a) Tick (3) whether the following are examples of applications software or system software.
applications system
(3) (3)
Measurement software
Linker
Database
Utility software
[2]
(b) Identify two internal items of hardware that could be found in a desktop computer.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
[2]
2 A computer system uses two types of documentation: technical and user. Some items only appear
in the technical documentation and other items only in the user documentation, whereas some
items appear in both.
Tick (3) whether the following items appear only in Technical documentation, only in User
documentation or in Both.
3 A student has produced a document for her biology project. Part of the project is shown. Answer
the questions relating to the document.
Apteryx is the
scientific name for
the Kiwi. The Kiwi is
a burrowing bird and
is the oldest of New
Zealand’s birds,
having evolved 70
million years ago from a flightless ancestor
from the great southern continent of
Gondwana. It is related to the Ostrich, Emu
and Rhea as well as the now extinct New
Zealand Moa, all of which are much taller
than the Kiwi. The Kiwi is a very secretive,
nocturnal bird which is seldom seen in the
wild.
2 3
(a) Give the name of the extra margin between the two pages of the document.
............................................................................................................................................. [1]
(b) Give the name of the space above the document, containing ‘Biology Project’ and the date.
............................................................................................................................................. [1]
(c) Name the term given to the single line of text that has overflowed on to the next page.
............................................................................................................................................. [1]
(d) Name the type of alignment used for the body text.
............................................................................................................................................. [1]
Name the type of formatting used to allow the text to flow around the image.
............................................................................................................................................. [1]
1 .......................................................................................................................................................
2 .......................................................................................................................................................
[2]
5 When a website is created, three web development layers are used: the content layer, the
presentation layer and the behaviour layer.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
6 The manager of a company is planning to create a computerised system and has asked a systems
analyst to research the current system. The systems analyst could do this by using a number of
different methods, but has chosen to create and send out a questionnaire to members of the
company.
(a) Discuss the benefits and drawbacks of sending out questionnaires to members of the
company.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [6]
(b) The system has been created. As the data is entered into the system it is verified.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
[2]
(c) Explain why data still needs to be validated even though it has been verified.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
(a) Identify two input devices that would be used in this system.
1 ................................................................................................................................................
2 ................................................................................................................................................
[2]
(b) Describe how a microprocessor would use the data from these devices to control the central
heating system.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [6]
8 A spreadsheet has been produced showing the final places in one of the events in the 2018 Winter
Olympic Games.
A B C D E F G H I J
1
Total
2 Country Name Heat1 Heat2 Heat3 Heat4 Time Min Seconds
3 KOR Yun Sungbin 50.28 50.07 50.18 50.02 200.6 3 20.55 20.6
4 LAT Martins Dukurs 50.85 50.38 50.32 50.76 202.3 3 22.31 22.3
5 GBR Dom Parsons 50.85 51.41 49.33 50.62 202.2 3 22.21 22.2
6 OAR Nikita Tregubov 50.59 50.50 50.50 50.59 202.2 3 22.18 22.2
7 LAT Tomass Dukurs 50.88 50.58 50.65 50.63 202.7 3 22.74 22.7
8 KOR Kim Jisoo 50.80 50.86 50.51 50.81 203.0 3 22.98 23.0
9 GER Axel Jungk 50.77 51.01 50.83 50.99 203.6 3 23.60 23.6
10
The event consists of four heats. The times taken to complete each heat are added together to
give the Total Time, in seconds. This is then displayed as minutes and seconds.
Two formulae form this calculation; they are stored in column H and column J.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
At the end of the competition, the table must be sorted into ascending order of Total Time. The top
athlete would be in the gold medal position, the second in silver medal position and the third in
bronze medal position. The Medal and Rank columns must be added.
A B C D E F G H I
1
Total
2 Medal Rank Country Name Heat1 Heat2 Heat3 Heat4 Time
3 Gold 1 KOR Yun Sungbin 50.28 50.07 50.18 50.02 200.55
4 Silver 2 OAR Nikita Tregubov 50.59 50.50 50.50 50.59 202.18
5 Bronze 3 GBR Dom Parsons 50.85 51.41 49.33 50.62 202.21
6 4 LAT Martins Dukurs 50.85 50.38 50.32 50.76 202.31
7 5 LAT Tomass Dukurs 50.88 50.58 50.65 50.63 202.74
8 6 KOR Kim Jisoo 50.80 50.86 50.51 50.81 202.98
9 7 GER Axel Jungk 50.77 51.01 50.83 50.99 203.60
10
(c) Explain the steps that must be taken to amend the spreadsheet and to display the data in this
way.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [6]
The heat times are measured by a computer system, but could be measured by officials with
stopwatches.
(d) Discuss the advantages and disadvantages of using computers in measurement rather than
humans.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [6]
(a) Describe the advantages of using emails compared with physical faxing.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [5]
(b) Explain the steps that need to be taken to ensure that if a virus is attached to the file, it cannot
infect the computer.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
3 ................................................................................................................................................
...................................................................................................................................................
[3]
10 The use of ICT in organisations has changed the way in which employees work.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
11 The director of a museum in China is planning an exhibition on ancient civilisations. One of the
exhibits is a full representation of a 10 000-year-old human. The Natural History Museum in
London is planning to send a complete skeleton, but it is too fragile.
(a) Describe how a computer could be used to create a 3D copy of the skeleton which will then
be printed in China.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [5]
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
3 ................................................................................................................................................
...................................................................................................................................................
4 ................................................................................................................................................
...................................................................................................................................................
[4]
12 Autonomous vehicles such as taxis are being tested on the world’s roads. This type of taxi is
able to drive between two points without the driver having control of the vehicle. The vehicles use
satellite navigation and wireless technology with sensors to navigate and control the vehicle.
Evaluate the use of these technologies when navigating and controlling vehicles in this way.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
.................................................................................................................................................... [8]
13 Email is a common way of communicating with other people. Netiquette is associated with
emailing.
A headmistress of a school has asked the network manager to produce a document listing
netiquette rules the staff and students should follow when sending emails from the school.
1 .......................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
2 .......................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
3 .......................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
[6]
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.
Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of
Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge.
INSTRUCTIONS
• Answer all questions.
• Use a black or dark blue pen.
• Write your name, centre number and candidate number in the boxes at the top of the page.
• Write your answer to each question in the space provided.
• Do not use an erasable pen or correction fluid.
• Do not write on any bar codes.
• You may use an HB pencil for any diagrams, graphs or rough working.
INFORMATION
• The total mark for this paper is 100.
• The number of marks for each question or part question is shown in brackets [ ].
• No marks will be awarded for using brand names of software packages or hardware.
03_0417_12_2021_1.10
© UCLES 2021 [Turn over
2
1 Tick (✓) whether the following are examples of internal or external hardware devices.
internal external
(✓) (✓)
Mouse
Video card
Printer
Actuator
[2]
2 Geeta spends a great deal of time at work entering data into her computer.
State three items of hardware that Geeta should be provided with to help avoid RSI when she
enters data into the computer.
1 ................................................................................................................................................
..................................................................................................................................................
2 ................................................................................................................................................
..................................................................................................................................................
3 ................................................................................................................................................
..................................................................................................................................................
[3]
th
3 Falyaz has created a diary using word processing software. The diary entry for 17 May 2020 is
shown.
(a) Write down four formatting features of the word processing software used to make this diary
entry.
Feature 1...........................................................................................................................
...........................................................................................................................................
Feature 2...........................................................................................................................
...........................................................................................................................................
Feature 3...........................................................................................................................
...........................................................................................................................................
Feature 4...........................................................................................................................
...........................................................................................................................................
[4]
(b) The original diary entry typed into the word processing software did not include an image.
Describe the steps that would be carried out by Falyaz to include in his diary entry an image
taken from his digital camera.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [6]
(c) Name two other sources of digital images apart from using a digital camera.
Source 1............................................................................................................................
...........................................................................................................................................
Source 2............................................................................................................................
...........................................................................................................................................
[2]
(d) Tick (✓) whether the following statements about generic image files refer to jpg, png or gif
file types.
[4]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [4]
4 The table shows a comparison of two different types of fitness tracker. A fitness tracker contains
a microprocessor, is worn around the wrist and monitors physical readings of the wearer.
GPS Y N
(a) You have been asked to design a poster to show this data for the two fitness trackers.
Describe how you would use six different design features to enhance the data in this poster.
The poster must be suitable for an audience of adult customers.
1.........................................................................................................................................
...........................................................................................................................................
2.........................................................................................................................................
...........................................................................................................................................
3.........................................................................................................................................
...........................................................................................................................................
4.........................................................................................................................................
...........................................................................................................................................
5.........................................................................................................................................
...........................................................................................................................................
6.........................................................................................................................................
...........................................................................................................................................
[6]
(b) Describe the computer processing involved in the use of a microprocessor-controlled fitness
tracker when displaying and monitoring the blood pressure of the user.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [4]
5 A parent is concerned about his children sending texts. When sending a text, it is important to follow
netiquette.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [2]
(b) The parent is planning to produce a number of rules to ensure that his children follow netiquette
when texting other people.
1.........................................................................................................................................
...........................................................................................................................................
2.........................................................................................................................................
...........................................................................................................................................
3.........................................................................................................................................
...........................................................................................................................................
4.........................................................................................................................................
...........................................................................................................................................
[4]
6 Complete the following sentences, using the most appropriate direct data entry device.
(a) The device that reads data from a card in a contactless card system is called
........................................................................................................................................... [1]
(b) The device that reads scanned text and converts it into a readable form is called
........................................................................................................................................... [1]
(c) The device that reads the data made up of black lines and spaces on household goods is
called
........................................................................................................................................... [1]
7 A school is planning to introduce a contactless card system for pupils to pay for school meals. Each
card contains an amount of money which is topped up by parents. Parents transfer amounts of
money into the school system and pupils place the card close to a reader to upload the money onto
the card.
(a) Discuss the benefits and drawbacks, to the pupils, of using a contactless card system rather
than paying by cash.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [6]
(b) The terminals in the school use electronic funds transfer at point of sale (EFTPOS).
Describe the computer processing that takes place to pay for a meal at the EFTPOS terminal
using the card.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [6]
8 A computer system is being created to calculate the scores in a diving competition. Every dive by
an athlete is awarded a score out of 10 by each judge.
The system is being tested using live data. An athlete completes his dive with a difficulty of 3.4 and
achieves the following scores, which are displayed in a spreadsheet.
(a) Before the overall score is calculated the judges’ scores need to be sorted into ascending
order.
Describe the steps that would be carried out to sort the data into ascending order.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [3]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [3]
(c) The judges’ score column will be tested using normal, abnormal and extreme data.
Explain, giving examples of test data which would be used, what is meant by:
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[4]
9 Tawara school uses an optical mark recognition (OMR) system for its school register. An example
of the register is shown. For each session of the school there are two lozenges to be shaded in.
At the start of the registration period the teacher shades in a lozenge [P] on the register to show
that a pupil is present and shades in a lozenge [A] for each pupil who is absent. If a pupil is late
then the teacher shades in both the [P] and the [A] lozenges. The register sheets are sent to the
school office to be processed and the data from them is stored in the computer’s database.
(a) Describe the inputs and computer processing of the registers when they are sent to the school
office, prior to them being stored on the computer’s database.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [6]
(b) The headteacher of the school is considering modernising the registration system so that pupils
can register using a facial recognition system.
Discuss the advantages and disadvantages of using a facial recognition registration system
rather than the OMR system they currently use.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [8]
Give two other examples of personal data that could be stored on the school registration
database.
1.........................................................................................................................................
...........................................................................................................................................
2.........................................................................................................................................
...........................................................................................................................................
[2]
10 Computer data can be stored on physical storage devices. Data can also be stored in the ‘cloud’.
(a) Explain what is meant by the cloud, giving two advantages of storing data in the cloud compared
with physical storage devices.
Explanation........................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
Advantage 1......................................................................................................................
...........................................................................................................................................
Advantage 2......................................................................................................................
...........................................................................................................................................
[4]
(b) Tick (✓) whether the following storage devices are examples of optical, magnetic or solid
state storage.
optical magnetic solid state
(✓) (✓) (✓)
Flash drive
SSD
[4]
11 The owner of a bookshop has a database of all the books she has in stock. As some of the data
is being entered into the database it is checked using validation checks.
ISBN 471837951
Number of copies 10
Type of book E
ISBN 0718121753
Number of copies 53
Type of book H
ISBN 978147183215
Number of copies 30
Type of book H
Explain, using a field name and examples of the data stored in that field in the database, why
validation checks must be appropriate to the data that is being checked.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
.................................................................................................................................................. [4]
12 A company has placed a firewall between their Local Area Network (LAN) and their internet
connection. This is used to increase security in their computer systems.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
.................................................................................................................................................. [6]
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable
effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will
be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge Assessment
International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at
www.cambridgeinternational.org after the live examination series.
Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of
Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge.
INSTRUCTIONS
• Answer all questions.
• Use a black or dark blue pen.
• Write your name, centre number and candidate number in the boxes at the top of the page.
• Write your answer to each question in the space provided.
• Do not use an erasable pen or correction fluid.
• Do not write on any bar codes.
• You may use an HB pencil for any diagrams, graphs or rough working.
INFORMATION
• The total mark for this paper is 100.
• The number of marks for each question or part question is shown in brackets [ ].
• No marks will be awarded for using brand names of software packages or hardware.
06_0417_11_2021_1.8
© UCLES 2021 [Turn over
2
Yes No
(✓) (✓)
Full name
Capital of England
Gender
[2]
[2]
1 ................................................................................................................................................
..................................................................................................................................................
2 ................................................................................................................................................
..................................................................................................................................................
3 ................................................................................................................................................
..................................................................................................................................................
4 ................................................................................................................................................
..................................................................................................................................................
[4]
4 Many banks have reduced the number of staff in their branches and replaced them with automatic
teller machines (ATMs). These ATMs, which can be located within the bank, can be used by
customers to deposit and withdraw money from their bank accounts.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [6]
Discuss the advantages and disadvantages to a customer of visiting the bank rather than using
internet banking.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [6]
5 Tawara school has a shop that sells items needed by pupils in school. Part of a spreadsheet with
details of the items is shown.
(a) Write down the number of rows that are shown in the spreadsheet that contain text.
........................................................................................................................................... [1]
(b) Write down the number of columns that are shown in the spreadsheet that contain text.
........................................................................................................................................... [1]
(c) Tax is paid on certain items sold in the shop. The tax rate that has to be paid is 20% of the
selling price. If tax is to be paid on an item, then ‘Y’ is placed underneath the Tax heading.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [5]
(d) Explain the steps that need to be taken to display cell H4 as US dollars.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [2]
6 You have been asked by the secretary of a soccer club to create a website to publicise its results,
fixtures and other events.
When the website has been created it has to be published on the internet. You plan to upload it
onto the internet using FTP.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [2]
(b) Explain how to upload and publish the content of a website using FTP.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [4]
Write down three different features of the web pages that could be tested. For each feature,
describe the method you would use to carry out the test.
Feature 1...........................................................................................................................
Method...............................................................................................................................
...........................................................................................................................................
Feature 2...........................................................................................................................
Method...............................................................................................................................
...........................................................................................................................................
Feature 3...........................................................................................................................
Method...............................................................................................................................
...........................................................................................................................................
[6]
7 A systems analyst has created a new computer system to keep records in a medical centre. She
has created a relational database to store the medical records of patients.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [3]
(b) Explain the difference between a primary key and a foreign key.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [4]
(c) A dentist works at the medical centre. The dentist stores the medical records of his patients.
Describe four other uses of the database software that the dentist can use to help him in his
work.
1.........................................................................................................................................
...........................................................................................................................................
2.........................................................................................................................................
...........................................................................................................................................
3.........................................................................................................................................
...........................................................................................................................................
4.........................................................................................................................................
...........................................................................................................................................
[4]
(d) The data stored on the computer system needs to be protected from unauthorised access.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [8]
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
.................................................................................................................................................. [6]
9 A company operates from 08:00 to 19:00, Monday to Friday. Full-time employees work a 40-hour
week, starting at 09:00 and finishing work at 17:00.
For each of the times worked by an employee, write down the most appropriate working pattern.
........................................................................................................................................... [1]
........................................................................................................................................... [1]
(c) The work of two employees combined is a 40-hour week; each work for two full days and a
half day.
........................................................................................................................................... [1]
(d) An employee works a full 8-hour day but has negotiated with his employer to complete this at
some point between 08:00 and 19:00, each day.
........................................................................................................................................... [1]
10 Tick (✓) the most appropriate method of implementation to match the statements below.
If the new system fails the whole of the old system is still
operational.
[4]
(a) Explain what is meant by the term hacking. Include in your answer two examples of the effects
this can have on the computer system.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [3]
(b) Describe three measures that could be taken to protect the data from being hacked.
1.........................................................................................................................................
...........................................................................................................................................
2.........................................................................................................................................
...........................................................................................................................................
3.........................................................................................................................................
...........................................................................................................................................
[3]
Original image
For each of the following images describe the software editing technique used in order to produce
the edited images shown from the original image.
Edited images
A B C D
A ...............................................................................................................................................
..................................................................................................................................................
B ...............................................................................................................................................
..................................................................................................................................................
C ...............................................................................................................................................
..................................................................................................................................................
D ...............................................................................................................................................
..................................................................................................................................................
[4]
13 RockIT Airlines representatives use a computer booking system to book flights for customers.
A representative from the airline types in the customer reference number, the number of passengers,
departure time, departure date, departure airport and the destination airport.
A customer is planning to take a flight from London Heathrow Airport. The representative types in
a code LHR for London Heathrow Airport. One of the reasons for using a code for the airport is to
improve data accuracy.
(a) Describe two other advantages of using a code rather than typing out the full name.
1.........................................................................................................................................
...........................................................................................................................................
2.........................................................................................................................................
...........................................................................................................................................
[2]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [2]
(c) Describe the processing and outputs involved in making the booking.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [6]
14 A road through a village has a speed limit of 45 kilometres per hour. The police are checking and
recording the speed of vehicles passing through the village using measuring hardware and software,
so they can produce a report of their findings.
(a) Explain the difference between measurement and control when using microprocessors.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [2]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [4]
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable
effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will
be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge Assessment
International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at
www.cambridgeinternational.org after the live examination series.
Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of
Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge.
INSTRUCTIONS
• Answer all questions.
• Use a black or dark blue pen.
• Write your name, centre number and candidate number in the boxes at the top of the page.
• Write your answer to each question in the space provided.
• Do not use an erasable pen or correction fluid.
• Do not write on any bar codes.
• You may use an HB pencil for any diagrams, graphs or rough working.
INFORMATION
• The total mark for this paper is 100.
• The number of marks for each question or part question is shown in brackets [ ].
• No marks will be awarded for using brand names of software packages or hardware.
06_0417_12_2021_1.2
© UCLES 2021 [Turn over
2
1 Tick (✓) whether the following are examples of control, measurement or modelling applications.
Personal finance
Weather forecasting
Burglar alarms
Weather stations
[4]
2 (a) Circle two items that could be used to output data directly from a smartphone.
[2]
(b) One of the uses of a smartphone is the sending and receiving of emails.
1.........................................................................................................................................
...........................................................................................................................................
2.........................................................................................................................................
...........................................................................................................................................
3.........................................................................................................................................
...........................................................................................................................................
4.........................................................................................................................................
...........................................................................................................................................
[4]
3 Tick (✓) the most appropriate storage medium that should be used in each scenario.
[4]
4 Complete the sentences below using the most appropriate word from the list.
........................................................................................................................................... [1]
(b) The software that gathers data by monitoring key presses on a user’s keyboard is called
........................................................................................................................................... [1]
(c) A fake text message, that could contain a link, sent to a mobile phone is called
........................................................................................................................................... [1]
5 Petr has set up a database for a science project on planets in the solar system. Part of the database
is shown.
(a) When Petr was designing his database, he had to set the data types for each field.
Complete the design table below by filling in the data types for each named field. Use the most
appropriate data type. Each data type must be different. For any numeric field, specify the type
of number.
Number_of_moons
Orbital_period
Rings
Name_of_planet
[4]
(b) Operators such as AND, OR, NOT, LIKE, >, >=, <, <=, =, <> can be used to search Petr’s
planet database. The search criteria for all the gas giant planets with more than 20 moons
would look like this:
Write down the search criteria that will produce a list of planets that are not gas giants but
have at least one moon and were first observed after 1800.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [7]
(c) Write down the names of the planets that are not gas giants but have at least one moon and
were first observed after 1800.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [2]
(d) Petr has copied the data from the Orbital_period field into a spreadsheet. The data for the
orbital period for Mars, 1.88, is stored in cell A2. In cell B2 he has entered a function of:
ROUND(A2,0)
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [2]
6 Humans can send unmanned aircraft into storms to collect wind speeds and temperature data. The
unmanned aircraft have sensors attached to them which send the data back to computers at the
weather station. The computers analyse the data.
Previously the aircraft was manned and all the data was collected and flown back to the weather
station.
Discuss the advantages and disadvantages of using the unmanned aircraft rather than using the
manned aircraft.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
.................................................................................................................................................. [8]
7 The owner of Tawara Hotels is planning a new computerised booking system. There are ten Tawara
Hotels throughout the world. The current booking system allows people to book rooms in any of
the Tawara Hotels. He has employed a systems analyst to research the current system and then
install the new system.
(a) When analysing the current booking system, the systems analyst must identify the user
requirements.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [3]
(b) Tick (✓) the relevant stage of the systems life cycle for each of the following activities.
Development
Activity Analysis and testing Evaluation
(✓) (✓) (✓)
[4]
(c) Before the new booking system is installed, the systems analyst has to decide on a method
of implementation. One method of implementation is pilot running.
Name two other methods of implementation and describe two benefits of each.
Name.................................................................................................................................
Benefit 1............................................................................................................................
...........................................................................................................................................
Benefit 2............................................................................................................................
...........................................................................................................................................
Name.................................................................................................................................
Benefit 1............................................................................................................................
...........................................................................................................................................
Benefit 2............................................................................................................................
...........................................................................................................................................
[6]
8 Students often use IT equipment; therefore it is important to have a good physical safety strategy.
Evaluate your own use of IT equipment, in terms of physical safety, and describe the strategies
you will need to minimise the potential physical safety risks.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
.................................................................................................................................................. [6]
1.........................................................................................................................................
...........................................................................................................................................
2.........................................................................................................................................
...........................................................................................................................................
[2]
(b) Social networking is used to communicate with friends; this is one use of the internet.
1.........................................................................................................................................
...........................................................................................................................................
2.........................................................................................................................................
...........................................................................................................................................
3.........................................................................................................................................
...........................................................................................................................................
4.........................................................................................................................................
...........................................................................................................................................
[4]
(c) A major part of the everyday use of the internet is social networking. Currently some social
networks are not policed. The owners of a website have full discretion on what material is
removed and what is allowed to be kept.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [8]
10 Describe the advantages, to both the company and employees, of changing work patterns due to
the introduction of computers.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
.................................................................................................................................................. [6]
Explain why a digital certificate is required. Include in your answer items that could be found in a
digital certificate.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
.................................................................................................................................................. [5]
(a) Describe the disadvantages of using a search engine to find information rather than typing in
a web address.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [4]
(b) A student is writing a project on rare animals. He uses a search engine to find information
about the animals from the internet. He is concerned about the reliability of some of the
information he has found.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [6]
The student plans to create a table, using word processing software, to display the information he
has found out about the animal.
Pouched No
Habitat Australia
(c) Explain how the student can create a table to enter this data.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [2]
(d) The student has saved a picture from the internet of a tiger quoll.
Explain how he could create a new row above the Pouched row and place the picture into the
right-hand cell of this new row.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [4]
BLANK PAGE
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable
effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will
be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge Assessment
International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at
www.cambridgeinternational.org after the live examination series.
Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of
Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge.
INSTRUCTIONS
• Answer all questions.
• Use a black or dark blue pen.
• Write your name, centre number and candidate number in the boxes at the top of the page.
• Write your answer to each question in the space provided.
• Do not use an erasable pen or correction fluid.
• Do not write on any bar codes.
• You may use an HB pencil for any diagrams, graphs or rough working.
INFORMATION
• The total mark for this paper is 100.
• The number of marks for each question or part question is shown in brackets [ ].
• No marks will be awarded for using brand names of software packages or hardware.
06_0417_13_2021_1.7
© UCLES 2021 [Turn over
2
1 Tick (✓) whether the following statements refer to Backing storage, RAM or ROM.
Backing
storage RAM ROM
(✓) (✓) (✓)
[4]
2 Circle two jobs where there has been an increase in employment as a direct result of the introduction
of computers.
Delivery drivers for
Car production workers Cleaning staff Medical staff
retail stores
Payroll workers Secretaries Teachers Website designers
[2]
3 A mobile phone is used for communications, either for making phone calls or text messaging.
Chang is planning an expedition to the Southern Alps in New Zealand. There is often a limited
mobile phone signal in these areas. He has set his phone up so that if there is an emergency he
can communicate with the rescue teams using text messaging rather than making a phone call.
1 ................................................................................................................................................
..................................................................................................................................................
2 ................................................................................................................................................
..................................................................................................................................................
[2]
4 Tick (✓) whether the following descriptions of analysing a system refer to Interviews, Observation
or Questionnaires.
[4]
5 Complete the sentences using the most appropriate item from the list.
(a) A piece of software that allows a user to display a web page is called a
........................................................................................................................................... [1]
........................................................................................................................................... [1]
(c) A web application that allows a group of people to edit the content is called a
........................................................................................................................................... [1]
6 Susan is creating a database about cars and needs to save it in the shared area (S:) on the school
network. It will be stored in the folder ICT which is contained in the IGCSE folder. She needs to
save the file with a file name that is different from file names used by other students in the group.
(a) Write down a suitable file name for the file so that the teacher can easily find Susan’s work
and identify its contents. The file name should not contain spaces.
...........................................................................................................................................
........................................................................................................................................... [1]
(b) Write down the file path which Susan would use to store the file in the correct folder.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [2]
(c) Susan plans to work on her database at home. However, the database is very large so her
teacher has told her that it needs to be reduced in size. She will then be able to attach it to an
email so she can send it home.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [2]
7 A family has purchased a wireless router for use in their home to allow their devices to be connected
via WiFi to form a wireless local area network (WLAN).
(a) When the family purchased the wireless router they were advised to change the default
password.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [2]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [4]
(c) Their son produces large complex diagrams on his desktop computer at home. He needs to
be able to access the diagrams when he is at university. Even if reduced in file size, the
diagrams would be too large to send using email.
Describe in detail how he could transfer the diagrams from his home desktop computer to be
able to access them at university, without using additional hardware.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [4]
(d) One of the parents in the family works for a government department and sends sensitive data
from their home computer to the office.The data is encrypted before being sent to ensure it is
harder to understand if it is intercepted.
Describe four other preventative measures that could be taken to avoid network security
issues.
1.........................................................................................................................................
...........................................................................................................................................
2.........................................................................................................................................
...........................................................................................................................................
3.........................................................................................................................................
...........................................................................................................................................
4.........................................................................................................................................
...........................................................................................................................................
[4]
8 Many teachers feel that monitoring student progress is an important part of the teaching and learning
process.
Describe how the features of a spreadsheet can be used by a teacher to help monitor student
progress.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
.................................................................................................................................................. [6]
9 One way of communicating with other people is to use emails. It is very important that when you
send and receive emails you are aware of esafety.
Evaluate your own use of email in terms of esafety and describe the strategies you will need to
minimise the potential esafety risks.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
.................................................................................................................................................. [8]
10 Aimi works for a shop that sells toys. She is setting up a relational database of the stock in the
shop. She has started designing the database. Aimi has written down the questions that are asked
about each toy and needs to produce appropriate field names from them. An example of the type
of data that is to be stored is shown.
(a) Complete the design table below by filling in an appropriate field name for each question. Each
field name must be different. Field names must not include spaces.
[4]
(b) When Aimi created the whole database one of the fields was set as integer. However, as data
is entered Aimi realises that the field should have been set to two decimal places.
Describe the steps that need to be taken, by Aimi, to change the field from an integer to a
decimal. This field will be set to two decimal places.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [4]
(c) Aimi created a relational database but could have created a flat file database.
Discuss the advantages and disadvantages of using a relational database rather than a flat
file database.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [6]
11 Tawara College is setting up a new website for its older students. The website will publicise the
events in the college, as well as revision and sporting activities. The headteacher wants the website
to be attractive to the older students and it must meet their needs.
Before the website can be produced the needs of the audience have to be taken into account.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
.................................................................................................................................................. [8]
12 The director of a zoo is writing a document about wallabies. He has taken an image of some
wallabies (Fig. 12.1) and is planning the layout of the pages which will include part of the image.
The image he plans to use is shown in Fig. 12.2.
Fig. 12.1
Fig. 12.2
(a) Name the editing technique that was used to change Fig. 12.1 to Fig. 12.2.
........................................................................................................................................... [1]
(b) The director will include images and information about the wallabies in the document. Each
page will be set out in 2 columns with a line between them.
(i) Describe the steps taken to create the columns. Assume the software has been loaded
and the text has been entered.
................................................................................................................................
................................................................................................................................
................................................................................................................................
................................................................................................................................
................................................................................................................................
................................................................................................................................ [3]
................................................................................................................................
................................................................................................................................
................................................................................................................................
................................................................................................................................
................................................................................................................................
................................................................................................................................
................................................................................................................................
................................................................................................................................ [4]
(c) As the document is being written for the zoo it needs to conform to the corporate house style.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [4]
13 A student is looking for information on the internet for his school project. He has found a number
of web pages that are useful.
(i) Bookmark
................................................................................................................................
................................................................................................................................
................................................................................................................................
................................................................................................................................ [2]
(ii) Anchor
................................................................................................................................
................................................................................................................................
................................................................................................................................
................................................................................................................................ [2]
(iii) Hyperlink
................................................................................................................................
................................................................................................................................
................................................................................................................................
................................................................................................................................ [2]
(b) The student has found a website that is very useful and is planning to bookmark it.
Describe the steps he will need to take to set up a bookmark for the website.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [2]
Describe the advantages and disadvantages of using magnetic tapes rather than flash memory for
backing up data.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
.................................................................................................................................................. [6]
15 Streaming movies and music is replacing downloading or purchasing a physical copy of the files.
Describe the advantages and disadvantages of streaming files rather than using other methods.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
.................................................................................................................................................. [4]
BLANK PAGE
BLANK PAGE
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable
effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will
be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge Assessment
International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at
www.cambridgeinternational.org after the live examination series.
Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of
Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge.
2 hours
INSTRUCTIONS
● Answer all questions.
● Use a black or dark blue pen.
● Write your name, centre number and candidate number in the boxes at the top of the page.
● Write your answer to each question in the space provided.
● Do not use an erasable pen or correction fluid.
● Do not write on any bar codes.
● You may use an HB pencil for any diagrams, graphs or rough working.
INFORMATION
● The total mark for this paper is 100.
● The number of marks for each question or part question is shown in brackets [ ].
● No marks will be awarded for using brand names of software packages or hardware.
DC (CE/FC) 203093/2
© UCLES 2021 [Turn over
2
...................................................................................................................................................
............................................................................................................................................. [1]
1 ................................................................................................................................................
2 ................................................................................................................................................
[2]
...................................................................................................................................................
............................................................................................................................................. [1]
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
[2]
2 Circle two jobs where there has been a decrease in employment as a direct result of the
introduction of computers.
3 Describe two advantages of using a tablet computer rather than a laptop computer.
1 .......................................................................................................................................................
..........................................................................................................................................................
2 .......................................................................................................................................................
..........................................................................................................................................................
[2]
4 Tick (3) whether the following advantages of analysing a system refer to looking at existing
paperwork, observation or questionnaires.
Looking
at existing
paperwork Observation Questionnaire
(3) (3) (3)
[4]
5 Tawara Tours has created a new online booking system to allow customers to book holidays. The
system was written using modules.
(a) Describe how the new system could be tested prior to it becoming operational.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [6]
(b) Tawara Tours used to book holidays using a manual booking system. This used a pen and
paper to make the bookings.
Discuss the advantages and disadvantages of using online booking systems rather than a
manual booking system.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [8]
6 As a student you often use a computer screen. This could be a screen on a desktop computer, a
laptop computer or even a smartphone.
Evaluate your use of computer screens, in terms of health risks, and explain any strategies you
use to minimise these health risks.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
.................................................................................................................................................... [6]
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
.................................................................................................................................................... [4]
(a) Explain how the purpose of the internet differs from the purpose of an intranet.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
Employees in the organisation are allowed to access the intranet using their smartphones.
The employees are required to secure their smartphones using either facial recognition, passwords
or voice recognition.
(b) Tick (3) whether the following statements refer to facial recognition, password or
voice recognition.
Facial Voice
recognition Password recognition
(3) (3) (3)
This method cannot access the
smartphone unintentionally
The accuracy of this method can be
affected by noise
This method requires the use of the
smartphone’s camera
This method could be compromised by
shoulder surfing
[4]
(a) Describe two other jobs that robots can perform in car production.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
(b) When the spray paint can is empty it needs to be refilled. There is a sensor in the can which
measures the amount of paint.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [6]
(c) Discuss the advantages and disadvantages of the introduction of robots rather than employing
humans to spray paint the cars.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [6]
10 (a) Explain the differences between a VLOOKUP function and a LOOKUP function.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
(b) A spreadsheet contains a list of staff and the rooms they work in at a school.
A B C D E
1 Room Department Name
2 29 Languages Aaron Garcia 31 =VLOOKUP(D2,A2:C7,3)
3 30 History Julieta Diaz
4 28 Chemistry Ernesto Fernandez
5 26 Biology Salvador Calbo
6 31 ICT David James
7 49 Mathematics Adriene Martinez
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [3]
(ii) When certain room numbers are typed into cell D2 unexpected results appear in cell E2.
Suggest improvements that could be made to ensure the correct result is displayed.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [2]
A teacher in the school has created a spreadsheet to display whether a student has good
timekeeping when arriving at lessons. He has produced a formula but thinks it could be improved.
The formula is:
=IF(B4>=A$18,B$18,IF(B4>=A$17,B$17,IF(B4>=A$16,B$16,IF(B4>=A$15,B$15,IF(B4>=A$14,B$14,"")))))
A B C
1
2 Name of Student
3 Half term Lates
4 1 17 =IF(B4>=A$18,B$18,IF(B4>=A$17,B$17,IF(B4>=A$16,B$16,IF(B4>=A$15,B$15,IF(B4>=A$14,B$14,"")))))
5 2 20
6 3 1
7 4 12
8 5 18
9 6 0
10
11
12
13
14 0 Excellent
15 1 Very Good
16 5 Good
17 15 Poor
18 25 Very Poor
19
(c) Write down the value that should appear in cell C4.
............................................................................................................................................. [1]
(d) The teacher has improved the formula and has typed in =VLOOKUP(B4,A$14:B$18,2)
Explain the advantages of using this formula compared to the original one.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
11 Many young people play online games. One problem with online gaming is that it is easy to give
out personal details accidentally. Some users create weak passwords which could lead to their
personal details being accessed.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
[2]
(b) Write down three rules that should be applied when setting a strong password.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[3]
(c) Describe safety measures that should be taken by gamers to ensure their data is safe other
than using strong passwords.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [6]
© UCLES 2021 0417/11/O/N/21
13
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [6]
13 A student is working on a project on the World Games. He has produced some information but has
decided to produce a second layout including a table. The original layout and the new layout are
shown.
(a) Explain, step by step, how the table was created, without the text being entered by hand.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
(b) The student checks the text he has written using a spell checker.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
(c) Explain why the suggestions made by the spell checker do not always give the correct
response.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.
Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of
Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge.
2 hours
INSTRUCTIONS
● Answer all questions.
● Use a black or dark blue pen.
● Write your name, centre number and candidate number in the boxes at the top of the page.
● Write your answer to each question in the space provided.
● Do not use an erasable pen or correction fluid.
● Do not write on any bar codes.
● You may use an HB pencil for any diagrams, graphs or rough working.
INFORMATION
● The total mark for this paper is 100.
● The number of marks for each question or part question is shown in brackets [ ].
● No marks will be awarded for using brand names of software packages or hardware.
DC (CE/FC) 203094/2
© UCLES 2021 [Turn over
2
(a) Give two examples of input devices which are part of a laptop computer.
1 ................................................................................................................................................
2 ................................................................................................................................................
[2]
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
[2]
2 Tick (3) the most appropriate printer which relates to the following statements.
[4]
3 (a) Describe two disadvantages of using a tablet computer rather than a laptop computer.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
[2]
State two ways music can be transferred onto a computer that does not contain an optical
drive.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
[2]
4 Write down the most appropriate network device to match the following statements. Your answers
should be different in each part.
(a) This network device checks the data packet arriving from one computer and sends the data
to a specific computer.
............................................................................................................................................. [1]
(b) This network device sends the data packet from a computer to all devices connected to it.
............................................................................................................................................. [1]
............................................................................................................................................. [1]
(d) This network device connects one LAN to another with the same protocol.
............................................................................................................................................. [1]
5 The Internet of Things (IoT) is a computer network which allows users to control household
devices remotely. It has many benefits, for example a user can turn on the house central heating
via a smartphone. The IoT can use WiFi and Bluetooth which can cause problems regarding data
security.
Describe the methods that could be taken to protect the user’s data.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
.................................................................................................................................................... [6]
6 As a student you often use a computer keyboard. This could be a virtual keyboard or a physical
keyboard on a desktop computer, a laptop computer or even a smartphone.
Evaluate your use of computer keyboards in terms of health risks, and explain any strategies you
use to minimise these health risks.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
.................................................................................................................................................... [8]
7 Rockit Motors recently created a new car sales website. The website uses internet shopping
features. Customers can ask questions of the virtual salespeople on the website, and then
purchase the car on the website.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
(b) Discuss the benefits and drawbacks of using internet shopping for Rockit Motors.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [6]
(c) Before the website became operational it needed to be tested. The web designer created a
test plan including module and whole system testing.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
8 You are creating a presentation on the World Games. You have created a spreadsheet showing
the number of gold, silver and bronze medals awarded to different countries.
You are planning to create a graph in the presentation showing the country, the number of gold
medals and the total number of medals.
A B C D E F
1 World Games Medals
2
3 Country Gold Silver Bronze Total
4 1 Italy 153 145 142 440
5 2 United States 142 131 109 382
6 3 Germany 137 111 138 386
7 4 Russia 137 110 72 319
8 5 France 101 102 105 308
9 6 China 68 55 27 150
10 7 Great Britain 61 89 210 360
11 8 Japan 55 38 53 146
12 9 Ukraine 47 36 125 208
13 10 Spain 42 42 42 126
Original data
(a) Explain how you would create a vertical bar chart, showing the name of the country, the
number of gold medals and the total number of medals awarded to each country, on a new
slide in the presentation.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [6]
(b) The total number of medals has been calculated manually and entered as a value. This could
lead to errors.
Explain how you could create a formula to calculate the total number of medals awarded for
Italy, using only the mouse.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
(c) Explain how the data could be sorted by the total number of medals won by each country.
The country with the largest number of medals should be at the top of the list.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
1 .......................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
2 .......................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
3 .......................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
[6]
10 A school is planning to change the way it reports back to parents about their child’s academic
progress. They plan to produce a mail merged document and then email this to parents.
They have created a spreadsheet which shows the pupil’s name, target, attainment and effort
levels for Maths and the Science subjects.
A B C D E F G H I J K
1 Name Target level Maths Biology Chemistry Physics
2 Attainment Effort Attainment Effort Attainment Effort Attainment Effort
3 Ahmal Wulandan 6 7 2 6 2 8 1 7 2
4 Nurul Prakoso 8 7 3 7 3 9 1 7 2
5
(a) Design a suitable document layout to display the information of one pupil. The name of the
pupil must be clearly shown separated from the rest of the data. It must have appropriate
spacing. Do not include the pupil’s data.
[6]
(b) The attainment levels range from 1 to 9 and the effort levels range from 1 to 3. Before teachers
are allowed to enter data, the spreadsheet needs to be tested.
Write down one example of extreme data to test the attainment field and one example of
abnormal data to test the effort field.
(c) Describe four advantages of using a mail merge for this document.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
3 ................................................................................................................................................
...................................................................................................................................................
4 ................................................................................................................................................
...................................................................................................................................................
[4]
(d) When the mail merge is created, a special field containing the date needs to be added. This
date will change automatically each time the merged document is sent or printed.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
11 An air-conditioning system has been fitted in a hotel bedroom. The air-conditioning system will
contain fans which operate at varying speeds.
Identify the devices used in the system from the descriptions given.
............................................................................................................................................. [1]
(b) This device changes the data from the microprocessor into a form that can change the speed
of the fan.
............................................................................................................................................. [1]
............................................................................................................................................. [1]
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
.................................................................................................................................................... [6]
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
.................................................................................................................................................... [4]
14 Students in Tawara College are using the internet to find information for a project. They have been
told that the college has a firewall.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [6]
The students visit different websites to get information for their project.
(b) Explain why it is not always easy for the students to find reliable information on the internet.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.
Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of
Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge.
2 hours
INSTRUCTIONS
● Answer all questions.
● Use a black or dark blue pen.
● Write your name, centre number and candidate number in the boxes at the top of the page.
● Write your answer to each question in the space provided.
● Do not use an erasable pen or correction fluid.
● Do not write on any bar codes.
● You may use an HB pencil for any diagrams, graphs or rough working.
INFORMATION
● The total mark for this paper is 100.
● The number of marks for each question or part question is shown in brackets [ ].
● No marks will be awarded for using brand names of software packages or hardware.
DC (CE/FC) 203095/3
© UCLES 2021 [Turn over
2
(a) Give two examples of input devices which are part of a tablet computer.
1 ................................................................................................................................................
2 ................................................................................................................................................
[2]
(b) Give two examples of output devices which are part of a tablet computer.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
[2]
Tick (3) the most appropriate recognition system which relates to the following statements.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
[2]
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
3 ................................................................................................................................................
...................................................................................................................................................
[3]
4 A library system has two tables; one for borrowers and one for books. Extracts from these tables
are shown.
Borrowers table
Books table
(a) Name the most appropriate validation check for each of these fields. Your answer must be
different for each field.
ISBN .........................................................................................................................................
Date_due_back ........................................................................................................................
[2]
(b) (i) For the books table, name the most appropriate field that could be used as a primary
key.
..................................................................................................................................... [1]
(ii) The librarian has created a relationship between the books table and the borrowers
table.
For the books table, name the most appropriate foreign key field that would be used to
create the relationship.
..................................................................................................................................... [1]
(c) The data type for Contact_telephone has been set as text.
Explain why this field has been set to text rather than integer.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
(d) At the end of each day the tables are searched to issue reminders to borrowers about books
that are overdue.
Describe the automatic processing involved in searching and issuing of reminders for overdue
books.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [6]
5 Keeping data secure is very important in any computer system. Many organisations use encryption
when sending data.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
.................................................................................................................................................... [4]
(a) Describe the computer processing involved in using contactless bank cards to pay for
purchases.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
Fewer and fewer customers now use high street banks, preferring to bank online using the internet.
(b) Discuss the advantages and disadvantages of internet banking for the customer.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [6]
Transactions with the bank’s website use a variety of technologies including SSL.
(c) Explain what is meant by SSL. Include in your answer why SSL is used.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
https://www.tawarabank.com
https:// .......................................................................................................................................
...................................................................................................................................................
tawarabank ...............................................................................................................................
...................................................................................................................................................
.com ..........................................................................................................................................
...................................................................................................................................................
[3]
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
.................................................................................................................................................... [6]
Customers can test drive the cars they are planning to purchase using virtual reality systems
within the store.
(a) Name two devices which would be used in this virtual reality system.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
[2]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
The manager of Rockit Motors has created many different types of documents including letters
and memos for the company. Each of them is produced using its corporate house style.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
10 Many young people now use social media rather than other forms of communication.
Evaluate your own use of social media and explain any eSafety strategies you could use to help
minimise the potential dangers.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
.................................................................................................................................................... [6]
11 A student has taken a photograph of him and his friend, using a digital camera. He needs to
increase the size of the image to include it on a poster.
...................................................................................................................................................
............................................................................................................................................. [1]
(b) He now wishes to edit the image to remove his friend. He edits the image by cropping it and
removing part of the image.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [5]
12 A doctor measures the blood pressure of some of his patients regularly. The patients take home a
blood pressure machine and record their results on a spreadsheet which the doctor has created.
Part of the spreadsheet is shown.
A B C D E F G H I
1 Blood pressure readings Blood pressure warnings
2 Date Sys Dia Warning Sys Dia Warning
3 10-Feb 134 74 Normal 60 40 Low
4 11-Feb 137 67 Normal 120 80 Normal
5 12-Feb 145 81 Mild 140 90 Mild
6 13-Feb 150 86 Mild 160 100 Moderate
7 14-Feb 180 74 Severe 180 110 Severe
8 15-Feb 134 75 Normal
9 16-Feb 130 57 Normal
(a) When a reading produces a Severe or Low warning then the text automatically changes to a
red font on a light red background.
Explain how the doctor could set up automatic colour change for these warnings on the
spreadsheet.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [5]
The doctor has set up a named range called Bloodpressure for the cells F3 to H7.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
The doctor has created a graph of the readings for one patient and has displayed it on the
spreadsheet. However, there are elements missing.
A B C D E F G H I J K L M
1 Blood pressure readings Blood pressure warnings
2 Date Sys Dia Warning
Chart Title
3 10-Feb 134 74 Normal
4 11-Feb 137 67 Normal 200
180
5 12-Feb 145 81 Mild
160
6 13-Feb 150 86 Mild
140
7 14-Feb 180 74 Severe 120
8 15-Feb 134 75 Normal 100
9 16-Feb 130 67 Normal 80
10 60
11 40
20
12
0
13
09-Feb 10-Feb 11-Feb 12-Feb 13-Feb 14-Feb 15-Feb 16-Feb 17-Feb
14
Sys Dia
15
16
(d) Explain how the doctor created the graph. Write in your answer one improvement that could
be made to the graph.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
(e) At the end of the month the doctor needs to produce a hard copy document showing
information about a patient: their name, date of birth and patient number, as well as data and
the graph from the spreadsheet.
Design a suitable document layout. The document must have appropriate spacing.
[5]
BLANK PAGE
BLANK PAGE
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.
Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of
Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge.
INSTRUCTIONS
• Answer all questions.
• Use a black or dark blue pen.
• Write your name, centre number and candidate number in the boxes at the top of the page.
• Write your answer to each question in the space provided.
• Do not use an erasable pen or correction fluid.
• Do not write on any bar codes.
• You may use an HB pencil for any diagrams, graphs or rough working.
INFORMATION
• The total mark for this paper is 100.
• The number of marks for each question or part question is shown in brackets [ ].
• No marks will be awarded for using brand names of software packages or hardware.
03_0417_12_2022_1.13
© UCLES 2022 [Turn over
2
...........................................................................................................................................
........................................................................................................................................... [1]
1 ........................................................................................................................................
2 ........................................................................................................................................
[2]
1 ........................................................................................................................................
2 ........................................................................................................................................
[2]
[2]
ROM .................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
RAM ..................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[4]
(b) Modern laptop computers use Solid State Drives (SSD) rather than Hard Disk Drives (HDD).
State three advantages of using SSDs rather than HDDs in a laptop computer.
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
3 ........................................................................................................................................
...........................................................................................................................................
[3]
4 Tick (✓) whether the following statements refer to control, measurement or modelling systems.
Using what-ifs
[4]
5 The World Wide Web (WWW) is often mistaken for the internet.
(a) Explain the differences between the WWW and the internet.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [4]
https://www.cambridgeinternational.org/IGCSE
https:// ...............................................................................................................................
...........................................................................................................................................
cambridgeinternational .....................................................................................................
...........................................................................................................................................
.org ...................................................................................................................................
...........................................................................................................................................
/IGCSE .............................................................................................................................
...........................................................................................................................................
[4]
6 Global Positioning Systems (GPS) are used for many different applications.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [4]
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
3 ........................................................................................................................................
...........................................................................................................................................
[3]
7 Tawara School is presenting a concert. For previous concerts the booking of tickets was carried
out manually using pen and paper.
For this concert they are going to use an online booking system.
(a) Discuss the advantages and disadvantages of Tawara School using an online booking system
rather than the manual system.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [8]
(b) Identify the most appropriate method of implementation of the new online booking system in
this scenario.
........................................................................................................................................... [1]
(c) Explain, giving reasons, why your answer to part (b) is the most appropriate method of
implementation for this scenario.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [3]
8 Describe the advantages and disadvantages of using a smartphone rather than a laptop computer
to access the internet.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
.................................................................................................................................................. [6]
9 The introduction of computers into the work place has affected job patterns.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [2]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [2]
(c) Employees working in an office use computers for prolonged periods of time.
Describe three items that an employee should be provided with to help reduce the health
problems related to prolonged use of computers.
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
3 ........................................................................................................................................
...........................................................................................................................................
[3]
State two physical safety issues that might exist from the introduction of computers.
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
[2]
10 A touch screen is both an input device and an output device. Touch screens are used on many
devices. A tablet computer uses a touch screen.
Describe the advantages and disadvantages of using a touch screen rather than a monitor and
keyboard for the tablet computer.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
.................................................................................................................................................. [6]
11 When creating an ICT solution, the legal, moral, ethical and cultural implications have to be
considered.
Choose the most appropriate implication that matches the descriptions given below.
........................................................................................................................................... [1]
(b) Not giving information about the ICT solution to another company.
........................................................................................................................................... [1]
12 The manager of a car garage has asked a systems analyst to create a new database system for
the checking of cars making sure they are safe to drive. The checking of cars is known as a service.
Cars are serviced every 10000 km, for example 10000 km, 20000 km.
The minimum cost of the service is 1500 rupees and the maximum is 5000 rupees depending on
the model of car.
(a) Complete this table, filling in the field names and the most appropriate data types to create
the database using the information given above. For any numeric field, specify the type of
number.
Vehicle_licence_plate
Powered_by
Numeric:integer
Cost_of_service
Text
Date_of_service
[6]
Discuss the advantages and disadvantages of creating a relational database rather than a flat
file database.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [6]
(c) For each of the fields shown, name and describe one validation check that could be used on
the data. Your answers must be different in each case.
(i) Vehicle_licence_plate
Description ............................................................................................................
................................................................................................................................
[2]
(ii) Cost_of_service
Description ............................................................................................................
................................................................................................................................
[2]
(iii) Date_of_service
Description ............................................................................................................
................................................................................................................................
[2]
(a) Identify three items of computer hardware that may need to be purchased in order to set up
a computer network so the devices can use the internet.
1 ........................................................................................................................................
2 ........................................................................................................................................
3 ........................................................................................................................................
[3]
(b) Arjun is a member of the family. He uses the internet to carry out research and send work to
his office.
Describe three other ways he could make appropriate use of the internet.
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
3 ........................................................................................................................................
...........................................................................................................................................
[3]
(c) Arjun uses the internet to carry out research for his work.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [2]
(d) Arjun can log directly into his office system from his home computer. The office system only
requires users to enter their user id and a password.
................................................................................................................................
................................................................................................................................
................................................................................................................................
................................................................................................................................ [2]
(ii) Describe two other ways the office system could identify the user securely.
1 ............................................................................................................................
................................................................................................................................
................................................................................................................................
................................................................................................................................
2 ............................................................................................................................
................................................................................................................................
................................................................................................................................
................................................................................................................................
[4]
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable
effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will
be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge Assessment
International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at
www.cambridgeinternational.org after the live examination series.
Cambridge Assessment International Education is part of Cambridge Assessment. Cambridge Assessment is the brand name of the University of Cambridge Local
Examinations Syndicate (UCLES), which is a department of the University of Cambridge.
INSTRUCTIONS
• Answer all questions.
• Use a black or dark blue pen.
• Write your name, centre number and candidate number in the boxes at the top of the page.
• Write your answer to each question in the space provided.
• Do not use an erasable pen or correction fluid.
• Do not write on any bar codes.
• You may use an HB pencil for any diagrams, graphs or rough working.
INFORMATION
• The total mark for this paper is 100.
• The number of marks for each question or part question is shown in brackets [ ].
• No marks will be awarded for using brand names of software packages or hardware.
06_0417_11_2022_1.16
© UCLES 2022 [Turn over
2
[2]
2 Complete each sentence using the most appropriate item from the list. Your answers must be
different in each case.
........................................................................................................................................... [1]
........................................................................................................................................... [1]
........................................................................................................................................... [1]
........................................................................................................................................... [1]
1 ...............................................................................................................................................
2 ...............................................................................................................................................
[2]
4 Many laptop computers use the cloud to store data. A technician has produced a report on his
laptop computer but has stored the report on a memory stick rather than storing it on the cloud.
Describe two advantages of using a memory stick rather than the cloud to store data.
1 ...............................................................................................................................................
..................................................................................................................................................
2 ...............................................................................................................................................
..................................................................................................................................................
[2]
Describe the advantages and disadvantages of using these cards rather than cards that use chip
and PIN.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
.................................................................................................................................................. [4]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [2]
(b) Explain the differences between attached stylesheets and inline style attributes.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [4]
(a) Compare and contrast relational databases and flat file databases. Your answer must include
similarities and differences.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [8]
(b) Give, using an example, one reason why flat file databases are used in certain applications
rather than relational databases.
Reason .............................................................................................................................
...........................................................................................................................................
Example ............................................................................................................................
...........................................................................................................................................
[2]
8 When using computers people can suffer from Repetitive Strain Injury (RSI).
(a) Describe the term RSI. Include in your answer the causes of RSI.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [3]
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
3 ........................................................................................................................................
...........................................................................................................................................
[3]
9 Martin, who is a teacher, is creating a multimedia presentation to explain a topic to his students.
1 ........................................................................................................................................
2 ........................................................................................................................................
3 ........................................................................................................................................
4 ........................................................................................................................................
[4]
(b) Martin wants to record a message for his students. His voice will be added to the presentation.
He will also need to listen to his voice to make sure the sound is of good quality.
1 ........................................................................................................................................
2 ........................................................................................................................................
[2]
(c) Martin will need to use software to create different types of content before including them in
the presentation.
Name two types of software that he might use and for each one, write down what he would
use it for.
Software 1 ........................................................................................................................
...........................................................................................................................................
Use ...................................................................................................................................
...........................................................................................................................................
Software 2 ........................................................................................................................
...........................................................................................................................................
Use ...................................................................................................................................
...........................................................................................................................................
[4]
10 A river authority is concerned about levels of pollution in a major river. The quality of the water in
the river needs to be monitored using sensors.
(a) Name three sensors that could be used to measure the pollution in the river.
1 ........................................................................................................................................
2 ........................................................................................................................................
3 ........................................................................................................................................
[3]
(b) Discuss the advantages and disadvantages of using computers to measure the pollution in
the river rather than humans measuring the pollution.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [6]
Discuss the advantages and disadvantages of analysing a system by interviewing staff rather than
using questionnaires.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
.................................................................................................................................................. [6]
12 Many company computer network systems use WiFi as a communication system to help prevent
the issue of tripping over trailing cables.
(a) For each of the following physical safety issues describe two ways of helping to prevent them.
(i) Fire
Prevention 1 ..........................................................................................................
................................................................................................................................
Prevention 2 ..........................................................................................................
................................................................................................................................
[2]
(ii) Electrocution
Prevention 1 ..........................................................................................................
................................................................................................................................
Prevention 2 ..........................................................................................................
................................................................................................................................
[2]
(b) Describe three eSafety measures which should be taken when playing games on the internet.
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
3 ........................................................................................................................................
...........................................................................................................................................
[3]
(c) In order to log onto online gaming a user ID and password is needed.
Explain what is meant by a user ID and password and why they are needed.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [4]
13 (a) Explain the need for copyright legislation when data is published on the internet.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [4]
(b) Describe methods that software producers use to prevent software copyright being broken.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [4]
(c) Emails are used by people to communicate with each other. Copyright and using acceptable
language in the email are two of the constraints that affect the use of email.
(i) Describe four other constraints that may affect the use of email.
1 ............................................................................................................................
................................................................................................................................
2 ............................................................................................................................
................................................................................................................................
3 ............................................................................................................................
................................................................................................................................
4 ............................................................................................................................
................................................................................................................................
[4]
1 ............................................................................................................................
................................................................................................................................
2 ............................................................................................................................
................................................................................................................................
[2]
14 The manager of a medical centre keeps the doctor’s stock records in a database. The stock for
any item is not allowed to fall below 15 items and the manager keeps a maximum of 100 items in
stock.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [2]
(b) Write down the field name from the table that would be the most appropriate for each of these
validation checks. Each answer must be different.
Length ...............................................................................................................................
Type ..................................................................................................................................
[3]
(c) Name the most appropriate field from the table that could be used as a primary key in the
database.
........................................................................................................................................... [1]
15 A customer is booking a seat on a theatre’s online booking system. The customer reserves seats
using the theatre’s website and a debit card. The website displays the seats that are available and
a database stores the customer details, the payment details and the seat details.
When the customer enters their debit card details for a seat, the theatre’s computer communicates
with the bank’s computer.
(a) Describe four checks that the bank’s computer will make on the customer’s bank account.
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
3 ........................................................................................................................................
...........................................................................................................................................
4 ........................................................................................................................................
...........................................................................................................................................
[4]
(b) Describe the processing carried out by the theatre’s computer when making a booking.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [4]
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable
effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will
be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge Assessment
International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at
www.cambridgeinternational.org after the live examination series.
Cambridge Assessment International Education is part of Cambridge Assessment. Cambridge Assessment is the brand name of the University of Cambridge Local
Examinations Syndicate (UCLES), which is a department of the University of Cambridge.
INSTRUCTIONS
• Answer all questions.
• Use a black or dark blue pen.
• Write your name, centre number and candidate number in the boxes at the top of the page.
• Write your answer to each question in the space provided.
• Do not use an erasable pen or correction fluid.
• Do not write on any bar codes.
• You may use an HB pencil for any diagrams, graphs or rough working.
INFORMATION
• The total mark for this paper is 100.
• The number of marks for each question or part question is shown in brackets [ ].
• No marks will be awarded for using brand names of software packages or hardware.
06_0417_12_2022_1.15
© UCLES 2022 [Turn over
2
[2]
1 ...............................................................................................................................................
2 ...............................................................................................................................................
[2]
(a) The network device that is used to transmit the data along an analogue telephone line is a
........................................................................................................................................... [1]
........................................................................................................................................... [1]
(c) The network device that allows data to be directed to a specific computer on a LAN is a
........................................................................................................................................... [1]
(d) The internal network device that allows a computer to connect to a LAN is a
........................................................................................................................................... [1]
The paragraph below shows some of the formatting features that can be used.
(a) Write down four of the formatting features that have been used in the paragraph shown.
1 ........................................................................................................................................
2 ........................................................................................................................................
3 ........................................................................................................................................
4 ........................................................................................................................................
[4]
(b) The logo for the Summer Steam Festival is shown and labelled A. The organisers of the event
are planning to create a second logo for all their correspondence. This is shown and labelled B.
Summer
Steam Festival Summer
2022 Steam Festival
2022
A B
Describe the steps that have been used to transform logo A into logo B.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [4]
5 A library is considering the way it issues books. The librarians are planning to use RFID rather than
bar codes.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
.................................................................................................................................................. [4]
6 Laptop computers use Solid State Drives (SSD) rather than Hard Disc Drives (HDD).
Describe two disadvantages of using an SSD rather than an HDD in a laptop computer.
1 ...............................................................................................................................................
..................................................................................................................................................
2 ...............................................................................................................................................
..................................................................................................................................................
[2]
7 A patient has an injury and the doctor treating him needs to find out information about the patient.
Most of the data he needs to collect is personal data.
The data collected is protected by data protection legislation. Most data protection acts include the
principle that data should be kept confidential and secure.
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
3 ........................................................................................................................................
...........................................................................................................................................
4 ........................................................................................................................................
...........................................................................................................................................
[4]
(b) Explain what is meant by personal data. Include two examples of personal data in your answer.
Explanation .......................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
Example 1 .........................................................................................................................
...........................................................................................................................................
Example 2 .........................................................................................................................
...........................................................................................................................................
[3]
(c) Explain why personal data should be kept confidential and secure.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [4]
8 Uniform Resource Locators (URL) are used to locate websites and resources. A teacher needs to
find a teaching guide from Cambridge Assessment International Education. To download the
teaching guide she types in:
(a) Write down only the part of the URL which shows the file name of the teaching guide.
........................................................................................................................................... [1]
(b) Write down only the part of the URL which is the folder where the teaching guide is stored.
........................................................................................................................................... [1]
(c) Write down only the part of the URL which is the domain name.
........................................................................................................................................... [1]
...........................................................................................................................................
........................................................................................................................................... [1]
=VLOOKUP(F2,A2:B9,2,0)
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [4]
(b) Before the spreadsheet can be used, data needs to be entered to test the spreadsheet.
There are three types of test data: normal, abnormal and extreme.
Normal ..............................................................................................................................
...........................................................................................................................................
Abnormal ..........................................................................................................................
...........................................................................................................................................
Extreme ............................................................................................................................
...........................................................................................................................................
[3]
(c) Explain, using examples, the differences between a function and a formula.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [6]
(d) The completed file could have been created using a database.
Describe two reasons why databases are used in certain applications rather than spreadsheets.
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
[2]
10 The prolonged use of computers can cause several health problems particularly when sitting down
and using monitors.
Discuss the strategies that you have developed to minimise health risks which only relate to sitting
down and using a monitor.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
.................................................................................................................................................. [8]
Discuss the advantages and disadvantages to the company of using computer-controlled robots
rather than using humans to manufacture the cars.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
.................................................................................................................................................. [6]
Discuss the benefits and drawbacks of analysing a system by observing staff rather than looking
at the current systems documentation.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
.................................................................................................................................................. [6]
13 A librarian in a college department library is entering data into a student borrowers’ file. As the data
is entered it needs to be verified.
1 ........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[4]
(b) Explain, using examples, why it is necessary to carry out validation as well as verification for
this system.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [4]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [2]
(b) Describe the ways that a user can recognise spam and methods to help prevent it.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [6]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [6]
(b) Describe two issues related to the security of data in the cloud.
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
[2]
16 A company uses corporate house style within the headers and footers in its documents.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [2]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [2]
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable
effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will
be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge Assessment
International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at
www.cambridgeinternational.org after the live examination series.
Cambridge Assessment International Education is part of Cambridge Assessment. Cambridge Assessment is the brand name of the University of Cambridge Local
Examinations Syndicate (UCLES), which is a department of the University of Cambridge.
INSTRUCTIONS
• Answer all questions.
• Use a black or dark blue pen.
• Write your name, centre number and candidate number in the boxes at the top of the page.
• Write your answer to each question in the space provided.
• Do not use an erasable pen or correction fluid.
• Do not write on any bar codes.
• You may use an HB pencil for any diagrams, graphs or rough working.
INFORMATION
• The total mark for this paper is 100.
• The number of marks for each question or part question is shown in brackets [ ].
• No marks will be awarded for using brand names of software packages or hardware.
06_0417_13_2022_1.12
© UCLES 2022 [Turn over
2
Memory
Mouse Printer Spreadsheet
stick
[2]
2 Name an appropriate validation routine for each statement. Each answer must be different.
(a) The last digit in a code used to ensure the other digits have been entered correctly.
........................................................................................................................................... [1]
........................................................................................................................................... [1]
(c) This validation routine ensures data has been entered into a field.
........................................................................................................................................... [1]
........................................................................................................................................... [1]
3 Identify two input devices which are used in computer control systems.
1 ...............................................................................................................................................
2 ...............................................................................................................................................
[2]
4 Computers can store data in the cloud rather than using storage devices in the computer.
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
3 ........................................................................................................................................
...........................................................................................................................................
[3]
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
3 ........................................................................................................................................
...........................................................................................................................................
[3]
5 The manager of a cinema has purchased a new booking system. There are 26 rows in the cinema
with 20 seats on a row. Each seat is identified by a unique ID. The seat ID consists of the row letter
followed by the position of the seat on the row. An example of the seat on row F position 12 would
be F12.
(a) Write down one example of each of the following types of test data. The answers must be
different in each case.
Normal ..............................................................................................................................
Abnormal ..........................................................................................................................
[2]
(b) When a ticket is produced for the new system it contains a QR code.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [5]
(c) Discuss the advantages and disadvantages of using manual booking systems rather than
online booking systems.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [8]
6 Eye strain is one of the health issues associated with using computers.
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
3 ........................................................................................................................................
...........................................................................................................................................
[3]
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
3 ........................................................................................................................................
...........................................................................................................................................
4 ........................................................................................................................................
...........................................................................................................................................
[4]
7 Tawara Stores has realised that the number of people shopping for food online has increased over
the past few years.
(a) Discuss the advantages and disadvantages to the customer of shopping for food online.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [8]
(b) Tawara Stores are also aware that many current websites do not cater for older people. They
intend to create a version of their website for this audience.
Describe the features of this website to meet the needs of an older audience, giving reasons
for your choice of features.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [4]
8 Tawara Hotel uses magnetic stripe cards to allow guests access to their bedrooms. The hotel is
changing the electronic lock it uses on its bedroom doors so the lock can work with RFID cards.
Compare the use of magnetic stripe cards and RFID cards for key entry. Your answer must include
similarities and differences.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
.................................................................................................................................................. [6]
9 The Internet of Things (IoT) allows devices as well as computers to connect to the internet using
a router. Each device uses an IP address.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [3]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [3]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [4]
10 Both the internet and the intranet are used for communication.
(i) Internet
................................................................................................................................
................................................................................................................................
................................................................................................................................
................................................................................................................................ [2]
(ii) Intranet
................................................................................................................................
................................................................................................................................
................................................................................................................................
................................................................................................................................ [2]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [6]
11 An image has been taken of a bird watcher and a bird. The original image has been saved as a
jpg file type. You have been asked to remove parts of the image to just show the bird and to save
it as a png file type to become the new image.
Original image
New image
(a) Explain the steps needed to change the original image to the new image.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [4]
(b) Explain the differences between a jpg and a png file type.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [4]
12 The protection of personal data is important as many transactions are carried out online.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [4]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [4]
13 In a college library if a book is not available students can reserve the book. When the book becomes
available the librarian needs to inform the student. He does this by typing a letter and printing it.
He has a database of students and has decided that in future he will use mail merge to produce
the letters.
Give four advantages of using mail merge instead of typing out the letter each time.
1 ...............................................................................................................................................
..................................................................................................................................................
2 ...............................................................................................................................................
..................................................................................................................................................
3 ...............................................................................................................................................
..................................................................................................................................................
4 ...............................................................................................................................................
..................................................................................................................................................
[4]
14 People can manage their banking transactions using the internet. However, if the internet signal is
poor telephone banking can be used.
A person wishes to use telephone banking without speaking to an operator to transfer money from
one bank account to another.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
.................................................................................................................................................. [6]
BLANK PAGE
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable
effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will
be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge Assessment
International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at
www.cambridgeinternational.org after the live examination series.
Cambridge Assessment International Education is part of Cambridge Assessment. Cambridge Assessment is the brand name of the University of Cambridge Local
Examinations Syndicate (UCLES), which is a department of the University of Cambridge.