ICT Paper 1

Download as pdf or txt
Download as pdf or txt
You are on page 1of 304

Cambridge IGCSE

INFORMATION AND COMMUNICATION TECHNOLOGY 0417/12


*4606582192*

Paper 1 Theory February/March 2020


2 hours

You must answer on the question paper.


No additional materials are needed.

INSTRUCTIONS
• Answer all questions.
• Use a black or dark blue pen.
• Write your name, centre number and candidate number in the boxes at the top of the page.
• Write your answer to each question in the space provided.
• Do not use an erasable pen or correction fluid.
• Do not write on any bar codes.
• You may use an HB pencil for any diagrams, graphs or rough working.

INFORMATION
• The total mark for this paper is 100.
• The number of marks for each question or part question is shown in brackets [ ].
• No marks will be awarded for using brand names of software packages or hardware.

This document has 16 pages. Blank pages are indicated.

03_0417_12_2020_1.21
© UCLES 2020 [Turn over
2

1 A list of hardware items is given.

3D printer Actuator LCD monitor Memory stick Mouse


RAM Touch screen Video card Webcam Wide format printer

(a) Identify two input devices from the given list.

1.........................................................................................................................................

2.........................................................................................................................................

[2]

(b) Identify two internal hardware devices from the given list.

1.........................................................................................................................................

2.........................................................................................................................................

[2]

2 Tick (✓) whether the following statements refer to the internet or an intranet.
internet intranet
(✓) (✓)

This type of network is public

This is the more secure type of network

This type of network is global

This type of network is more likely to be monitored

[2]

3 Chess players can use expert systems to help them practise chess moves.

Name two other applications which involve the use of expert systems.

1 ................................................................................................................................................

..................................................................................................................................................

2 ................................................................................................................................................

..................................................................................................................................................

[2]

© UCLES 2020 03_0417_12_2020_1.21


3

4 Smart technology is increasingly being used in everyday life. Many people are now using smart
devices such as smartwatches.

(a) Tick (✓) whether the following statements most appropriately refer to a desktop computer,
a tablet computer or a smartwatch.

desktop tablet
computer computer smartwatch
(✓) (✓) (✓)

A computer made up of separate units

Is an example of wearable technology

A portable device that allows text to be


typed relatively easily

Most easily used for fitness and health


monitoring by runners

[4]

(b) Smartphones are more likely to be used than laptop computers for everyday ICT use.

Describe three advantages of using a smartphone rather than a laptop computer.

1.........................................................................................................................................

...........................................................................................................................................

2.........................................................................................................................................

...........................................................................................................................................

3.........................................................................................................................................

...........................................................................................................................................

[3]

© UCLES 2020 03_0417_12_2020_1.21 [Turn over


4

5 A school examinations officer has set up a spreadsheet of candidates for the IGCSE examinations.

Part of the spreadsheet is shown:

The formula in cell A3 is IF(A2<>'''',VLOOKUP(A2,E3:F6,2),'''')

(a) Explain what the formula in cell A3 does.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [5]

© UCLES 2020 03_0417_12_2020_1.21


5

(b) The examinations officer is planning to change the range E3 to F6 in the formula to a named
range.

(i) Explain why he should do this rather than using the cell references.

................................................................................................................................

................................................................................................................................

................................................................................................................................

................................................................................................................................

................................................................................................................................

................................................................................................................................ [3]

(ii) Give an example of an appropriate name he should give the range.

................................................................................................................................

................................................................................................................................ [1]

(c) A formula has been placed in cell F9. The formula is COUNTIF(A4:A15,''E'')

Explain what the formula in cell F9 does.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [2]

© UCLES 2020 03_0417_12_2020_1.21 [Turn over


6

6 A teacher has created a hierarchical file structure to save the registers and marks of each of her
classes on her laptop computer. Part of the structure is shown:

C:

Work

Class_A1

Examination_Marks

Registers

Class_Reports

(a) Write down the file path to locate a document which is stored in the folder Examination_Marks.

C: ......................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [3]

(b) The teacher could have saved the document as a .txt or an .rtf file format.

Describe what is meant by .txt and .rtf file formats.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [2]

© UCLES 2020 03_0417_12_2020_1.21


7

(c) Explain the differences between the two file formats.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [3]

(d) A master document has been created. The teacher will mail merge the personal details of
each student into the document.

Explain why mail merged documents are used.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [4]

© UCLES 2020 03_0417_12_2020_1.21 [Turn over


8

7 A company is considering developing a laptop computer that only uses biometric methods to
authorise user access to this laptop computer. The developers are considering using facial
recognition.

(a) Explain, giving other examples, why biometric methods are considered to be a more secure
way of authorising access to the laptop computer rather than typing in passwords.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [6]

(b) Describe the disadvantages of using facial recognition to authorise access to the laptop
computer.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [4]

© UCLES 2020 03_0417_12_2020_1.21


9

8 A headteacher plans to use a computer database to keep records of the members of staff that
teach in her school. She must choose between using a flat file database or a relational database.

(a) Explain the differences between a flat file database and a relational database.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [2]

(b) The school keeps details of the teachers in one file and the subjects they teach in another file.
A teacher teaches more than one subject.
Describe the steps the headteacher would need to take to create a relational database from
this data.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [4]

9 Documents use headers, footers and margins.


The statements refer to a header, a footer or a margin. Tick (✓) the most appropriate term for
each statement.
header footer margin
(✓) (✓) (✓)

Text entered that can appear at the top of each page


automatically

An area between the main content of a page and the edge


of the page

An additional space between facing pages

Text entered that can appear at the bottom of each page


automatically

[4]

© UCLES 2020 03_0417_12_2020_1.21 [Turn over


10

10 Arjun is taking a gap year between his studies and will be travelling through Kenya. He needs to
remain in contact with his parents and is considering using either a cell phone or VoIP.

(a) Describe the benefits of using each of these communication methods to stay in contact with
his parents.

Cell phone ........................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

VoIP ..................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

[4]

(b) From time to time Arjun’s parents transfer money from their bank account to his bank account
using online banking.

Identify one type of transaction they cannot do using online banking.

...........................................................................................................................................

........................................................................................................................................... [1]

(c) When Arjun logs onto his online banking he needs to enter his username and password. The
system may also ask him to provide an answer to a security question.

Tick (✓) whether the following are appropriate examples of a security question or not.

Appropriate Not appropriate


(✓) (✓)

How old are you?

What is your mother’s maiden name?

What is your PIN?

Which town were you born in?

[2]

© UCLES 2020 03_0417_12_2020_1.21


11

(d) Give three benefits of Arjun using online banking in this scenario.

1.........................................................................................................................................

...........................................................................................................................................

2.........................................................................................................................................

...........................................................................................................................................

3.........................................................................................................................................

...........................................................................................................................................

[3]

(e) Give two drawbacks of Arjun using online banking in this scenario.

1.........................................................................................................................................

...........................................................................................................................................

2.........................................................................................................................................

...........................................................................................................................................

[2]

© UCLES 2020 03_0417_12_2020_1.21 [Turn over


12

11 Robots are used in many car production lines.

Discuss how their use has affected the nature of employment in the car production industry.

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

.................................................................................................................................................. [6]

12 When people use the internet for shopping and banking it is essential that they use a website that
has a secure server.

(a) Describe the features of a web page that identify it as using a secure server.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [4]

© UCLES 2020 03_0417_12_2020_1.21


13

(b) As more and more people use smartphones as computer systems, security can be breached.
Smishing and pharming are ways in which data can be compromised on a smartphone.

Compare and contrast smishing and pharming.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [6]

© UCLES 2020 03_0417_12_2020_1.21 [Turn over


14

13 A sales representative is planning a presentation about a new product. He is considering whether


to use a multimedia presentation or to give a talk and hand out leaflets.

(a) Discuss the advantages and disadvantages of using a multimedia presentation rather than
printed leaflets.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [8]

© UCLES 2020 03_0417_12_2020_1.21


15

(b) The sales representative decides to create a multimedia presentation and wishes to place an
image of the new product on one of the slides.

Explain the steps he would need to take to do this.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [4]

(c) He searches his company website to find a suitable image for his multimedia presentation.
Part of the markup language from the web page to load the image is shown.

<img src =''New_product.jpg'' alt=''company logo''>

When the markup is run, the words ‘company logo’ are displayed and not the image.

Explain why this may be the case.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [2]

© UCLES 2020 03_0417_12_2020_1.21


16

BLANK PAGE

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable
effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will
be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge Assessment
International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at
www.cambridgeinternational.org after the live examination series.

Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of
Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge.

© UCLES 2020 03_0417_12_2020_1.21



Cambridge IGCSE

INFORMATION AND COMMUNICATION TECHNOLOGY 0417/11


*7638064276*

Paper 1 Theory May/June 2020


2 hours

You must answer on the question paper.

No additional materials are needed.

INSTRUCTIONS
• Answer all questions.
• Use a black or dark blue pen.
• Write your name, centre number and candidate number in the boxes at the top of the page.
• Write your answer to each question in the space provided.
• Do not use an erasable pen or correction fluid.
• Do not write on any bar codes.
• You may use an HB pencil for any diagrams, graphs or rough working.

INFORMATION
• The total mark for this paper is 100.
• The number of marks for each question or part question is shown in brackets [ ].
• No marks will be awarded for using brand names of software packages or hardware.

This document has 16 pages. Blank pages are indicated.

06_0417_11_2020_1.13
© UCLES 2020 [Turn over
2

1 A computer consists of both hardware and software.

(a) Define the term software.

.....................................................................................................................................

.....................................................................................................................................

.....................................................................................................................................

..................................................................................................................................... [2]

(b) There are two types of software.

Identify the types.

1...................................................................................................................................

.....................................................................................................................................

2...................................................................................................................................

.....................................................................................................................................

[2]

2 Tick (✓) whether the following statements refer to a Command Line Interface (CLI) or a Graphical
User Interface (GUI).

CLI GUI
(✓) (✓)
The user has to type in every
instruction
The user does not need to
learn any of the instructions
Each instruction has to be
typed in correctly
The user is in direct
communication with the
computer

[2]

© UCLES 2020 06_0417_11_2020_1.13


3

3 Every computer contains input and output devices and a central processing unit (CPU).

(a) Describe the CPU including its role.

.....................................................................................................................................

.....................................................................................................................................

.....................................................................................................................................

.....................................................................................................................................

.....................................................................................................................................

.....................................................................................................................................

.....................................................................................................................................

..................................................................................................................................... [4]

(b) Data can be read directly by using a number of different devices.

Name the most appropriate device used to read the following data.

Cheque No. Branch Code Account No. Transaction Code

..................................................... .....................................................

0 26815 38221 6

..................................................... .....................................................

[4]

© UCLES 2020 06_0417_11_2020_1.13 [Turn over


4

4 A hospital is creating a database to store blood donors’ medical details. The fields in the
database include Health_number, Date_of_birth, Gender and Blood_group.

(a) When a new blood donor wishes to give blood they need to fill in a form.

Each blood donor has a unique health number which uses a 10-digit number, for example
9434765919.

Blood group can be A, B, AB or O.

Part of the form is shown below.

Blood donor

1. What is your health number?

2. What is your date of birth? / /

3. What is your gender? M/F

4. What is your blood group?

Name a suitable data type for the answers given to each of the questions in the form. For
any numeric field, specify the type of number.

Question 1...................................................................................................................

Question 2...................................................................................................................

Question 3...................................................................................................................

Question 4...................................................................................................................

[4]

© UCLES 2020 06_0417_11_2020_1.13


5

(b) In the Blood_group field the only data that can be entered is A, B, AB or O.

Tick (✓) whether each of the following blood groups is an example of abnormal or normal
data.

abnormal normal
Blood group
(✓) (✓)

AB

AO

[2]

(c) The administrator needs a list of all the blood donors in the database with blood group A
as well as in the same list all the blood donors with blood group AB. This list will only
include female blood donors.

To find the blood donor with the health number 9434765919 he will need to type in the
following query.

Health_number = 9434765919

Write a query to find all the female blood group donors with the blood group A as well as
those with AB.

.....................................................................................................................................

..................................................................................................................................... [6]

© UCLES 2020 06_0417_11_2020_1.13 [Turn over


6

(d) When the details of a new donor are added to the database the person’s date of birth is
entered.

Explain why the administrator would prefer their date of birth to be stored rather than their
age.

.....................................................................................................................................

.....................................................................................................................................

.....................................................................................................................................

.....................................................................................................................................

.....................................................................................................................................

.....................................................................................................................................

.....................................................................................................................................

..................................................................................................................................... [4]

(e) Name the most appropriate validation check for the Health_number.

.....................................................................................................................................

..................................................................................................................................... [1]

© UCLES 2020 06_0417_11_2020_1.13


7

5 Phishing and pharming can affect the security of a user’s data.

(a) Compare and contrast phishing and pharming.

.....................................................................................................................................

.....................................................................................................................................

.....................................................................................................................................

.....................................................................................................................................

.....................................................................................................................................

.....................................................................................................................................

.....................................................................................................................................

.....................................................................................................................................

.....................................................................................................................................

.....................................................................................................................................

.....................................................................................................................................

..................................................................................................................................... [6]

© UCLES 2020 06_0417_11_2020_1.13 [Turn over


8

(b) Smishing is another security issue. Describe the methods which can be used to help
prevent smishing.

.....................................................................................................................................

.....................................................................................................................................

.....................................................................................................................................

.....................................................................................................................................

.....................................................................................................................................

.....................................................................................................................................

.....................................................................................................................................

.....................................................................................................................................

.....................................................................................................................................

.....................................................................................................................................

.....................................................................................................................................

..................................................................................................................................... [6]

6 Tick (✓) which of the following statements apply to LANs, which apply to WANs and which
apply to WLANs.

LAN WAN WLAN


(✓) (✓) (✓)

The internet is an example of this type of network

This type of network is found in a building but is


connected without cables
This type of network is used to transmit data
between Europe and North America
This type of network is found in a building but is
connected with cables

[4]

© UCLES 2020 06_0417_11_2020_1.13


9

7 The headteacher of a school has decided to replace desktop computers with laptop computers.

Describe the advantages and disadvantages of using a laptop computer rather than a desktop
computer.

............................................................................................................................................

............................................................................................................................................

............................................................................................................................................

............................................................................................................................................

............................................................................................................................................

............................................................................................................................................

............................................................................................................................................

............................................................................................................................................ [4]

8 Following recent data protection issues the personal data we allow organisations to share about
us may be reduced.

(a) Discuss the benefits and drawbacks of trying to keep personal data confidential and secure.

.....................................................................................................................................

.....................................................................................................................................

.....................................................................................................................................

.....................................................................................................................................

.....................................................................................................................................

.....................................................................................................................................

.....................................................................................................................................

.....................................................................................................................................

.....................................................................................................................................

.....................................................................................................................................

.....................................................................................................................................

..................................................................................................................................... [6]

© UCLES 2020 06_0417_11_2020_1.13 [Turn over


10

(b) The sharing of email addresses can lead to spam.

Explain what is meant by the term spam email.

.....................................................................................................................................

.....................................................................................................................................

.....................................................................................................................................

..................................................................................................................................... [2]

(c) Explain why spam email should be prevented.

.....................................................................................................................................

.....................................................................................................................................

.....................................................................................................................................

.....................................................................................................................................

.....................................................................................................................................

.....................................................................................................................................

.....................................................................................................................................

..................................................................................................................................... [4]

© UCLES 2020 06_0417_11_2020_1.13


11

9 Point of sale (POS) terminals are used in supermarkets.

(a) Tick (✓) which of the following devices used at a POS terminal are only input devices,
which are only output devices and which are both.

Input Output Both


Device
(✓) (✓) (✓)

Bar code reader

Buzzer

Touch screen on till

Receipt printer

Light sensor on the conveyor belt

Electronic scales

[6]

© UCLES 2020 06_0417_11_2020_1.13 [Turn over


12

(b) A stock file contains data about the goods being sold. Describe the steps needed to update
the stock file when an item is scanned at the point of sale (POS) terminal. Include in your
description how new stock can be ordered automatically.

.....................................................................................................................................

.....................................................................................................................................

.....................................................................................................................................

.....................................................................................................................................

.....................................................................................................................................

.....................................................................................................................................

.....................................................................................................................................

.....................................................................................................................................

.....................................................................................................................................

.....................................................................................................................................

.....................................................................................................................................

..................................................................................................................................... [6]

© UCLES 2020 06_0417_11_2020_1.13


13

10 The network manager at a school has been asked to develop a student registration system to
help staff keep a record of student attendance.

(a) Describe the steps required in the analysis of such a system.

.....................................................................................................................................

.....................................................................................................................................

.....................................................................................................................................

.....................................................................................................................................

.....................................................................................................................................

.....................................................................................................................................

.....................................................................................................................................

.....................................................................................................................................

.....................................................................................................................................

.....................................................................................................................................

.....................................................................................................................................

..................................................................................................................................... [6]

(b) The school is planning to use fingerprints as a way to record when students arrive in the
class.

Describe the advantages and disadvantages of using fingerprint data entry for student
registration systems rather than magnetic ID cards.

.....................................................................................................................................

.....................................................................................................................................

.....................................................................................................................................

.....................................................................................................................................

.....................................................................................................................................

.....................................................................................................................................

.....................................................................................................................................

..................................................................................................................................... [4]

© UCLES 2020 06_0417_11_2020_1.13 [Turn over


14

(c) Fingerprints are one example of biometrics.

Identify three other examples of biometrics.

1...................................................................................................................................

.....................................................................................................................................

2...................................................................................................................................

.....................................................................................................................................

3...................................................................................................................................

.....................................................................................................................................

[3]

11 Most data protection acts include the principle that data should be accurate and, where
necessary, kept up to date.

List four other principles of a typical data protection act.

1..........................................................................................................................................

............................................................................................................................................

2..........................................................................................................................................

............................................................................................................................................

3..........................................................................................................................................

............................................................................................................................................

4..........................................................................................................................................

............................................................................................................................................

[4]

© UCLES 2020 06_0417_11_2020_1.13


15

12 The way we buy products using credit cards has changed in recent years. Originally the magnetic
stripe on the back of the card was used with a signature. Then chip and PIN methods were
used, and more recently contactless methods have been introduced.

Discuss the effectiveness of using these different methods to improve security when paying
for goods.

............................................................................................................................................

............................................................................................................................................

............................................................................................................................................

............................................................................................................................................

............................................................................................................................................

............................................................................................................................................

............................................................................................................................................

............................................................................................................................................

............................................................................................................................................

............................................................................................................................................

............................................................................................................................................

............................................................................................................................................

............................................................................................................................................

............................................................................................................................................

............................................................................................................................................

............................................................................................................................................ [8]

© UCLES 2020 06_0417_11_2020_1.13


16

BLANK PAGE

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable
effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will
be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge Assessment
International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at
www.cambridgeinternational.org after the live examination series.

Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of
Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge.

© UCLES 2020 06_0417_11_2020_1.13



Cambridge IGCSE

INFORMATION AND COMMUNICATION TECHNOLOGY 0417/12


*1018410769*

Paper 1 Theory May/June 2020


2 hours

You must answer on the question paper.

No additional materials are needed.

INSTRUCTIONS
• Answer all questions.
• Use a black or dark blue pen.
• Write your name, centre number and candidate number in the boxes at the top of the page.
• Write your answer to each question in the space provided.
• Do not use an erasable pen or correction fluid.
• Do not write on any bar codes.
• You may use an HB pencil for any diagrams, graphs or rough working.

INFORMATION
• The total mark for this paper is 100.
• The number of marks for each question or part question is shown in brackets [ ].
• No marks will be awarded for using brand names of software packages or hardware.

This document has 16 pages. Blank pages are indicated.

06_0417_12_2020_1.15
© UCLES 2020 [Turn over
2

1 The 2020 Olympic Games committee is producing a database to show the medal winners in the
cycling events.

It is important that the correct data type is used in each of the fields.

(a) Tick (✓) the most appropriate data type for each of the following fields.

Text
Boolean Numeric
(alphanumeric)
(✓) (✓)
(✓)

Athlete_name

Gold_medal (Y/N)

Age

Name_of_country

[4]

© UCLES 2020 06_0417_12_2020_1.15


3

(b) A report has been produced that shows the male gold medal winners from the past three
Olympic Games.

Write down six of the formatting features that have been used in the report.

1.........................................................................................................................................

...........................................................................................................................................

2.........................................................................................................................................

...........................................................................................................................................

3.........................................................................................................................................

...........................................................................................................................................

4.........................................................................................................................................

...........................................................................................................................................

5.........................................................................................................................................

...........................................................................................................................................

6.........................................................................................................................................

...........................................................................................................................................

[6]

© UCLES 2020 06_0417_12_2020_1.15 [Turn over


4

(a) Write down the type of interface shown.

........................................................................................................................................... [1]

(b) Write down two disadvantages of using this type of interface.

1.........................................................................................................................................

...........................................................................................................................................

2.........................................................................................................................................

...........................................................................................................................................

[2]

© UCLES 2020 06_0417_12_2020_1.15


5

3 Complete the following sentences using the most appropriate network term.

A communication method that wirelessly connects a mobile phone to a car, to allow hands-free

use of the mobile phone is ........................................... .

A network device that allows a stand-alone computer, using a dial-up analogue connection, to

connect to an ISP is a .......................................... .

A network device that allows a LAN to connect to the internet is a ........................................ .

A wireless communication method used in WLAN is ......................................... .

[4]

4 A teacher is creating a spreadsheet that will record the grades students achieved in recent tests
and compare the average grades of these tests with the students’ forecast grades. The grading
the teacher is using awards 1 for the highest grade down to 10 for the lowest. The teacher has
created a validation rule on the grade entered.

(a) Give examples of data used to test the validation rule. Your answers for abnormal test data
must be for a different reason in each case.

Type of test data Example of test data

Normal

Abnormal

Abnormal

Extreme

[4]

© UCLES 2020 06_0417_12_2020_1.15 [Turn over


6

(b) Part of the spreadsheet is shown, column G subtracts the Forecast grade from the Average
grade.

(i) Describe the steps the teacher can take to edit the spreadsheet to prevent new data
being typed into the Forecast grade column.

................................................................................................................................

................................................................................................................................

................................................................................................................................

................................................................................................................................

................................................................................................................................

................................................................................................................................

................................................................................................................................

................................................................................................................................

................................................................................................................................

................................................................................................................................ [5]

(ii) The teacher has typed a formula in cell E3. The formula is ROUNDUP(AVERAGE(B3:D3),0)
Explain, in detail, what the formula does.

................................................................................................................................

................................................................................................................................

................................................................................................................................

................................................................................................................................

................................................................................................................................

................................................................................................................................

................................................................................................................................ [4]

© UCLES 2020 06_0417_12_2020_1.15


7

(c) The teacher has produced a graph showing the differences between the forecast grade and
the average grade for each student. The graph looks like this.

Describe the steps taken to create the graph. Include in your answer three improvements that
could be made to the graph.

Method...............................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

Improvement 1...................................................................................................................

...........................................................................................................................................

Improvement 2...................................................................................................................

...........................................................................................................................................

Improvement 3...................................................................................................................

...........................................................................................................................................

[6]

© UCLES 2020 06_0417_12_2020_1.15 [Turn over


8

5 When using the internet, FTP can be used.

Explain what is meant by the term FTP.

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

.................................................................................................................................................. [2]

6 Smishing and phishing can affect the security of a user’s data.

(a) Compare and contrast smishing and phishing.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [6]

© UCLES 2020 06_0417_12_2020_1.15


9

(b) Describe the methods which can be used to help prevent phishing.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [6]

7 Complete each sentence using the most appropriate output device from the following list.

3D printer Buzzer Dot matrix printer Heater


Laser printer LCD monitor Light Wide format printer

(a) The device that can produce prosthetic limbs is called a

........................................................................................................................................... [1]

(b) The device that can output soft copy is called a

........................................................................................................................................... [1]

(c) The device that can produce sound as its main output is called a

........................................................................................................................................... [1]

© UCLES 2020 06_0417_12_2020_1.15 [Turn over


10

8 Tablet computers tend to be used more than desktop computers.

Describe the advantages and disadvantages of using a tablet computer rather than a desktop
computer.

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

.................................................................................................................................................. [6]

9 People rely heavily on microprocessor-controlled devices in the home.

(a) Describe two drawbacks in terms of lifestyle changes this has produced for the users of such
devices.

1.........................................................................................................................................

...........................................................................................................................................

2.........................................................................................................................................

...........................................................................................................................................

[2]

© UCLES 2020 06_0417_12_2020_1.15


11

(b) Many of the microprocessor-controlled devices in our homes use WiFi connections.

Describe the benefits and drawbacks of using WiFi connections in this way.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [6]

10 Music scores can now be produced using computer systems and appropriate software.

Describe the features of this technology.

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

.................................................................................................................................................. [4]

© UCLES 2020 06_0417_12_2020_1.15 [Turn over


12

11 A headteacher is planning to produce a presentation to showcase the school’s achievements.

(a) Describe two methods the headteacher could use to gather information about the requirements
of the target audience.

1.........................................................................................................................................

...........................................................................................................................................

2.........................................................................................................................................

...........................................................................................................................................

[2]

(b) The presentation is to be shown on large monitors at the entrance to the school. The school
is planning to embed music into the presentation so that music could be played as the
presentation is shown.

Describe the steps the headteacher would need to take to play music in the background of
the slides.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [4]

© UCLES 2020 06_0417_12_2020_1.15


13

(c) After showing the presentation to the parents the headteacher wishes to use the presentation
to show to young children to encourage them to come to the school.

Describe the features that the headteacher must include to make the presentation meet the
needs of an audience of young children.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [4]

12 (a) Describe repetitive strain injury (RSI) and explain what causes it.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [2]

(b) Give three ways of minimising the risk of RSI.

1.........................................................................................................................................

...........................................................................................................................................

2.........................................................................................................................................

...........................................................................................................................................

3.........................................................................................................................................

...........................................................................................................................................

[3]

© UCLES 2020 06_0417_12_2020_1.15 [Turn over


14

13 Modern laptop computers tend to use external solid state storage rather than external optical
storage.

Compare and contrast the use of solid state storage with the use of optical storage to store data.

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

.................................................................................................................................................. [8]

© UCLES 2020 06_0417_12_2020_1.15


15

14 There are two types of storage within a computer, internal memory and backing storage.

Discuss the differences between internal memory and backing storage.

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

.................................................................................................................................................. [6]

© UCLES 2020 06_0417_12_2020_1.15


16

BLANK PAGE

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable
effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will
be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge Assessment
International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at
www.cambridgeinternational.org after the live examination series.

Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of
Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge.

© UCLES 2020 06_0417_12_2020_1.15



Cambridge IGCSE

INFORMATION AND COMMUNICATION TECHNOLOGY 0417/13


*3929455569*

Paper 1 Theory May/June 2020


2 hours

You must answer on the question paper.

No additional materials are needed.

INSTRUCTIONS
• Answer all questions.
• Use a black or dark blue pen.
• Write your name, centre number and candidate number in the boxes at the top of the page.
• Write your answer to each question in the space provided.
• Do not use an erasable pen or correction fluid.
• Do not write on any bar codes.
• You may use an HB pencil for any diagrams, graphs or rough working.

INFORMATION
• The total mark for this paper is 100.
• The number of marks for each question or part question is shown in brackets [ ].
• No marks will be awarded for using brand names of software packages or hardware.

This document has 20 pages. Blank pages are indicated.

06_0417_13_2020_1.13
© UCLES 2020 [Turn over
2

1 There are two types of software: applications and system.

Tick (✓) the most appropriate type of software for each of the following.

Applications System
(✓) (✓)

Device driver

Linker

Photo-editing software

Spreadsheet

[2]

2 (a) Write down the type of interface shown.

m
Files - Message
Working_file memo notes File Edit View Insert Format Tools Actions Help

Reply Reply to All Forward

From: dave@testpro.com Date: 26 March 2020 Time: 14:22


To: cheryl@testpro.com
photos template3 Subject: Files
Artwork - Notepad
File Edit Format View Help

Miscellaneous

Project1

........................................................................................................................................... [1]

© UCLES 2020 06_0417_13_2020_1.13


3

(b) Write down two advantages of using this type of interface.

1.........................................................................................................................................

...........................................................................................................................................

2.........................................................................................................................................

...........................................................................................................................................

[2]

3 A computer system is connected to a LAN and a WAN.

(a) Explain what a LAN is.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [2]

(b) Explain what a WAN is.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [2]

© UCLES 2020 06_0417_13_2020_1.13 [Turn over


4

4 Mason is the head of a year group at a school. Every term he needs to send to parents a report on
their child’s progress. This will include a written report and the percentage attendance over the
term.

Each term he loads the comments from his tutors into the word processing software. He then adds
the attendance data from the database. The report is then printed and sent to parents.

He has decided that in future he will use mail merge to print the reports.

(a) Give four advantages of using mail merge instead of typing the reports.

1.........................................................................................................................................

...........................................................................................................................................

2.........................................................................................................................................

...........................................................................................................................................

3.........................................................................................................................................

...........................................................................................................................................

4.........................................................................................................................................

...........................................................................................................................................

[4]

(b) As it is entered, the data on the database is checked using validation routines. The percentage
attendance field uses a range check.

Describe, using the percentage attendance field, the steps that need to be taken to create this
validation routine.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [4]

© UCLES 2020 06_0417_13_2020_1.13


5

(c) Before the database can be implemented the validation routines need to be tested.

Describe, using the percentage attendance field, how the validation routine will be tested by
Mason.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [4]

5 The use of laptop computers and tablet computers by people on the move is becoming very popular.

Describe four advantages of using a tablet computer rather than a laptop computer.

1 ................................................................................................................................................

..................................................................................................................................................

2 ................................................................................................................................................

..................................................................................................................................................

3 ................................................................................................................................................

..................................................................................................................................................

4 ................................................................................................................................................

..................................................................................................................................................

[4]

© UCLES 2020 06_0417_13_2020_1.13 [Turn over


6

6 The secretary of the Tawara Rowing Club is organising a presentation evening for its members. A
systems analyst is creating a database for the club to store the details of the members. She is also
creating a spreadsheet to show who is attending the presentation evening.

The systems analyst has set up the following fields for the database.

Membership Year
Name_of_person Date_of_birth Contact_email Contact_phone_no Gender
_type _joined

Nor Kwa 2/4/2005 Social n.kwa@rockict.com 03 2453 5673 2018 F

Adam Mazian 23/5/2003 Social AdamM@abc.co.my 082 25 4689 2016 M

Ahmed Othman 12/03/2006 Junior AOthman@cie.org 01223 432678 2018 M

Zara Png 1/12/1997 Senior Zara@cbc.cn 123 3267 9999 2010 F

(a) For the following fields write down the most appropriate data type. Each data type must be
different. For any numeric field, specify the type of number.

Gender...............................................................................................................................

Membership_type..............................................................................................................

Year_joined........................................................................................................................

[3]

© UCLES 2020 06_0417_13_2020_1.13


7

(b) Design an online data entry form which could be used to enter the details of one member,
using all the fields shown in the table.

In your design include appropriate spacing for each field and navigational aids. Do not include
data in the form.

[8]

© UCLES 2020 06_0417_13_2020_1.13 [Turn over


8

(c) A spreadsheet has been created to show which members are attending the presentation
evening and who has paid.

Part of the spreadsheet is shown.

A B C D E F G H I J K

1 Tawara Rowing Club

Family Full Type of Number Total


2 Name Attending Paid Cost $
name name member attending owed

3 Nor Kwa Nor Kwa Social Y 2 50 Y Junior 10

Ahmed
4 Ahmed Othman Junior Y 3 30 Y Senior 20
Othman

5 Zara Png Zara Png Senior Y 1 20 N Social 25

Adam
6 Adam Mazian Social N 0 0 N
Mazian

Write down three of the formatting features that have been used in the part of the spreadsheet
shown.

1.........................................................................................................................................

...........................................................................................................................................

2.........................................................................................................................................

...........................................................................................................................................

3.........................................................................................................................................

...........................................................................................................................................

[3]

© UCLES 2020 06_0417_13_2020_1.13


9

(d) A formula has been created and placed in cell G3. The formula is:

IF(E3=''Y'',VLOOKUP(D3,J$3:K$5,2)*F3,0)

Explain what the formula does.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [6]

(e) The secretary needs to identify different types of members in the club.

Describe the steps he would take to sort the data by type of member so that Junior members
are at the top of the list.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [3]

© UCLES 2020 06_0417_13_2020_1.13 [Turn over


10

7 A train company is improving security on its journeys. They are planning to introduce a facial
recognition system for passengers using their trains.

(a) Discuss the advantages and disadvantages of using facial recognition systems rather than
manually checking tickets.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [6]

© UCLES 2020 06_0417_13_2020_1.13


11

(b) Facial recognition is an example of biometrics. Direct data entry devices can be in three forms.
One is biometrics. The second is contactless where the item being read does not touch the
reader. The third is physical where the item being read does touch the reader.

Tick (✓) whether the following are the most appropriate examples of biometrics or contactless
or physical direct data entry.

biometrics contactless physical


(✓) (✓) (✓)

RFID

Magnetic stripe

Retina scan

Voice recognition

[4]

8 One implication of using a computer system is that people can break the law by hacking into other
computer systems. Cultural, Ethical and Moral implications can also be issues.

Tick (✓) the most appropriate implication for each of the following statements.

Cultural Ethical Moral


(✓) (✓) (✓)

A student has changed the contents of a company website


without permission

Writing computer games that make fun of a country’s


religion

Using pictures in a document without acknowledging


copyright

Passing information to a rival company

[4]

© UCLES 2020 06_0417_13_2020_1.13 [Turn over


12

9 Lanfen has purchased a new computer. The computer has no internal storage. All the data is stored
in the cloud.

Compare and contrast computers that use cloud-based storage and computers that have internal
backing storage.

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

.................................................................................................................................................. [6]

© UCLES 2020 06_0417_13_2020_1.13


13

10 The modern home relies heavily on microprocessor-controlled devices. One of the benefits is that
a worker is able to return home to a warm house having set the heater control to switch on at a
certain time.

(a) Describe four benefits in terms of lifestyle changes that this has produced for the users of
such devices.

1.........................................................................................................................................

...........................................................................................................................................

2.........................................................................................................................................

...........................................................................................................................................

3.........................................................................................................................................

...........................................................................................................................................

4.........................................................................................................................................

...........................................................................................................................................

[4]

© UCLES 2020 06_0417_13_2020_1.13 [Turn over


14

(b) The worker has set the heater control to switch on at 16:00 for two hours.

Explain how the microprocessor can operate the automatic heater to turn on and off at the
correct times.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [6]

© UCLES 2020 06_0417_13_2020_1.13


15

11 Parallel running is a type of implementation.

Name and describe two other methods of implementing a new computer system. For each one
give an advantage and a disadvantage of this method. Your answers must be different in each
case.

Method 1...................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

Advantage 1..............................................................................................................................

..................................................................................................................................................

Disadvantage 1.........................................................................................................................

..................................................................................................................................................

Method 2...................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

Advantage 2..............................................................................................................................

..................................................................................................................................................

Disadvantage 2.........................................................................................................................

..................................................................................................................................................

[8]

© UCLES 2020 06_0417_13_2020_1.13 [Turn over


16

12 A student is undertaking research for his studies. He needs to find up-to-date information and has
decided to look for it using the internet.

Explain how he would check the reliability of this information.

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

.................................................................................................................................................. [6]

© UCLES 2020 06_0417_13_2020_1.13


17

13 A school is planning to set up a student work files area. The school is considering allowing students
to log in to the student work files area either using the school’s intranet or the internet.

Discuss the advantages and disadvantages of using the school’s intranet rather than the internet
to access this student work files area.

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

.................................................................................................................................................. [8]

© UCLES 2020 06_0417_13_2020_1.13


18

BLANK PAGE

© UCLES 2020 06_0417_13_2020_1.13


19

BLANK PAGE

© UCLES 2020 06_0417_13_2020_1.13


20

BLANK PAGE

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable
effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will
be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge Assessment
International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at
www.cambridgeinternational.org after the live examination series.

Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of
Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge.

© UCLES 2020 06_0417_13_2020_1.13


Cambridge IGCSE™
* 4 4 2 5 3 5 1 3 5 9 *

INFORMATION AND COMMUNICATION TECHNOLOGY 0417/11


Paper 1 Theory October/November 2020

2 hours

You must answer on the question paper.

No additional materials are needed.

INSTRUCTIONS
● Answer all questions.
● Use a black or dark blue pen.
● Write your name, centre number and candidate number in the boxes at the top of the page.
● Write your answer to each question in the space provided.
● Do not use an erasable pen or correction fluid.
● Do not write on any bar codes.
● You may use an HB pencil for any diagrams, graphs or rough working.

INFORMATION
● The total mark for this paper is 100.
● The number of marks for each question or part question is shown in brackets [ ].
● No marks will be awarded for using brand names of software packages or hardware.

This document has 16 pages. Blank pages are indicated.

DC (DH/FC) 215559/5
© UCLES 2020 [Turn over
2

1 Complete the question using an appropriate item from the list given.

Blu-ray disc drive DVD RAM drive Hard disk drive Keyboard Laser printer

LCD monitor Magnetic tape drive Mouse Pen drive SSD

(a) Identify two output devices from the list.

1 ................................................................................................................................................

2 ................................................................................................................................................
[2]

(b) Identify two optical storage devices from the list.

1 ................................................................................................................................................

2 ................................................................................................................................................
[2]

2 The Central Processing Unit consists of three components.

Tick (3) whether the following statements refer to the ALU, the Control unit or the Main memory.

Control Main
ALU unit memory
(3) (3) (3)
This is the immediate access storage
This carries out the calculations
This carries out logical decisions
This directs the input and output flow in the CPU
[4]

© UCLES 2020 0417/11/O/N/20


3

3 A variety of network devices can be used to connect computers together.

(a) Complete the following sentences using the most appropriate network device from the list.
Your answers must be different in each case.

an access point a bridge a hub

a modem a network interface card a switch

A device used to connect a Local Area Network (LAN) to another LAN that uses the same

protocol is called ..................................................................................................................... .

A device used to convert a computer’s digital signal to an analogue signal for communication

is called ................................................................................................................................... .

A device that connects a number of other devices and sends data to one specific device only

is ............................................................................................................................................. .

An item of hardware in a computer that allows a device to connect to a network is

................................................................................................................................................. .
[4]

A router is used to connect a LAN to the internet. A message is sent from the router to another
router.

(b) Give the name of the part of the router where the IP addresses are stored.

...................................................................................................................................................

............................................................................................................................................. [1]

(c) Explain how the data from a router is routed.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [5]
© UCLES 2020 0417/11/O/N/20 [Turn over
4

4 The HTML of a web page consists of a head section and a body section.

(a) The head section can contain the link to the stylesheet.

Identify two other items found in the head section of HTML.

1 ................................................................................................................................................

2 ................................................................................................................................................
[2]

(b) Explain the purpose of the body section of HTML.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

(c) A stylesheet can contain styles and classes.

Explain the difference between a style and a class.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

© UCLES 2020 0417/11/O/N/20


5

Question 5 starts on page 6.

© UCLES 2020 0417/11/O/N/20 [Turn over


6

5 The Fish Bowl is a large outdoor music arena. It uses an online booking system.

A customer has entered her data into the booking system using an online data entry form.

Name of show Uni Direction

Date of performance 18th March 2020

Time of performance 7:30 pm

Seat position Stalls Circle Upper Circle

Number of Adults: 2

Number of Children: 0

(a) Evaluate this online data entry form.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [6]

© UCLES 2020 0417/11/O/N/20


7

(b) When a person makes a booking, a ticket will be produced for each person. The ticket will be
sent by email and can then be printed out or used on a smartphone to gain entry to the event.

Design a ticket that includes elements for both visual and electronic checking for the
forthcoming music event.

[6]

6 Data stored in a computer needs to be protected.

(a) Describe what is meant by encryption.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [3]

© UCLES 2020 0417/11/O/N/20 [Turn over


8

Due to an issue with Question 6b, the question has been removed from the question paper.

© UCLES 2020 0417/11/O/N/20


9

7 A new database system has been set up for a bookshop. Part of a record from the database
system is shown. Each field has a validation check which needs to be tested.

(a) For each field identify the most appropriate validation check. Each check must be different.
The validation checks for two fields have already been identified; these types of validation
check must not be used for the other fields.

Field name Data Validation check


ISBN 9781471837951
Name_of_book A View of the Castle Presence check
Purchase_price 16.99 Range check
Year_published 2018
Date_acquired 31/01/2019
[3]

(b) The Purchase_price field uses a range check. The prices of books range from 1 to 100.

Identify three items of test data which could be used with the Purchase_price field, giving
reasons for your choice. The reasons must be different in each case.

Item 1 ........................................................................................................................................

Reason .....................................................................................................................................

...................................................................................................................................................

Item 2 ........................................................................................................................................

Reason .....................................................................................................................................

...................................................................................................................................................

Item 3 ........................................................................................................................................

Reason .....................................................................................................................................

...................................................................................................................................................
[6]

© UCLES 2020 0417/11/O/N/20 [Turn over


10

8 Autonomous vehicles are being tested on some of the world’s roads. These vehicles can travel in
convoys with each vehicle following the one in front with a set distance between them. The whole
operation is computer controlled. If the vehicle in front slows down, then the following vehicle also
slows down to maintain the distance between them.

A proximity sensor is used to detect how close the vehicle is to the vehicle in front.

Describe how the microprocessor would maintain the set distance between the vehicles.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

.................................................................................................................................................... [6]

© UCLES 2020 0417/11/O/N/20


11

9 There have been a number of incidents where laptop computers containing highly sensitive
data have been left on trains. Manufacturers are now developing new ways of protecting laptop
computers and their data.

Discuss the effectiveness of different methods which could be used to protect the data.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

.................................................................................................................................................... [8]

© UCLES 2020 0417/11/O/N/20 [Turn over


12

10 A student is creating a database for her geography project to show all the earthquakes that
occurred in 2019. She has produced part of the database which is shown.

Country Magnitude Depth(km)


Vanuatu 6.9 26
Vanuatu 6.7 24
Indonesia 6.1 29
Vanuatu 6.7 27.6
Nepal 4.1 10.2
Myanmar 6.9 136
Japan 6.2 9
Japan 6 8
Vanuatu 6.4 16
Japan 7 10
Ecuador 7.8 20.6
South Georgia 6.2 14
Ecuador 6.2 14
Ecuador 6 10
Mexico 6 16
Mexico 6 10
Vanuatu 7 24

When she has completed her database, she needs to carry out some searches on the data. To
search for all the earthquakes with a depth of more than 20 km she will need to type the following
search criteria.

Depth(km) >20

(a) Write the search criteria to find all the earthquakes of a magnitude greater than or equal to
6.5, with a depth less than 15 km.

...................................................................................................................................................

............................................................................................................................................. [5]

(b) Give the name of the country that satisfies the search criteria in part (a).

............................................................................................................................................. [1]

© UCLES 2020 0417/11/O/N/20


13

The student has transferred the data into a spreadsheet in order to create a graph.

A B C D E F G

1 World Earthquakes - 2019


2 Country Magnitude Depth(km)
3 Vanuatu 6.9 26 Vanuatu 5
4 Vanuatu 6.7 24 Indonesia 1
5 Indonesia 6.1 29 Nepal 1
6 Vanuatu 6.7 27.6 Myanmar 1
7 Nepal 4.1 10.2 Japan 3
8 Myanmar 6.9 136 Ecuador 3
9 Japan 6.2 9 South Georgia 1
10 Japan 6 8 Mexico 2
11 Vanuatu 6.4 16
12 Japan 7 10
13 Ecuador 7.8 20.6
14 South Georgia 6.2 14
15 Ecuador 6.2 14
16 Ecuador 6 10
17 Mexico 6 16
18 Mexico 6 10
19 Vanuatu 7 24

(c) (i) She has entered a formula in cell G3. The formula is

COUNTIF(A$3:A$19,F3)

Explain in detail what the formula in G3 does. Include in your answer an explanation of
the use of the $ sign.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [4]

© UCLES 2020 0417/11/O/N/20 [Turn over


14

(ii) The student is creating an appropriate chart/graph of the data in cells F3 to G10.

Write down the steps she needs to take to produce a chart/graph of the data on the
same sheet. Your answer must include examples of an appropriate title and labels.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [6]

11 Two types of documentation are written when a new computer system is created. Some items only
appear in the technical documentation and other items only in the user documentation whereas
some items appear in both.

Tick (3) whether the following items only appear in Technical documentation, only appear in
User documentation or appear in Both.

Item Technical User


documentation documentation Both
(3) (3) (3)
Purpose of the system
How to save a file
System flowchart
Software requirements
List of variables
Input format
[6]

© UCLES 2020 0417/11/O/N/20


15

12 A teacher is teaching students about history using a virtual reality (VR) system.

(a) Identify three devices that could be used with a VR system.

1 ................................................................................................................................................

2 ................................................................................................................................................

3 ................................................................................................................................................
[3]

(b) The teacher carefully monitors the students’ use of the VR system. She only allows them 20
minutes on the device before taking a break. This is to ensure that they remain healthy whilst
using it.

Identify three health problems associated with the prolonged use of VR systems.

Problem 1 .................................................................................................................................

...................................................................................................................................................

Problem 2 .................................................................................................................................

...................................................................................................................................................

Problem 3 .................................................................................................................................

...................................................................................................................................................
[3]

© UCLES 2020 0417/11/O/N/20 [Turn over


16

(c) The teacher asks the students to create a presentation for their parents to explain to them
about the history of their town.

Describe the features that the students must include to make the presentation appeal to the
adults.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [4]

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.

Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of
Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge.

© UCLES 2020 0417/11/O/N/20


Cambridge IGCSE™
* 4 7 1 5 4 6 9 3 7 1 *

INFORMATION AND COMMUNICATION TECHNOLOGY 0417/12


Paper 1 Theory October/November 2020

2 hours

You must answer on the question paper.

No additional materials are needed.

INSTRUCTIONS
● Answer all questions.
● Use a black or dark blue pen.
● Write your name, centre number and candidate number in the boxes at the top of the page.
● Write your answer to each question in the space provided.
● Do not use an erasable pen or correction fluid.
● Do not write on any bar codes.
● You may use an HB pencil for any diagrams, graphs or rough working.

INFORMATION
● The total mark for this paper is 100.
● The number of marks for each question or part question is shown in brackets [ ].
● No marks will be awarded for using brand names of software packages or hardware.

This document has 16 pages. Blank pages are indicated.

DC (DH/SG) 189826/3
© UCLES 2020 [Turn over
2

1 Complete the question using an appropriate item from the list given.

Bar code reader Blu-ray drive DVD drive Hard Disk Drive Keyboard

Memory stick Mouse Optical Character Reader SSD TFT monitor

(a) Identify two solid state storage devices from the list.

1 ................................................................................................................................................

2 ................................................................................................................................................
[2]

(b) Identify two direct data entry devices from the list.

1 ................................................................................................................................................

2 ................................................................................................................................................
[2]

2 A website can have three web development layers.

Tick (3) whether the following statements refer to the behaviour layer, content layer or
presentation layer.

behaviour content presentation


(3) (3) (3)
This layer is used to display and format
elements within the web page
This layer includes the hyperlinks to navigate
around the website
This layer is used to enter scripting language
to elements within a web page
This layer is used to create the structure of
a web page
[4]

© UCLES 2020 0417/12/O/N/20


3

3 A computer system consists of a number of different items of hardware.

Write down the most appropriate item of hardware that fits the following descriptions.

(a) A non-volatile device that stores the start-up commands.

............................................................................................................................................. [1]

(b) A printer that produces physical objects.

............................................................................................................................................. [1]

(c) A hardware device that reads analogue data from the environment.

............................................................................................................................................. [1]

4 The temperature in a glasshouse is controlled by a computer. A program is being designed to


open and close the glasshouse windows. If the temperature is too hot, then the windows will open;
otherwise the windows will close.

The systems analyst has produced a number of different instructions to show how the system
works. Part of the instructions are shown.

(a) Complete the instructions by writing the most appropriate technical terms to explain how the
windows are operated.

• Data is read by the sensor.

• ......................................................................................... data is output from the sensor.

• Data from the sensor is sent to the microprocessor via the ..............................................

...........................................................................................................................................

• If the temperature is greater than the ................................................................................

• The microprocessor sends a signal to the ........................................................................


[4]

(b) Circle the two most appropriate input devices associated with the computerised glasshouse.

Chip and PIN reader Hard Disk Drive Laser printer

LED monitor Moisture sensor Numeric keypad


[2]

© UCLES 2020 0417/12/O/N/20 [Turn over


4

(c) Another use of computer control is in the manufacture of cars.

Discuss the benefits and drawbacks of using computer-controlled systems rather than
humans to build a car.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [6]

© UCLES 2020 0417/12/O/N/20


5

5 (a) Compare and contrast an intranet with the internet.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [8]

(b) Protocols are associated with the internet and an intranet.

Identify three protocols and for each one, identify a use.

Protocol 1 .................................................................................................................................

Use ...........................................................................................................................................

...................................................................................................................................................

Protocol 2 .................................................................................................................................

Use ...........................................................................................................................................

...................................................................................................................................................

Protocol 3 .................................................................................................................................

Use ...........................................................................................................................................

...................................................................................................................................................
[6]
© UCLES 2020 0417/12/O/N/20 [Turn over
6

6 Khalid keeps a spreadsheet to record his expenses and to plan for future spending. This
spreadsheet is split into two separate sheets, which he has named Plan and Model.

Plan contains details of his future spending.


Model contains a model of his income and expenses.

Plan
A B C D
% of % of
1 Income Statement spending income
2 Income 63,784
3
4 Expenditure items
5 Taxes 12,757 22.22% 20%
6 Housing 19,135 33.33% 30%
7 Food 6,378 11.11% 10%
8 Transportation 9,568 16.67% 15%
9 Entertainment / Other 6,378 11.11% 10%
10 Healthcare 3,189 5.56% 5%
11
12 Investment return 4%
13 Income Growth 2.5%
14 Expense Ratio % 90%
15

Model
A B C D E F G
1 Model
2 2020 2021 2022 2023 2024 2025
3
4 Income 63,784 65,379 67,013 68,688 70,406 72,166
5 Investment Income 255 527 816 1,123 1,450
6 Total Income 63,784 65,634 67,540 69,504 71,529 73,616
7
8 Taxes 12,757 13,076 13,403 13,738 14,081 14,433
9 Housing 19,135 19,614 20,104 20,607 21,122 21,650
10 Food 6,378 6,538 6,701 6,869 7,041 7,217
11 Transportation 9,568 9,807 10,052 10,303 10,561 10,825
12 Entertainment / Other 6,378 6,538 6,701 6,869 7,041 7,217
13 Healthcare 3,189 3,269 3,351 3,434 3,520 3,608
14 Total Expenses 57,405 58,842 60,312 61,820 63,366 64,950
15
16 Net Income (Savings) 6,379 6,792 7,228 7,684 8,163 8,666
17
18
19 Balance Sheet
20 Savings 6,379 13,171 20,399 28,083 36,246 44,912
21 Can I afford a car? N N N N Y Y
22

© UCLES 2020 0417/12/O/N/20


7

(a) Khalid has entered a formula in cell C4 of the Model sheet. The formula is B4+(B4*Plan!$B13)

Explain, in detail, what the formula does. Include in your answer an explanation of why the $
and the ! are used in the formula.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [5]

(b) He is saving up to buy a new car; this will cost at least $35,000.

Khalid has entered a formula in cell B21 of the Model sheet. The formula is
IF(B20>35000,"Y","N")

Explain, in detail, what the formula does.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [3]

© UCLES 2020 0417/12/O/N/20 [Turn over


8

Plan
A B C D
% of % of
1 Income Statement spending income
2 Income 63,784
3
4 Expenditure items
5 Taxes 12,757 22.22% 20%
6 Housing 19,135 33.33% 30%
7 Food 6,378 11.11% 10%
8 Transportation 9,568 16.67% 15%
9 Entertainment / Other 6,378 11.11% 10%
10 Healthcare 3,189 5.56% 5%
11
12 Investment return 4%
13 Income Growth 2.5%
14 Expense Ratio % 90%
15

(c) Khalid is planning to create an appropriate graph/chart to be placed in a new sheet. The
graph/chart will display the % of income and the names of the expenditure items from the
Plan sheet.

Identify the most appropriate graph/chart he could use and describe the steps he needs to
take to produce this graph/chart in a new sheet.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [7]

© UCLES 2020 0417/12/O/N/20


9

Question 7 starts on page 10.

© UCLES 2020 0417/12/O/N/20 [Turn over


10

7 The owner of a soccer club has employed a systems analyst to create a new computerised system
to store details of club members.

The systems analyst starts by researching the existing system. One way he could do this is to
interview members of the soccer club.

(a) Discuss the benefits and drawbacks of individually interviewing the members.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [6]

(b) When the systems analyst created the new system, he had to choose data types for each
field.

Write down the most appropriate data type for each field. The answers in the table must be
different in each case. The data type for one field has already been identified; this data type
must not be used for the other fields.

For any numeric field specify the type of number.

Field name Data type Example data

Year_joined 2019

Gender F

Date_of_birth 04/11/2000

Membership_number Text 01254

Cost_of_membership $10.50

[4]

© UCLES 2020 0417/12/O/N/20


11

(c) The systems analyst has set the data type for the Membership_number field as text.

Explain why this field has been set for a text data type rather than a numeric data type.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

(d) The owner of the soccer club is planning to create membership cards for all its members
using mail merge. The membership card will include personal data from the new system.

Describe the steps required to perform the mail merge.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [6]

© UCLES 2020 0417/12/O/N/20 [Turn over


12

8 Many supermarkets now use the internet and allow customers to buy their products online.

(a) Explain, in detail, the effects that online shopping has had on supermarkets.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [4]

(b) When customers shop online, they can pay using a debit card.

Describe measures that customers could use to reduce fraud when using a debit card online.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [5]

© UCLES 2020 0417/12/O/N/20


13

(c) Smishing, pharming and phishing are three security threats that can occur when using the
internet for shopping.

Tick (3) whether the following statements refer to pharming, phishing or smishing.

pharming phishing smishing


(3) (3) (3)
Fake emails are sent to target users
When the user types in a URL they are directed to
a fake website
Malicious code is installed on the user’s computer
Fake text messages are sent to the user’s phone
[4]

9 When software is bought, the purchaser is subject to copyright legislation.

Give four actions that would breach copyright legislation.

1 .......................................................................................................................................................

..........................................................................................................................................................

2 .......................................................................................................................................................

..........................................................................................................................................................

3 .......................................................................................................................................................

..........................................................................................................................................................

4 .......................................................................................................................................................

..........................................................................................................................................................
[4]

10 Define the following internet terms.

(a) Hyperlink ...................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

(b) ISP ............................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]
© UCLES 2020 0417/12/O/N/20 [Turn over
14

11 For each of the following pieces of hardware, explain the strategies you would use to help minimise
health problems.

(a) Monitor ......................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [3]

(b) Keyboard ..................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

12 Describe the differences between using a Graphical User Interface (GUI) and a Command Line
Interface (CLI).

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

.................................................................................................................................................... [4]

© UCLES 2020 0417/12/O/N/20


15

BLANK PAGE

© UCLES 2020 0417/12/O/N/20


16

BLANK PAGE

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.

Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of
Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge.

© UCLES 2020 0417/12/O/N/20


Cambridge IGCSE™
* 7 5 8 8 4 1 9 7 6 2 *

INFORMATION AND COMMUNICATION TECHNOLOGY 0417/13


Paper 1 Theory October/November 2020

2 hours

You must answer on the question paper.

No additional materials are needed.

INSTRUCTIONS
● Answer all questions.
● Use a black or dark blue pen.
● Write your name, centre number and candidate number in the boxes at the top of the page.
● Write your answer to each question in the space provided.
● Do not use an erasable pen or correction fluid.
● Do not write on any bar codes.
● You may use an HB pencil for any diagrams, graphs or rough working.

INFORMATION
● The total mark for this paper is 100.
● The number of marks for each question or part question is shown in brackets [ ].
● No marks will be awarded for using brand names of software packages or hardware.

This document has 16 pages. Blank pages are indicated.

DC (DH/FC) 189827/3
© UCLES 2020 [Turn over
2

1 A desktop computer consists of both hardware and software. The software is either applications
software or system software.

(a) Tick (3) whether the following are examples of applications software or system software.

applications system
(3) (3)
Measurement software
Linker
Database
Utility software
[2]

(b) Identify two internal items of hardware that could be found in a desktop computer.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................
[2]

2 A computer system uses two types of documentation: technical and user. Some items only appear
in the technical documentation and other items only in the user documentation, whereas some
items appear in both.

Tick (3) whether the following items appear only in Technical documentation, only in User
documentation or in Both.

Item Technical User


Both
documentation documentation
(3)
(3) (3)
Algorithms
File structures
Error messages
Limitations of the system
Hardware requirements
Glossary of terms
[6]

© UCLES 2020 0417/13/O/N/20


3

3 A student has produced a document for her biology project. Part of the project is shown. Answer
the questions relating to the document.

Biology Project 16/02/2019 Biology Project 16/02/2019

The Kiwi making it an omnivore.

Apteryx is the
scientific name for
the Kiwi. The Kiwi is
a burrowing bird and
is the oldest of New
Zealand’s birds,
having evolved 70
million years ago from a flightless ancestor
from the great southern continent of
Gondwana. It is related to the Ostrich, Emu
and Rhea as well as the now extinct New
Zealand Moa, all of which are much taller
than the Kiwi. The Kiwi is a very secretive,
nocturnal bird which is seldom seen in the
wild.

There are two species of Kiwis in New


Zealand. Brown Kiwis are found in forested
areas in the North Island, Fiordland, South
Westland and Stewart Island. Spotted Kiwis
are found on offshore islands and forests in
the north of the South Island.

The Kiwi is a tailless and flightless bird. It


feeds on insects, grubs and spiders which it
locates by sniffing among the leaves and
rotting wood on the forest floor using its
external nostrils. It is the only bird to have
external nostrils. The Kiwi also eats berries,

2 3

(a) Give the name of the extra margin between the two pages of the document.

............................................................................................................................................. [1]

(b) Give the name of the space above the document, containing ‘Biology Project’ and the date.

............................................................................................................................................. [1]

(c) Name the term given to the single line of text that has overflowed on to the next page.

............................................................................................................................................. [1]

(d) Name the type of alignment used for the body text.

............................................................................................................................................. [1]

(e) The student has placed an image in the document.

Name the type of formatting used to allow the text to flow around the image.

............................................................................................................................................. [1]

© UCLES 2020 0417/13/O/N/20 [Turn over


4

4 Generic file formats allow data to be opened in any platform.

Identify two generic text formats.

1 .......................................................................................................................................................

2 .......................................................................................................................................................
[2]

5 When a website is created, three web development layers are used: the content layer, the
presentation layer and the behaviour layer.

(a) Describe what is meant by the content layer.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [3]

(b) Describe what is meant by the presentation layer.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [3]

© UCLES 2020 0417/13/O/N/20


5

6 The manager of a company is planning to create a computerised system and has asked a systems
analyst to research the current system. The systems analyst could do this by using a number of
different methods, but has chosen to create and send out a questionnaire to members of the
company.

(a) Discuss the benefits and drawbacks of sending out questionnaires to members of the
company.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [6]

(b) The system has been created. As the data is entered into the system it is verified.

Give two methods of verification.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................
[2]

© UCLES 2020 0417/13/O/N/20 [Turn over


6

(c) Explain why data still needs to be validated even though it has been verified.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [4]

© UCLES 2020 0417/13/O/N/20


7

7 A house contains a microprocessor-controlled central heating system.

(a) Identify two input devices that would be used in this system.

1 ................................................................................................................................................

2 ................................................................................................................................................
[2]

(b) Describe how a microprocessor would use the data from these devices to control the central
heating system.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [6]

© UCLES 2020 0417/13/O/N/20 [Turn over


8

8 A spreadsheet has been produced showing the final places in one of the events in the 2018 Winter
Olympic Games.

A B C D E F G H I J
1
Total
2 Country Name Heat1 Heat2 Heat3 Heat4 Time Min Seconds
3 KOR Yun Sungbin 50.28 50.07 50.18 50.02 200.6 3 20.55 20.6
4 LAT Martins Dukurs 50.85 50.38 50.32 50.76 202.3 3 22.31 22.3
5 GBR Dom Parsons 50.85 51.41 49.33 50.62 202.2 3 22.21 22.2
6 OAR Nikita Tregubov 50.59 50.50 50.50 50.59 202.2 3 22.18 22.2
7 LAT Tomass Dukurs 50.88 50.58 50.65 50.63 202.7 3 22.74 22.7
8 KOR Kim Jisoo 50.80 50.86 50.51 50.81 203.0 3 22.98 23.0
9 GER Axel Jungk 50.77 51.01 50.83 50.99 203.6 3 23.60 23.6
10

The event consists of four heats. The times taken to complete each heat are added together to
give the Total Time, in seconds. This is then displayed as minutes and seconds.

Two formulae form this calculation; they are stored in column H and column J.

The formula in cell H3 is: =INT(G3/60)

(a) Explain what the formula in cell H3 does.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

The formula in cell J3 is: =ROUND(I3,1)

(b) Explain what the formula in cell J3 does.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

© UCLES 2020 0417/13/O/N/20


9

At the end of the competition, the table must be sorted into ascending order of Total Time. The top
athlete would be in the gold medal position, the second in silver medal position and the third in
bronze medal position. The Medal and Rank columns must be added.

This display should look like this:

A B C D E F G H I
1
Total
2 Medal Rank Country Name Heat1 Heat2 Heat3 Heat4 Time
3 Gold 1 KOR Yun Sungbin 50.28 50.07 50.18 50.02 200.55
4 Silver 2 OAR Nikita Tregubov 50.59 50.50 50.50 50.59 202.18
5 Bronze 3 GBR Dom Parsons 50.85 51.41 49.33 50.62 202.21
6 4 LAT Martins Dukurs 50.85 50.38 50.32 50.76 202.31
7 5 LAT Tomass Dukurs 50.88 50.58 50.65 50.63 202.74
8 6 KOR Kim Jisoo 50.80 50.86 50.51 50.81 202.98
9 7 GER Axel Jungk 50.77 51.01 50.83 50.99 203.60
10

(c) Explain the steps that must be taken to amend the spreadsheet and to display the data in this
way.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [6]

© UCLES 2020 0417/13/O/N/20 [Turn over


10

The heat times are measured by a computer system, but could be measured by officials with
stopwatches.

(d) Discuss the advantages and disadvantages of using computers in measurement rather than
humans.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [6]

© UCLES 2020 0417/13/O/N/20


11

9 Legal documents can be sent by email, as a file attachment, or by physical fax.

(a) Describe the advantages of using emails compared with physical faxing.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [5]

A legal document is sent as a file attachment.

(b) Explain the steps that need to be taken to ensure that if a virus is attached to the file, it cannot
infect the computer.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [4]

© UCLES 2020 0417/13/O/N/20 [Turn over


12

A computer virus has been downloaded from an infected file.

(c) Describe three effects this could have on a computer.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................

3 ................................................................................................................................................

...................................................................................................................................................
[3]

10 The use of ICT in organisations has changed the way in which employees work.

(a) Describe, giving an example, what is meant by compressed hours.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [3]

(b) Describe, giving an example, what is meant by flexible working.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [3]

© UCLES 2020 0417/13/O/N/20


13

11 The director of a museum in China is planning an exhibition on ancient civilisations. One of the
exhibits is a full representation of a 10 000-year-old human. The Natural History Museum in
London is planning to send a complete skeleton, but it is too fragile.

(a) Describe how a computer could be used to create a 3D copy of the skeleton which will then
be printed in China.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [5]

(b) Describe four benefits of using 3D printers.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................

3 ................................................................................................................................................

...................................................................................................................................................

4 ................................................................................................................................................

...................................................................................................................................................
[4]

© UCLES 2020 0417/13/O/N/20 [Turn over


14

12 Autonomous vehicles such as taxis are being tested on the world’s roads. This type of taxi is
able to drive between two points without the driver having control of the vehicle. The vehicles use
satellite navigation and wireless technology with sensors to navigate and control the vehicle.

Evaluate the use of these technologies when navigating and controlling vehicles in this way.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

.................................................................................................................................................... [8]

© UCLES 2020 0417/13/O/N/20


15

13 Email is a common way of communicating with other people. Netiquette is associated with
emailing.

A headmistress of a school has asked the network manager to produce a document listing
netiquette rules the staff and students should follow when sending emails from the school.

Describe, giving reasons, three rules that he could produce.

1 .......................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

2 .......................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

3 .......................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................
[6]

© UCLES 2020 0417/13/O/N/20


16

BLANK PAGE

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.

Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of
Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge.

© UCLES 2020 0417/13/O/N/20



Cambridge IGCSE

INFORMATION AND COMMUNICATION TECHNOLOGY 0417/12


*5506029078*

Paper 1 Theory February/March 2021


2 hours

You must answer on the question paper.

No additional materials are needed.

INSTRUCTIONS
• Answer all questions.
• Use a black or dark blue pen.
• Write your name, centre number and candidate number in the boxes at the top of the page.
• Write your answer to each question in the space provided.
• Do not use an erasable pen or correction fluid.
• Do not write on any bar codes.
• You may use an HB pencil for any diagrams, graphs or rough working.

INFORMATION
• The total mark for this paper is 100.
• The number of marks for each question or part question is shown in brackets [ ].
• No marks will be awarded for using brand names of software packages or hardware.

This document has 20 pages. Any blank pages are indicated.

03_0417_12_2021_1.10
© UCLES 2021 [Turn over
2

1 Tick (✓) whether the following are examples of internal or external hardware devices.

internal external
(✓) (✓)

Mouse

Video card

Printer

Actuator

[2]

2 Geeta spends a great deal of time at work entering data into her computer.

State three items of hardware that Geeta should be provided with to help avoid RSI when she
enters data into the computer.

1 ................................................................................................................................................

..................................................................................................................................................

2 ................................................................................................................................................

..................................................................................................................................................

3 ................................................................................................................................................

..................................................................................................................................................

[3]

© UCLES 2021 03_0417_12_2021_1.10


3

Question 3 starts on page 4.

© UCLES 2021 03_0417_12_2021_1.10 [Turn over


4

th
3 Falyaz has created a diary using word processing software. The diary entry for 17 May 2020 is
shown.

(a) Write down four formatting features of the word processing software used to make this diary
entry.

Feature 1...........................................................................................................................

...........................................................................................................................................

Feature 2...........................................................................................................................

...........................................................................................................................................

Feature 3...........................................................................................................................

...........................................................................................................................................

Feature 4...........................................................................................................................

...........................................................................................................................................

[4]

© UCLES 2021 03_0417_12_2021_1.10


5

(b) The original diary entry typed into the word processing software did not include an image.

Describe the steps that would be carried out by Falyaz to include in his diary entry an image
taken from his digital camera.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [6]

(c) Name two other sources of digital images apart from using a digital camera.

Source 1............................................................................................................................

...........................................................................................................................................

Source 2............................................................................................................................

...........................................................................................................................................

[2]

© UCLES 2021 03_0417_12_2021_1.10 [Turn over


6

(d) Tick (✓) whether the following statements about generic image files refer to jpg, png or gif
file types.

jpg png gif


(✓) (✓) (✓)

This file type stores still or moving images

This file type uses lossy compression

This file type is used for storing photographs on a digital camera

This file type is limited to 256 colours

[4]

(e) Falyaz wants to add a header in his word processed diary.

Explain what is meant by a header and why it is needed.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [4]

© UCLES 2021 03_0417_12_2021_1.10


7

4 The table shows a comparison of two different types of fitness tracker. A fitness tracker contains
a microprocessor, is worn around the wrist and monitors physical readings of the wearer.

Name of fitness tracker Flexi-byt 6 FitB 4

Battery life in days 20 days 7 days

Method of internet connection Bluetooth WiFi

Water resistant 100 m 10 m

GPS Y N

Cost INR 22 855 INR 10 700

(a) You have been asked to design a poster to show this data for the two fitness trackers.

Describe how you would use six different design features to enhance the data in this poster.
The poster must be suitable for an audience of adult customers.

1.........................................................................................................................................

...........................................................................................................................................

2.........................................................................................................................................

...........................................................................................................................................

3.........................................................................................................................................

...........................................................................................................................................

4.........................................................................................................................................

...........................................................................................................................................

5.........................................................................................................................................

...........................................................................................................................................

6.........................................................................................................................................

...........................................................................................................................................

[6]

© UCLES 2021 03_0417_12_2021_1.10 [Turn over


8

(b) Describe the computer processing involved in the use of a microprocessor-controlled fitness
tracker when displaying and monitoring the blood pressure of the user.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [4]

5 A parent is concerned about his children sending texts. When sending a text, it is important to follow
netiquette.

(a) Explain what is meant by the term netiquette.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [2]

© UCLES 2021 03_0417_12_2021_1.10


9

(b) The parent is planning to produce a number of rules to ensure that his children follow netiquette
when texting other people.

Write down four rules that he could include in his list.

1.........................................................................................................................................

...........................................................................................................................................

2.........................................................................................................................................

...........................................................................................................................................

3.........................................................................................................................................

...........................................................................................................................................

4.........................................................................................................................................

...........................................................................................................................................

[4]

6 Complete the following sentences, using the most appropriate direct data entry device.

a bar code reader a chip reader MICR a magnetic stripe reader


OCR OMR PIN pad RFID reader

(a) The device that reads data from a card in a contactless card system is called

........................................................................................................................................... [1]

(b) The device that reads scanned text and converts it into a readable form is called

........................................................................................................................................... [1]

(c) The device that reads the data made up of black lines and spaces on household goods is
called

........................................................................................................................................... [1]

© UCLES 2021 03_0417_12_2021_1.10 [Turn over


10

7 A school is planning to introduce a contactless card system for pupils to pay for school meals. Each
card contains an amount of money which is topped up by parents. Parents transfer amounts of
money into the school system and pupils place the card close to a reader to upload the money onto
the card.

(a) Discuss the benefits and drawbacks, to the pupils, of using a contactless card system rather
than paying by cash.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [6]

© UCLES 2021 03_0417_12_2021_1.10


11

(b) The terminals in the school use electronic funds transfer at point of sale (EFTPOS).

Describe the computer processing that takes place to pay for a meal at the EFTPOS terminal
using the card.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [6]

© UCLES 2021 03_0417_12_2021_1.10 [Turn over


12

8 A computer system is being created to calculate the scores in a diving competition. Every dive by
an athlete is awarded a score out of 10 by each judge.

The system is being tested using live data. An athlete completes his dive with a difficulty of 3.4 and
achieves the following scores, which are displayed in a spreadsheet.

(a) Before the overall score is calculated the judges’ scores need to be sorted into ascending
order.

Describe the steps that would be carried out to sort the data into ascending order.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [3]

© UCLES 2021 03_0417_12_2021_1.10


13

(b) Cell B12 contains the formula, ROUND((SUM(B5:B9)*D1),1).

Explain what the formula in cell B12 does.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [3]

(c) The judges’ score column will be tested using normal, abnormal and extreme data.

Explain, giving examples of test data which would be used, what is meant by:

Abnormal test data............................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

Extreme test data..............................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

[4]

© UCLES 2021 03_0417_12_2021_1.10 [Turn over


14

9 Tawara school uses an optical mark recognition (OMR) system for its school register. An example
of the register is shown. For each session of the school there are two lozenges to be shaded in.

At the start of the registration period the teacher shades in a lozenge [P] on the register to show
that a pupil is present and shades in a lozenge [A] for each pupil who is absent. If a pupil is late
then the teacher shades in both the [P] and the [A] lozenges. The register sheets are sent to the
school office to be processed and the data from them is stored in the computer’s database.

(a) Describe the inputs and computer processing of the registers when they are sent to the school
office, prior to them being stored on the computer’s database.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [6]

© UCLES 2021 03_0417_12_2021_1.10


15

(b) The headteacher of the school is considering modernising the registration system so that pupils
can register using a facial recognition system.

Discuss the advantages and disadvantages of using a facial recognition registration system
rather than the OMR system they currently use.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [8]

© UCLES 2021 03_0417_12_2021_1.10 [Turn over


16

(c) Biometric data, like facial recognition, is an example of personal data.

Give two other examples of personal data that could be stored on the school registration
database.

1.........................................................................................................................................

...........................................................................................................................................

2.........................................................................................................................................

...........................................................................................................................................

[2]

© UCLES 2021 03_0417_12_2021_1.10


17

10 Computer data can be stored on physical storage devices. Data can also be stored in the ‘cloud’.

(a) Explain what is meant by the cloud, giving two advantages of storing data in the cloud compared
with physical storage devices.

Explanation........................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

Advantage 1......................................................................................................................

...........................................................................................................................................

Advantage 2......................................................................................................................

...........................................................................................................................................

[4]

(b) Tick (✓) whether the following storage devices are examples of optical, magnetic or solid
state storage.
optical magnetic solid state
(✓) (✓) (✓)

Flash drive

Hard disk drive

Blu-ray disc drive

SSD

[4]

© UCLES 2021 03_0417_12_2021_1.10 [Turn over


18

11 The owner of a bookshop has a database of all the books she has in stock. As some of the data
is being entered into the database it is checked using validation checks.

An example of some of the records in the database is shown.

Field name Example data

Name of book Brotherhood of Wisdom

Name of author Colin Turner

ISBN 471837951

Date of purchase 25/02/2021

Number of copies 10

Type of book E

Name of book The Fourth Man

Name of author Aadha Khatri

ISBN 0718121753

Date of purchase 18/03/2019

Number of copies 53

Type of book H

Name of Book Indian Temples

Name of author Vihaan Laghan

ISBN 978147183215

Date of purchase 12/02/2019

Number of copies 30

Type of book H

© UCLES 2021 03_0417_12_2021_1.10


19

Explain, using a field name and examples of the data stored in that field in the database, why
validation checks must be appropriate to the data that is being checked.

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

.................................................................................................................................................. [4]

12 A company has placed a firewall between their Local Area Network (LAN) and their internet
connection. This is used to increase security in their computer systems.

Discuss the effectiveness of using this firewall to increase security.

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

.................................................................................................................................................. [6]

© UCLES 2021 03_0417_12_2021_1.10


20

BLANK PAGE

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable
effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will
be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge Assessment
International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at
www.cambridgeinternational.org after the live examination series.

Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of
Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge.

© UCLES 2021 03_0417_12_2021_1.10



Cambridge IGCSE

INFORMATION AND COMMUNICATION TECHNOLOGY 0417/11


*6228711242*

Paper 1 Theory May/June 2021


2 hours

You must answer on the question paper.

No additional materials are needed.

INSTRUCTIONS
• Answer all questions.
• Use a black or dark blue pen.
• Write your name, centre number and candidate number in the boxes at the top of the page.
• Write your answer to each question in the space provided.
• Do not use an erasable pen or correction fluid.
• Do not write on any bar codes.
• You may use an HB pencil for any diagrams, graphs or rough working.

INFORMATION
• The total mark for this paper is 100.
• The number of marks for each question or part question is shown in brackets [ ].
• No marks will be awarded for using brand names of software packages or hardware.

This document has 16 pages.

06_0417_11_2021_1.8
© UCLES 2021 [Turn over
2

1 Tick (✓) whether the following are examples of personal data.

Yes No
(✓) (✓)

Full name

Capital of England

Gender

Number of flowers in a garden

[2]

2 Circle two input devices that could be used in a smartphone.

HDD magnetic stripe reader microphone mouse

remote control speaker touchpad touch screen

[2]

3 Describe four characteristics of a tablet computer.

1 ................................................................................................................................................

..................................................................................................................................................

2 ................................................................................................................................................

..................................................................................................................................................

3 ................................................................................................................................................

..................................................................................................................................................

4 ................................................................................................................................................

..................................................................................................................................................

[4]

© UCLES 2021 06_0417_11_2021_1.8


3

4 Many banks have reduced the number of staff in their branches and replaced them with automatic
teller machines (ATMs). These ATMs, which can be located within the bank, can be used by
customers to deposit and withdraw money from their bank accounts.

(a) ATMs can be used to deposit cheques.

Describe the computer processing involved in depositing a cheque at an ATM.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [6]

© UCLES 2021 06_0417_11_2021_1.8 [Turn over


4

(b) Customers can visit these banks or use internet banking.

Discuss the advantages and disadvantages to a customer of visiting the bank rather than using
internet banking.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [6]

5 Tawara school has a shop that sells items needed by pupils in school. Part of a spreadsheet with
details of the items is shown.

(a) Write down the number of rows that are shown in the spreadsheet that contain text.

........................................................................................................................................... [1]

(b) Write down the number of columns that are shown in the spreadsheet that contain text.

........................................................................................................................................... [1]

© UCLES 2021 06_0417_11_2021_1.8


5

(c) Tax is paid on certain items sold in the shop. The tax rate that has to be paid is 20% of the
selling price. If tax is to be paid on an item, then ‘Y’ is placed underneath the Tax heading.

The formula in I4 is: IF(F4=''Y'',($I$1*D4*G4),'''')

Explain, in detail, what the formula does.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [5]

(d) Explain the steps that need to be taken to display cell H4 as US dollars.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [2]

© UCLES 2021 06_0417_11_2021_1.8 [Turn over


6

6 You have been asked by the secretary of a soccer club to create a website to publicise its results,
fixtures and other events.

When the website has been created it has to be published on the internet. You plan to upload it
onto the internet using FTP.

(a) Explain what is meant by FTP.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [2]

(b) Explain how to upload and publish the content of a website using FTP.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [4]

© UCLES 2021 06_0417_11_2021_1.8


7

(c) Before the website is published it needs to be tested.

Write down three different features of the web pages that could be tested. For each feature,
describe the method you would use to carry out the test.

Feature 1...........................................................................................................................

Method...............................................................................................................................

...........................................................................................................................................

Feature 2...........................................................................................................................

Method...............................................................................................................................

...........................................................................................................................................

Feature 3...........................................................................................................................

Method...............................................................................................................................

...........................................................................................................................................

[6]

© UCLES 2021 06_0417_11_2021_1.8 [Turn over


8

7 A systems analyst has created a new computer system to keep records in a medical centre. She
has created a relational database to store the medical records of patients.

The database uses primary and foreign keys.

(a) Describe what is meant by a relational database.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [3]

(b) Explain the difference between a primary key and a foreign key.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [4]

© UCLES 2021 06_0417_11_2021_1.8


9

(c) A dentist works at the medical centre. The dentist stores the medical records of his patients.

Describe four other uses of the database software that the dentist can use to help him in his
work.

1.........................................................................................................................................

...........................................................................................................................................

2.........................................................................................................................................

...........................................................................................................................................

3.........................................................................................................................................

...........................................................................................................................................

4.........................................................................................................................................

...........................................................................................................................................

[4]

© UCLES 2021 06_0417_11_2021_1.8 [Turn over


10

(d) The data stored on the computer system needs to be protected from unauthorised access.

Discuss the effectiveness of different methods of increasing security of this data.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [8]

© UCLES 2021 06_0417_11_2021_1.8


11

8 Compare and contrast the features of a switch and a hub.

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

.................................................................................................................................................. [6]

9 A company operates from 08:00 to 19:00, Monday to Friday. Full-time employees work a 40-hour
week, starting at 09:00 and finishing work at 17:00.

For each of the times worked by an employee, write down the most appropriate working pattern.

(a) An employee works from 09:00 to 13:00, Monday to Friday.

........................................................................................................................................... [1]

(b) An employee works from 09:00 to 19:00, Monday to Thursday.

........................................................................................................................................... [1]

(c) The work of two employees combined is a 40-hour week; each work for two full days and a
half day.

........................................................................................................................................... [1]

(d) An employee works a full 8-hour day but has negotiated with his employer to complete this at
some point between 08:00 and 19:00, each day.

........................................................................................................................................... [1]

© UCLES 2021 06_0417_11_2021_1.8 [Turn over


12

10 Tick (✓) the most appropriate method of implementation to match the statements below.

Direct Parallel Pilot


(✓) (✓) (✓)

All of the benefits are immediate.

If the new system fails the whole of the old system is still
operational.

This is the cheapest implementation method.

The system is implemented in one branch of the company.

[4]

11 Data stored on a computer system is at risk of being hacked.

(a) Explain what is meant by the term hacking. Include in your answer two examples of the effects
this can have on the computer system.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [3]

(b) Describe three measures that could be taken to protect the data from being hacked.

1.........................................................................................................................................

...........................................................................................................................................

2.........................................................................................................................................

...........................................................................................................................................

3.........................................................................................................................................

...........................................................................................................................................

[3]

© UCLES 2021 06_0417_11_2021_1.8


13

12 An image has been changed in a number of different ways.

Original image

For each of the following images describe the software editing technique used in order to produce
the edited images shown from the original image.

Edited images

A B C D

A ...............................................................................................................................................

..................................................................................................................................................

B ...............................................................................................................................................

..................................................................................................................................................

C ...............................................................................................................................................

..................................................................................................................................................

D ...............................................................................................................................................

..................................................................................................................................................

[4]

© UCLES 2021 06_0417_11_2021_1.8 [Turn over


14

13 RockIT Airlines representatives use a computer booking system to book flights for customers.

A representative from the airline types in the customer reference number, the number of passengers,
departure time, departure date, departure airport and the destination airport.

A customer is planning to take a flight from London Heathrow Airport. The representative types in
a code LHR for London Heathrow Airport. One of the reasons for using a code for the airport is to
improve data accuracy.

(a) Describe two other advantages of using a code rather than typing out the full name.

1.........................................................................................................................................

...........................................................................................................................................

2.........................................................................................................................................

...........................................................................................................................................

[2]

(b) Describe the importance of data accuracy when making a booking.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [2]

© UCLES 2021 06_0417_11_2021_1.8


15

(c) Describe the processing and outputs involved in making the booking.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [6]

Question 14 starts on page 16.

© UCLES 2021 06_0417_11_2021_1.8 [Turn over


16

14 A road through a village has a speed limit of 45 kilometres per hour. The police are checking and
recording the speed of vehicles passing through the village using measuring hardware and software,
so they can produce a report of their findings.

(a) Explain the difference between measurement and control when using microprocessors.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [2]

(b) Describe the role of the microprocessor in this scenario.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [4]

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable
effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will
be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge Assessment
International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at
www.cambridgeinternational.org after the live examination series.

Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of
Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge.

© UCLES 2021 06_0417_11_2021_1.8



Cambridge IGCSE

INFORMATION AND COMMUNICATION TECHNOLOGY 0417/12


*7108723569*

Paper 1 Theory May/June 2021


2 hours

You must answer on the question paper.

No additional materials are needed.

INSTRUCTIONS
• Answer all questions.
• Use a black or dark blue pen.
• Write your name, centre number and candidate number in the boxes at the top of the page.
• Write your answer to each question in the space provided.
• Do not use an erasable pen or correction fluid.
• Do not write on any bar codes.
• You may use an HB pencil for any diagrams, graphs or rough working.

INFORMATION
• The total mark for this paper is 100.
• The number of marks for each question or part question is shown in brackets [ ].
• No marks will be awarded for using brand names of software packages or hardware.

This document has 16 pages. Any blank pages are indicated.

06_0417_12_2021_1.2
© UCLES 2021 [Turn over
2

1 Tick (✓) whether the following are examples of control, measurement or modelling applications.

control measurement modelling


(✓) (✓) (✓)

Personal finance

Weather forecasting

Burglar alarms

Weather stations

[4]

2 (a) Circle two items that could be used to output data directly from a smartphone.

Blu-ray disc microphone mouse screen


SD card sensor speaker webcam

[2]

(b) One of the uses of a smartphone is the sending and receiving of emails.

Describe four other uses of a smartphone.

1.........................................................................................................................................

...........................................................................................................................................

2.........................................................................................................................................

...........................................................................................................................................

3.........................................................................................................................................

...........................................................................................................................................

4.........................................................................................................................................

...........................................................................................................................................

[4]

© UCLES 2021 06_0417_12_2021_1.2


3

3 Tick (✓) the most appropriate storage medium that should be used in each scenario.

Magnetic tape RAM ROM


Scenario
(✓) (✓) (✓)

To store the current instructions in use by a


computer

To back up data from a school network server

To store data temporarily

To store the start-up instructions of a


computer

[4]

4 Complete the sentences below using the most appropriate word from the list.

cookies hacking pharming phishing


smishing spam spyware virus

(a) The act of gaining unauthorised access to a computer system is called

........................................................................................................................................... [1]

(b) The software that gathers data by monitoring key presses on a user’s keyboard is called

........................................................................................................................................... [1]

(c) A fake text message, that could contain a link, sent to a mobile phone is called

........................................................................................................................................... [1]

© UCLES 2021 06_0417_12_2021_1.2 [Turn over


4

5 Petr has set up a database for a science project on planets in the solar system. Part of the database
is shown.

ID Name_of_planet Number_of_moons Orbital_period Rings Gravity Type_of_planet First_observed

4 Mars 2 1.88 N 0.38 Regular 1610

5 Ceres 0 4.61 N 0.27 Dwarf 1801

7 Saturn 62 29 Y 1.16 Gas Giant 1610

9 Neptune 14 165 Y 1.21 Gas Giant 1846

10 Pluto 5 248 N 0.62 Dwarf 1930

11 Haumea 1 309 N 0.401 Dwarf 2004

(a) When Petr was designing his database, he had to set the data types for each field.
Complete the design table below by filling in the data types for each named field. Use the most
appropriate data type. Each data type must be different. For any numeric field, specify the type
of number.

Field name Data type

Number_of_moons

Orbital_period

Rings

Name_of_planet

[4]

© UCLES 2021 06_0417_12_2021_1.2


5

(b) Operators such as AND, OR, NOT, LIKE, >, >=, <, <=, =, <> can be used to search Petr’s
planet database. The search criteria for all the gas giant planets with more than 20 moons
would look like this:

Type_of_planet = ''Gas Giant'' AND Number_of_moons > 20

Write down the search criteria that will produce a list of planets that are not gas giants but
have at least one moon and were first observed after 1800.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [7]

(c) Write down the names of the planets that are not gas giants but have at least one moon and
were first observed after 1800.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [2]

(d) Petr has copied the data from the Orbital_period field into a spreadsheet. The data for the
orbital period for Mars, 1.88, is stored in cell A2. In cell B2 he has entered a function of:

ROUND(A2,0)

Explain in detail the function used in cell B2.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [2]

© UCLES 2021 06_0417_12_2021_1.2 [Turn over


6

6 Humans can send unmanned aircraft into storms to collect wind speeds and temperature data. The
unmanned aircraft have sensors attached to them which send the data back to computers at the
weather station. The computers analyse the data.

Previously the aircraft was manned and all the data was collected and flown back to the weather
station.

Discuss the advantages and disadvantages of using the unmanned aircraft rather than using the
manned aircraft.

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

.................................................................................................................................................. [8]

© UCLES 2021 06_0417_12_2021_1.2


7

7 The owner of Tawara Hotels is planning a new computerised booking system. There are ten Tawara
Hotels throughout the world. The current booking system allows people to book rooms in any of
the Tawara Hotels. He has employed a systems analyst to research the current system and then
install the new system.

(a) When analysing the current booking system, the systems analyst must identify the user
requirements.

Explain why it is important for the systems analyst to do this.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [3]

(b) Tick (✓) the relevant stage of the systems life cycle for each of the following activities.

Development
Activity Analysis and testing Evaluation
(✓) (✓) (✓)

Identifying the problems with the current


system

Comparing the solution with the original


task requirements

Create the file structure

Identify limitations to the new system and


improvements to be made

[4]

© UCLES 2021 06_0417_12_2021_1.2 [Turn over


8

(c) Before the new booking system is installed, the systems analyst has to decide on a method
of implementation. One method of implementation is pilot running.

Name two other methods of implementation and describe two benefits of each.

Name.................................................................................................................................

Benefit 1............................................................................................................................

...........................................................................................................................................

Benefit 2............................................................................................................................

...........................................................................................................................................

Name.................................................................................................................................

Benefit 1............................................................................................................................

...........................................................................................................................................

Benefit 2............................................................................................................................

...........................................................................................................................................

[6]

© UCLES 2021 06_0417_12_2021_1.2


9

8 Students often use IT equipment; therefore it is important to have a good physical safety strategy.

Evaluate your own use of IT equipment, in terms of physical safety, and describe the strategies
you will need to minimise the potential physical safety risks.

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

.................................................................................................................................................. [6]

9 (a) Describe two uses of a company intranet.

1.........................................................................................................................................

...........................................................................................................................................

2.........................................................................................................................................

...........................................................................................................................................

[2]

© UCLES 2021 06_0417_12_2021_1.2 [Turn over


10

(b) Social networking is used to communicate with friends; this is one use of the internet.

Describe four other uses of the internet.

1.........................................................................................................................................

...........................................................................................................................................

2.........................................................................................................................................

...........................................................................................................................................

3.........................................................................................................................................

...........................................................................................................................................

4.........................................................................................................................................

...........................................................................................................................................

[4]

© UCLES 2021 06_0417_12_2021_1.2


11

(c) A major part of the everyday use of the internet is social networking. Currently some social
networks are not policed. The owners of a website have full discretion on what material is
removed and what is allowed to be kept.

Discuss the benefits and drawbacks of policing social networking sites.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [8]

© UCLES 2021 06_0417_12_2021_1.2 [Turn over


12

10 Describe the advantages, to both the company and employees, of changing work patterns due to
the introduction of computers.

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

.................................................................................................................................................. [6]

11 When an email is sent, it could have a digital certificate attached.

Explain why a digital certificate is required. Include in your answer items that could be found in a
digital certificate.

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

.................................................................................................................................................. [5]

© UCLES 2021 06_0417_12_2021_1.2


13

12 A search engine can be used to find information on the internet.

(a) Describe the disadvantages of using a search engine to find information rather than typing in
a web address.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [4]

(b) A student is writing a project on rare animals. He uses a search engine to find information
about the animals from the internet. He is concerned about the reliability of some of the
information he has found.

Explain how he would evaluate the reliability of this information.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [6]

© UCLES 2021 06_0417_12_2021_1.2 [Turn over


14

The student plans to create a table, using word processing software, to display the information he
has found out about the animal.

The completed table will look like this:

Name of animal Tiger quoll

Scientific name Dasyurus maculatus

Pouched No

Habitat Australia

Conservation status Threatened

(c) Explain how the student can create a table to enter this data.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [2]

(d) The student has saved a picture from the internet of a tiger quoll.

Explain how he could create a new row above the Pouched row and place the picture into the
right-hand cell of this new row.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [4]

© UCLES 2021 06_0417_12_2021_1.2


15

BLANK PAGE

© UCLES 2021 06_0417_12_2021_1.2


16

BLANK PAGE

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable
effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will
be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge Assessment
International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at
www.cambridgeinternational.org after the live examination series.

Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of
Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge.

© UCLES 2021 06_0417_12_2021_1.2



Cambridge IGCSE

INFORMATION AND COMMUNICATION TECHNOLOGY 0417/13


*8050692282*

Paper 1 Theory May/June 2021


2 hours

You must answer on the question paper.

No additional materials are needed.

INSTRUCTIONS
• Answer all questions.
• Use a black or dark blue pen.
• Write your name, centre number and candidate number in the boxes at the top of the page.
• Write your answer to each question in the space provided.
• Do not use an erasable pen or correction fluid.
• Do not write on any bar codes.
• You may use an HB pencil for any diagrams, graphs or rough working.

INFORMATION
• The total mark for this paper is 100.
• The number of marks for each question or part question is shown in brackets [ ].
• No marks will be awarded for using brand names of software packages or hardware.

This document has 20 pages. Any blank pages are indicated.

06_0417_13_2021_1.7
© UCLES 2021 [Turn over
2

1 Tick (✓) whether the following statements refer to Backing storage, RAM or ROM.

Backing
storage RAM ROM
(✓) (✓) (✓)

This is temporary storage used for the application


being executed.

This is volatile memory.

An example of this storage is an SSD.

This stores the start-up instructions for the


computer.

[4]

2 Circle two jobs where there has been an increase in employment as a direct result of the introduction
of computers.
Delivery drivers for
Car production workers Cleaning staff Medical staff
retail stores
Payroll workers Secretaries Teachers Website designers

[2]

3 A mobile phone is used for communications, either for making phone calls or text messaging.

Chang is planning an expedition to the Southern Alps in New Zealand. There is often a limited
mobile phone signal in these areas. He has set his phone up so that if there is an emergency he
can communicate with the rescue teams using text messaging rather than making a phone call.

Give two advantages of using text messaging in this way.

1 ................................................................................................................................................

..................................................................................................................................................

2 ................................................................................................................................................

..................................................................................................................................................

[2]

© UCLES 2021 06_0417_13_2021_1.7


3

4 Tick (✓) whether the following descriptions of analysing a system refer to Interviews, Observation
or Questionnaires.

Interviews Observation Questionnaires


Description
(✓) (✓) (✓)

This method gives a more reliable overview


of the whole system.

This is more time-consuming than the other


methods.

Questions on this method cannot be


expanded upon when being asked.

With this method the worker cannot remain


anonymous.

[4]

5 Complete the sentences using the most appropriate item from the list.

blog cookie email fax


search engine social media web browser wiki

(a) A piece of software that allows a user to display a web page is called a

........................................................................................................................................... [1]

(b) A personal internet journal is called a

........................................................................................................................................... [1]

(c) A web application that allows a group of people to edit the content is called a

........................................................................................................................................... [1]

© UCLES 2021 06_0417_13_2021_1.7 [Turn over


4

6 Susan is creating a database about cars and needs to save it in the shared area (S:) on the school
network. It will be stored in the folder ICT which is contained in the IGCSE folder. She needs to
save the file with a file name that is different from file names used by other students in the group.

(a) Write down a suitable file name for the file so that the teacher can easily find Susan’s work
and identify its contents. The file name should not contain spaces.

...........................................................................................................................................

........................................................................................................................................... [1]

(b) Write down the file path which Susan would use to store the file in the correct folder.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [2]

(c) Susan plans to work on her database at home. However, the database is very large so her
teacher has told her that it needs to be reduced in size. She will then be able to attach it to an
email so she can send it home.

Explain why the file size would need to be reduced.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [2]

© UCLES 2021 06_0417_13_2021_1.7


5

7 A family has purchased a wireless router for use in their home to allow their devices to be connected
via WiFi to form a wireless local area network (WLAN).

(a) When the family purchased the wireless router they were advised to change the default
password.

Explain why they should change the default password.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [2]

(b) Describe the process of using WiFi to connect to a WLAN.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [4]

© UCLES 2021 06_0417_13_2021_1.7 [Turn over


6

(c) Their son produces large complex diagrams on his desktop computer at home. He needs to
be able to access the diagrams when he is at university. Even if reduced in file size, the
diagrams would be too large to send using email.

Describe in detail how he could transfer the diagrams from his home desktop computer to be
able to access them at university, without using additional hardware.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [4]

(d) One of the parents in the family works for a government department and sends sensitive data
from their home computer to the office.The data is encrypted before being sent to ensure it is
harder to understand if it is intercepted.

Describe four other preventative measures that could be taken to avoid network security
issues.

1.........................................................................................................................................

...........................................................................................................................................

2.........................................................................................................................................

...........................................................................................................................................

3.........................................................................................................................................

...........................................................................................................................................

4.........................................................................................................................................

...........................................................................................................................................

[4]

© UCLES 2021 06_0417_13_2021_1.7


7

8 Many teachers feel that monitoring student progress is an important part of the teaching and learning
process.

Describe how the features of a spreadsheet can be used by a teacher to help monitor student
progress.

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

.................................................................................................................................................. [6]

© UCLES 2021 06_0417_13_2021_1.7 [Turn over


8

9 One way of communicating with other people is to use emails. It is very important that when you
send and receive emails you are aware of esafety.

Evaluate your own use of email in terms of esafety and describe the strategies you will need to
minimise the potential esafety risks.

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

.................................................................................................................................................. [8]

© UCLES 2021 06_0417_13_2021_1.7


9

10 Aimi works for a shop that sells toys. She is setting up a relational database of the stock in the
shop. She has started designing the database. Aimi has written down the questions that are asked
about each toy and needs to produce appropriate field names from them. An example of the type
of data that is to be stored is shown.

What is the toy? Tawara Doll

Who manufactured the toy? Tinky

What year was it manufactured? 2020

What price was it bought for? $12.99

(a) Complete the design table below by filling in an appropriate field name for each question. Each
field name must be different. Field names must not include spaces.

Question Field name

What is the toy?

Who manufactured the toy?

What year was it manufactured?

What price was it bought for?

[4]

© UCLES 2021 06_0417_13_2021_1.7 [Turn over


10

(b) When Aimi created the whole database one of the fields was set as integer. However, as data
is entered Aimi realises that the field should have been set to two decimal places.

Describe the steps that need to be taken, by Aimi, to change the field from an integer to a
decimal. This field will be set to two decimal places.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [4]

(c) Aimi created a relational database but could have created a flat file database.

Discuss the advantages and disadvantages of using a relational database rather than a flat
file database.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [6]

© UCLES 2021 06_0417_13_2021_1.7


11

11 Tawara College is setting up a new website for its older students. The website will publicise the
events in the college, as well as revision and sporting activities. The headteacher wants the website
to be attractive to the older students and it must meet their needs.

Before the website can be produced the needs of the audience have to be taken into account.

Analyse the needs of this audience.

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

.................................................................................................................................................. [8]

© UCLES 2021 06_0417_13_2021_1.7 [Turn over


12

12 The director of a zoo is writing a document about wallabies. He has taken an image of some
wallabies (Fig. 12.1) and is planning the layout of the pages which will include part of the image.
The image he plans to use is shown in Fig. 12.2.

Fig. 12.1

Fig. 12.2

(a) Name the editing technique that was used to change Fig. 12.1 to Fig. 12.2.

........................................................................................................................................... [1]

© UCLES 2021 06_0417_13_2021_1.7


13

(b) The director will include images and information about the wallabies in the document. Each
page will be set out in 2 columns with a line between them.

(i) Describe the steps taken to create the columns. Assume the software has been loaded
and the text has been entered.

................................................................................................................................

................................................................................................................................

................................................................................................................................

................................................................................................................................

................................................................................................................................

................................................................................................................................ [3]

© UCLES 2021 06_0417_13_2021_1.7 [Turn over


14

(ii) Describe the steps taken to add the image as shown.

................................................................................................................................

................................................................................................................................

................................................................................................................................

................................................................................................................................

................................................................................................................................

................................................................................................................................

................................................................................................................................

................................................................................................................................ [4]

© UCLES 2021 06_0417_13_2021_1.7


15

(c) As the document is being written for the zoo it needs to conform to the corporate house style.

Explain what is meant by corporate house style.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [4]

© UCLES 2021 06_0417_13_2021_1.7 [Turn over


16

13 A student is looking for information on the internet for his school project. He has found a number
of web pages that are useful.

(a) Explain the following terms when referring to web pages:

(i) Bookmark

................................................................................................................................

................................................................................................................................

................................................................................................................................

................................................................................................................................ [2]

(ii) Anchor

................................................................................................................................

................................................................................................................................

................................................................................................................................

................................................................................................................................ [2]

(iii) Hyperlink

................................................................................................................................

................................................................................................................................

................................................................................................................................

................................................................................................................................ [2]

(b) The student has found a website that is very useful and is planning to bookmark it.

Describe the steps he will need to take to set up a bookmark for the website.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [2]

© UCLES 2021 06_0417_13_2021_1.7


17

14 Magnetic tapes are used in organisations for backing up data.

Describe the advantages and disadvantages of using magnetic tapes rather than flash memory for
backing up data.

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

.................................................................................................................................................. [6]

15 Streaming movies and music is replacing downloading or purchasing a physical copy of the files.

Describe the advantages and disadvantages of streaming files rather than using other methods.

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

.................................................................................................................................................. [4]

© UCLES 2021 06_0417_13_2021_1.7


18

BLANK PAGE

© UCLES 2021 06_0417_13_2021_1.7


19

BLANK PAGE

© UCLES 2021 06_0417_13_2021_1.7


20

BLANK PAGE

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable
effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will
be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge Assessment
International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at
www.cambridgeinternational.org after the live examination series.

Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of
Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge.

© UCLES 2021 06_0417_13_2021_1.7


Cambridge IGCSE™
* 5 5 3 3 6 8 7 1 0 4 *

INFORMATION AND COMMUNICATION TECHNOLOGY 0417/11


Paper 1 Theory October/November 2021

2 hours

You must answer on the question paper.

No additional materials are needed.

INSTRUCTIONS
● Answer all questions.
● Use a black or dark blue pen.
● Write your name, centre number and candidate number in the boxes at the top of the page.
● Write your answer to each question in the space provided.
● Do not use an erasable pen or correction fluid.
● Do not write on any bar codes.
● You may use an HB pencil for any diagrams, graphs or rough working.

INFORMATION
● The total mark for this paper is 100.
● The number of marks for each question or part question is shown in brackets [ ].
● No marks will be awarded for using brand names of software packages or hardware.

This document has 16 pages. Any blank pages are indicated.

DC (CE/FC) 203093/2
© UCLES 2021 [Turn over
2

1 A computer consists of both hardware and software.

(a) Define the term hardware.

...................................................................................................................................................

............................................................................................................................................. [1]

(b) Give two examples of internal hardware devices.

1 ................................................................................................................................................

2 ................................................................................................................................................
[2]

(c) Define the term software.

...................................................................................................................................................

............................................................................................................................................. [1]

(d) There are two types of software: system and applications.

Give two examples of applications software.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................
[2]

2 Circle two jobs where there has been a decrease in employment as a direct result of the
introduction of computers.

Bus drivers Car production Delivery drivers Fishermen


workers for retail stores

Payroll workers Programmers Teachers Website designers


[2]

© UCLES 2021 0417/11/O/N/21


3

3 Describe two advantages of using a tablet computer rather than a laptop computer.

1 .......................................................................................................................................................

..........................................................................................................................................................

2 .......................................................................................................................................................

..........................................................................................................................................................
[2]

4 Tick (3) whether the following advantages of analysing a system refer to looking at existing
paperwork, observation or questionnaires.

Looking
at existing
paperwork Observation Questionnaire
(3) (3) (3)

This method gives the systems analyst


an overall view of the system

Individuals can remain anonymous

This method allows information to be


collected that cannot be obtained from
any other method

This method gives the quickest analysis


of the data

[4]

© UCLES 2021 0417/11/O/N/21 [Turn over


4

5 Tawara Tours has created a new online booking system to allow customers to book holidays. The
system was written using modules.

(a) Describe how the new system could be tested prior to it becoming operational.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [6]

© UCLES 2021 0417/11/O/N/21


5

(b) Tawara Tours used to book holidays using a manual booking system. This used a pen and
paper to make the bookings.

Discuss the advantages and disadvantages of using online booking systems rather than a
manual booking system.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [8]

© UCLES 2021 0417/11/O/N/21 [Turn over


6

6 As a student you often use a computer screen. This could be a screen on a desktop computer, a
laptop computer or even a smartphone.

Evaluate your use of computer screens, in terms of health risks, and explain any strategies you
use to minimise these health risks.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

.................................................................................................................................................... [6]

7 Bluetooth is a method of communication to connect devices together.

Describe how a smartphone can use Bluetooth to connect to another device.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

.................................................................................................................................................... [4]

© UCLES 2021 0417/11/O/N/21


7

8 An organisation uses the internet and an intranet.

(a) Explain how the purpose of the internet differs from the purpose of an intranet.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [4]

Employees in the organisation are allowed to access the intranet using their smartphones.

The employees are required to secure their smartphones using either facial recognition, passwords
or voice recognition.

(b) Tick (3) whether the following statements refer to facial recognition, password or
voice recognition.

Facial Voice
recognition Password recognition
(3) (3) (3)
This method cannot access the
smartphone unintentionally
The accuracy of this method can be
affected by noise
This method requires the use of the
smartphone’s camera
This method could be compromised by
shoulder surfing
[4]

© UCLES 2021 0417/11/O/N/21 [Turn over


8

9 Robots are used to spray paint cars in a car production company.

(a) Describe two other jobs that robots can perform in car production.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

(b) When the spray paint can is empty it needs to be refilled. There is a sensor in the can which
measures the amount of paint.

Describe the use of the sensor and microprocessor in this application.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [6]

© UCLES 2021 0417/11/O/N/21


9

(c) Discuss the advantages and disadvantages of the introduction of robots rather than employing
humans to spray paint the cars.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [6]

10 (a) Explain the differences between a VLOOKUP function and a LOOKUP function.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [3]

© UCLES 2021 0417/11/O/N/21 [Turn over


10

(b) A spreadsheet contains a list of staff and the rooms they work in at a school.

A B C D E
1 Room Department Name
2 29 Languages Aaron Garcia 31 =VLOOKUP(D2,A2:C7,3)
3 30 History Julieta Diaz
4 28 Chemistry Ernesto Fernandez
5 26 Biology Salvador Calbo
6 31 ICT David James
7 49 Mathematics Adriene Martinez

(i) Explain, in detail, what the formula in cell E2 does.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [3]

(ii) When certain room numbers are typed into cell D2 unexpected results appear in cell E2.

Suggest improvements that could be made to ensure the correct result is displayed.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [2]

© UCLES 2021 0417/11/O/N/21


11

A teacher in the school has created a spreadsheet to display whether a student has good
timekeeping when arriving at lessons. He has produced a formula but thinks it could be improved.
The formula is:

=IF(B4>=A$18,B$18,IF(B4>=A$17,B$17,IF(B4>=A$16,B$16,IF(B4>=A$15,B$15,IF(B4>=A$14,B$14,"")))))

A B C
1
2 Name of Student
3 Half term Lates
4 1 17 =IF(B4>=A$18,B$18,IF(B4>=A$17,B$17,IF(B4>=A$16,B$16,IF(B4>=A$15,B$15,IF(B4>=A$14,B$14,"")))))

5 2 20
6 3 1
7 4 12
8 5 18
9 6 0
10
11
12
13
14 0 Excellent
15 1 Very Good
16 5 Good
17 15 Poor
18 25 Very Poor
19

(c) Write down the value that should appear in cell C4.

............................................................................................................................................. [1]

(d) The teacher has improved the formula and has typed in =VLOOKUP(B4,A$14:B$18,2)

Explain the advantages of using this formula compared to the original one.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [4]

© UCLES 2021 0417/11/O/N/21 [Turn over


12

11 Many young people play online games. One problem with online gaming is that it is easy to give
out personal details accidentally. Some users create weak passwords which could lead to their
personal details being accessed.

(a) Name two pieces of personal data that could be accessed.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................
[2]

(b) Write down three rules that should be applied when setting a strong password.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[3]

(c) Describe safety measures that should be taken by gamers to ensure their data is safe other
than using strong passwords.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [6]
© UCLES 2021 0417/11/O/N/21
13

12 The use of social networking is a part of modern living.

(a) Define the term social networking.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

(b) Describe the benefits of using social networking.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [6]

© UCLES 2021 0417/11/O/N/21 [Turn over


14

13 A student is working on a project on the World Games. He has produced some information but has
decided to produce a second layout including a table. The original layout and the new layout are
shown.

2021 World Games


This will be the 11th World Games, a major international multi-sport event, for sports, or disciplines
within a sport, that were not contested in the Olympic Games.

Dates: Thu, 15 Jul 2021 – Sun, 25 Jul 2021


Location: Legion Field, Birmingham, Alabama, United States
Host city: Birmingham, Alabama, United States
Opening ceremony: July 15
Closing ceremony: July 25
Main venue: The New Birmingham Stadium

The original layout

2021 World Games


This will be the 11th World Games, a major international multi-sport event, for sports, or disciplines
within a sport, that were not contested in the Olympic Games.

Dates Thu, 15 Jul 2021 – Sun, 25 Jul 2021


Location Legion Field, Birmingham, Alabama, United States
Host city Birmingham, Alabama, United States
Opening ceremony July 15
Closing ceremony July 25
Main venue The New Birmingham Stadium

The new layout

(a) Explain, step by step, how the table was created, without the text being entered by hand.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [4]

© UCLES 2021 0417/11/O/N/21


15

(b) The student checks the text he has written using a spell checker.

Explain how a spell checker works.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

(c) Explain why the suggestions made by the spell checker do not always give the correct
response.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

© UCLES 2021 0417/11/O/N/21


16

BLANK PAGE

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.

Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of
Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge.

© UCLES 2021 0417/11/O/N/21


Cambridge IGCSE™
* 9 2 0 1 7 1 7 2 6 4 *

INFORMATION AND COMMUNICATION TECHNOLOGY 0417/12


Paper 1 Theory October/November 2021

2 hours

You must answer on the question paper.

No additional materials are needed.

INSTRUCTIONS
● Answer all questions.
● Use a black or dark blue pen.
● Write your name, centre number and candidate number in the boxes at the top of the page.
● Write your answer to each question in the space provided.
● Do not use an erasable pen or correction fluid.
● Do not write on any bar codes.
● You may use an HB pencil for any diagrams, graphs or rough working.

INFORMATION
● The total mark for this paper is 100.
● The number of marks for each question or part question is shown in brackets [ ].
● No marks will be awarded for using brand names of software packages or hardware.

This document has 16 pages. Any blank pages are indicated.

DC (CE/FC) 203094/2
© UCLES 2021 [Turn over
2

1 A computer consists of both hardware and software.

(a) Give two examples of input devices which are part of a laptop computer.

1 ................................................................................................................................................

2 ................................................................................................................................................
[2]

(b) There are two types of software: system and applications.

Give two examples of system software.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................
[2]

2 Tick (3) the most appropriate printer which relates to the following statements.

3D Dot matrix Laser


(3) (3) (3)

This printer is an impact printer

This printer uses toner

This printer uses an inked ribbon

This printer uses tomography

[4]

3 (a) Describe two disadvantages of using a tablet computer rather than a laptop computer.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................
[2]

© UCLES 2021 0417/12/O/N/21


3

(b) Modern computers often do not have an optical drive.

State two ways music can be transferred onto a computer that does not contain an optical
drive.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................
[2]

4 Write down the most appropriate network device to match the following statements. Your answers
should be different in each part.

(a) This network device checks the data packet arriving from one computer and sends the data
to a specific computer.

............................................................................................................................................. [1]

(b) This network device sends the data packet from a computer to all devices connected to it.

............................................................................................................................................. [1]

(c) This network device connects a LAN to the internet.

............................................................................................................................................. [1]

(d) This network device connects one LAN to another with the same protocol.

............................................................................................................................................. [1]

© UCLES 2021 0417/12/O/N/21 [Turn over


4

5 The Internet of Things (IoT) is a computer network which allows users to control household
devices remotely. It has many benefits, for example a user can turn on the house central heating
via a smartphone. The IoT can use WiFi and Bluetooth which can cause problems regarding data
security.

Describe the methods that could be taken to protect the user’s data.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

.................................................................................................................................................... [6]

© UCLES 2021 0417/12/O/N/21


5

6 As a student you often use a computer keyboard. This could be a virtual keyboard or a physical
keyboard on a desktop computer, a laptop computer or even a smartphone.

Evaluate your use of computer keyboards in terms of health risks, and explain any strategies you
use to minimise these health risks.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

.................................................................................................................................................... [8]

© UCLES 2021 0417/12/O/N/21 [Turn over


6

7 Rockit Motors recently created a new car sales website. The website uses internet shopping
features. Customers can ask questions of the virtual salespeople on the website, and then
purchase the car on the website.

(a) Describe two other features of internet shopping.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

(b) Discuss the benefits and drawbacks of using internet shopping for Rockit Motors.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [6]

© UCLES 2021 0417/12/O/N/21


7

(c) Before the website became operational it needed to be tested. The web designer created a
test plan including module and whole system testing.

Explain the difference between module and whole system testing.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [4]

© UCLES 2021 0417/12/O/N/21 [Turn over


8

8 You are creating a presentation on the World Games. You have created a spreadsheet showing
the number of gold, silver and bronze medals awarded to different countries.

You are planning to create a graph in the presentation showing the country, the number of gold
medals and the total number of medals.

A B C D E F
1 World Games Medals
2
3 Country Gold Silver Bronze Total
4 1 Italy 153 145 142 440
5 2 United States 142 131 109 382
6 3 Germany 137 111 138 386
7 4 Russia 137 110 72 319
8 5 France 101 102 105 308
9 6 China 68 55 27 150
10 7 Great Britain 61 89 210 360
11 8 Japan 55 38 53 146
12 9 Ukraine 47 36 125 208
13 10 Spain 42 42 42 126

Original data

(a) Explain how you would create a vertical bar chart, showing the name of the country, the
number of gold medals and the total number of medals awarded to each country, on a new
slide in the presentation.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [6]

© UCLES 2021 0417/12/O/N/21


9

(b) The total number of medals has been calculated manually and entered as a value. This could
lead to errors.

Explain how you could create a formula to calculate the total number of medals awarded for
Italy, using only the mouse.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [4]

(c) Explain how the data could be sorted by the total number of medals won by each country.
The country with the largest number of medals should be at the top of the list.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [4]

© UCLES 2021 0417/12/O/N/21 [Turn over


10

9 Identify and describe the three web development layers.

1 .......................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

2 .......................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

3 .......................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................
[6]

© UCLES 2021 0417/12/O/N/21


11

10 A school is planning to change the way it reports back to parents about their child’s academic
progress. They plan to produce a mail merged document and then email this to parents.

They have created a spreadsheet which shows the pupil’s name, target, attainment and effort
levels for Maths and the Science subjects.

Part of the spreadsheet is shown.

A B C D E F G H I J K
1 Name Target level Maths Biology Chemistry Physics
2 Attainment Effort Attainment Effort Attainment Effort Attainment Effort
3 Ahmal Wulandan 6 7 2 6 2 8 1 7 2
4 Nurul Prakoso 8 7 3 7 3 9 1 7 2
5

(a) Design a suitable document layout to display the information of one pupil. The name of the
pupil must be clearly shown separated from the rest of the data. It must have appropriate
spacing. Do not include the pupil’s data.

[6]

(b) The attainment levels range from 1 to 9 and the effort levels range from 1 to 3. Before teachers
are allowed to enter data, the spreadsheet needs to be tested.

Write down one example of extreme data to test the attainment field and one example of
abnormal data to test the effort field.

Attainment – extreme data .......................................................................................................

Effort – abnormal data ..............................................................................................................


[2]

© UCLES 2021 0417/12/O/N/21 [Turn over


12

(c) Describe four advantages of using a mail merge for this document.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................

3 ................................................................................................................................................

...................................................................................................................................................

4 ................................................................................................................................................

...................................................................................................................................................
[4]

(d) When the mail merge is created, a special field containing the date needs to be added. This
date will change automatically each time the merged document is sent or printed.

Explain how the date field can be added.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [3]

© UCLES 2021 0417/12/O/N/21


13

11 An air-conditioning system has been fitted in a hotel bedroom. The air-conditioning system will
contain fans which operate at varying speeds.

Identify the devices used in the system from the descriptions given.

(a) This device captures the temperature from the room.

............................................................................................................................................. [1]

(b) This device changes the data from the microprocessor into a form that can change the speed
of the fan.

............................................................................................................................................. [1]

(c) This output device operates the fan.

............................................................................................................................................. [1]

12 Discuss the disadvantages of policing the internet.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

.................................................................................................................................................... [6]

© UCLES 2021 0417/12/O/N/21 [Turn over


14

13 The internet has both moderated and unmoderated forums.

Explain what is meant by a moderated forum.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

.................................................................................................................................................... [4]

14 Students in Tawara College are using the internet to find information for a project. They have been
told that the college has a firewall.

(a) Explain what is meant by a firewall and why it is used.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [6]

© UCLES 2021 0417/12/O/N/21


15

The students visit different websites to get information for their project.

(b) Explain why it is not always easy for the students to find reliable information on the internet.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [4]

© UCLES 2021 0417/12/O/N/21


16

BLANK PAGE

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.

Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of
Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge.

© UCLES 2021 0417/12/O/N/21


Cambridge IGCSE™
* 5 8 2 3 9 8 9 1 4 7 *

INFORMATION AND COMMUNICATION TECHNOLOGY 0417/13


Paper 1 Theory October/November 2021

2 hours

You must answer on the question paper.

No additional materials are needed.

INSTRUCTIONS
● Answer all questions.
● Use a black or dark blue pen.
● Write your name, centre number and candidate number in the boxes at the top of the page.
● Write your answer to each question in the space provided.
● Do not use an erasable pen or correction fluid.
● Do not write on any bar codes.
● You may use an HB pencil for any diagrams, graphs or rough working.

INFORMATION
● The total mark for this paper is 100.
● The number of marks for each question or part question is shown in brackets [ ].
● No marks will be awarded for using brand names of software packages or hardware.

This document has 20 pages. Any blank pages are indicated.

DC (CE/FC) 203095/3
© UCLES 2021 [Turn over
2

1 A tablet computer has input and output devices.

(a) Give two examples of input devices which are part of a tablet computer.

1 ................................................................................................................................................

2 ................................................................................................................................................
[2]

(b) Give two examples of output devices which are part of a tablet computer.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................
[2]

2 MICR, OCR and OMR are examples of recognition systems.

Tick (3) the most appropriate recognition system which relates to the following statements.

MICR OCR OMR


(3) (3) (3)
This system magnetises the special
characters on cheques in order to read
them

This method is used to read car number


plates

A bar code is an example of this system

If the media from this system is


photocopied it cannot be read by the
recognition system
[4]

© UCLES 2021 0417/13/O/N/21


3

3 (a) Identify two applications that use expert systems.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................
[2]

(b) Identify three components found in an expert system.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................

3 ................................................................................................................................................

...................................................................................................................................................
[3]

© UCLES 2021 0417/13/O/N/21 [Turn over


4

4 A library system has two tables; one for borrowers and one for books. Extracts from these tables
are shown.

Borrower_ID Borrower_name Contact_telephone Contact_email


5404 Susan Stranks 01632 960321 rockit@cambridgeinternational.org
9867 Fei Hong Zhao 07700 900222 tawara@cambridgeinternational.org

Borrowers table

Book_ID ISBN Name_of_book Author_of_book Date_published Borrower_ID Date_due_back

1 0859550153 Bird of Prey David James 1977 5404 27/10/2021

34 3301028345 The Fifth Man Colin Turner 1998 9324 05/10/2021

35 4237681321 A View of the Temple Yu Yan Zhang 2017 8854 07/10/2021

59 4237681321 A View of the Temple Yu Yan Zhang 2017 5404 27/10/2021

Books table

(a) Name the most appropriate validation check for each of these fields. Your answer must be
different for each field.

ISBN .........................................................................................................................................

Date_due_back ........................................................................................................................
[2]

(b) (i) For the books table, name the most appropriate field that could be used as a primary
key.

..................................................................................................................................... [1]

(ii) The librarian has created a relationship between the books table and the borrowers
table.

For the books table, name the most appropriate foreign key field that would be used to
create the relationship.

..................................................................................................................................... [1]

© UCLES 2021 0417/13/O/N/21


5

(c) The data type for Contact_telephone has been set as text.

Explain why this field has been set to text rather than integer.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

(d) At the end of each day the tables are searched to issue reminders to borrowers about books
that are overdue.

Describe the automatic processing involved in searching and issuing of reminders for overdue
books.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [6]

© UCLES 2021 0417/13/O/N/21 [Turn over


6

5 Keeping data secure is very important in any computer system. Many organisations use encryption
when sending data.

(a) Describe the term encryption.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [4]

(b) Another way of protecting data in a computer system is to use passwords.

Identify methods to prevent hackers from gaining knowledge of someone’s password.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [4]

© UCLES 2021 0417/13/O/N/21


7

6 The internet has both moderated and unmoderated forums.

Explain what is meant by an unmoderated forum.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

.................................................................................................................................................... [4]

© UCLES 2021 0417/13/O/N/21 [Turn over


8

7 Many customers now use contactless payment and internet banking.

(a) Describe the computer processing involved in using contactless bank cards to pay for
purchases.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [4]

Fewer and fewer customers now use high street banks, preferring to bank online using the internet.

(b) Discuss the advantages and disadvantages of internet banking for the customer.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [6]

© UCLES 2021 0417/13/O/N/21


9

Transactions with the bank’s website use a variety of technologies including SSL.

(c) Explain what is meant by SSL. Include in your answer why SSL is used.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [3]

(d) The web address of the bank is:

https://www.tawarabank.com

Describe the following parts of the web address.

https:// .......................................................................................................................................

...................................................................................................................................................

tawarabank ...............................................................................................................................

...................................................................................................................................................

.com ..........................................................................................................................................

...................................................................................................................................................
[3]

© UCLES 2021 0417/13/O/N/21 [Turn over


10

8 When a system is being planned, analysis needs to take place.

Questionnaires and interviews are examples of methods of researching existing systems.

Evaluate, by weighing up the advantages and disadvantages, each of these methods.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

.................................................................................................................................................... [6]

9 Rockit Motors has opened a car store in a shopping mall.

Customers can test drive the cars they are planning to purchase using virtual reality systems
within the store.

(a) Name two devices which would be used in this virtual reality system.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................
[2]

© UCLES 2021 0417/13/O/N/21


11

(b) Explain the term virtual reality.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [3]

The manager of Rockit Motors has created many different types of documents including letters
and memos for the company. Each of them is produced using its corporate house style.

(c) Explain why corporate house styles are required.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [4]

© UCLES 2021 0417/13/O/N/21 [Turn over


12

10 Many young people now use social media rather than other forms of communication.

Evaluate your own use of social media and explain any eSafety strategies you could use to help
minimise the potential dangers.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

.................................................................................................................................................... [6]

11 A student has taken a photograph of him and his friend, using a digital camera. He needs to
increase the size of the image to include it on a poster.

(a) Give one disadvantage of increasing the size of this image.

...................................................................................................................................................

............................................................................................................................................. [1]

© UCLES 2021 0417/13/O/N/21


13

(b) He now wishes to edit the image to remove his friend. He edits the image by cropping it and
removing part of the image.

Describe, step by step, how he would crop the image.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [5]

© UCLES 2021 0417/13/O/N/21 [Turn over


14

12 A doctor measures the blood pressure of some of his patients regularly. The patients take home a
blood pressure machine and record their results on a spreadsheet which the doctor has created.
Part of the spreadsheet is shown.

A B C D E F G H I
1 Blood pressure readings Blood pressure warnings
2 Date Sys Dia Warning Sys Dia Warning
3 10-Feb 134 74 Normal 60 40 Low
4 11-Feb 137 67 Normal 120 80 Normal
5 12-Feb 145 81 Mild 140 90 Mild
6 13-Feb 150 86 Mild 160 100 Moderate
7 14-Feb 180 74 Severe 180 110 Severe
8 15-Feb 134 75 Normal
9 16-Feb 130 57 Normal

(a) When a reading produces a Severe or Low warning then the text automatically changes to a
red font on a light red background.

Explain how the doctor could set up automatic colour change for these warnings on the
spreadsheet.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [5]

© UCLES 2021 0417/13/O/N/21


15

The doctor has set up a named range called Bloodpressure for the cells F3 to H7.

(b) Explain why the doctor has used a named range.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [3]

The formula =VLOOKUP(B3,Bloodpressure,3) has been entered into cell D3.

(c) Explain what the formula does.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [4]

© UCLES 2021 0417/13/O/N/21 [Turn over


16

The doctor has created a graph of the readings for one patient and has displayed it on the
spreadsheet. However, there are elements missing.

A B C D E F G H I J K L M
1 Blood pressure readings Blood pressure warnings
2 Date Sys Dia Warning
Chart Title
3 10-Feb 134 74 Normal
4 11-Feb 137 67 Normal 200
180
5 12-Feb 145 81 Mild
160
6 13-Feb 150 86 Mild
140
7 14-Feb 180 74 Severe 120
8 15-Feb 134 75 Normal 100
9 16-Feb 130 67 Normal 80
10 60
11 40
20
12
0
13
09-Feb 10-Feb 11-Feb 12-Feb 13-Feb 14-Feb 15-Feb 16-Feb 17-Feb
14
Sys Dia
15
16

(d) Explain how the doctor created the graph. Write in your answer one improvement that could
be made to the graph.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [3]

© UCLES 2021 0417/13/O/N/21


17

(e) At the end of the month the doctor needs to produce a hard copy document showing
information about a patient: their name, date of birth and patient number, as well as data and
the graph from the spreadsheet.

Design a suitable document layout. The document must have appropriate spacing.

[5]

© UCLES 2021 0417/13/O/N/21


18

BLANK PAGE

© UCLES 2021 0417/13/O/N/21


19

BLANK PAGE

© UCLES 2021 0417/13/O/N/21


20

BLANK PAGE

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.

Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of
Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge.

© UCLES 2021 0417/13/O/N/21



Cambridge IGCSE

INFORMATION AND COMMUNICATION TECHNOLOGY 0417/12


*4639429146*

Paper 1 Theory February/March 2022


2 hours

You must answer on the question paper.

No additional materials are needed.

INSTRUCTIONS
• Answer all questions.
• Use a black or dark blue pen.
• Write your name, centre number and candidate number in the boxes at the top of the page.
• Write your answer to each question in the space provided.
• Do not use an erasable pen or correction fluid.
• Do not write on any bar codes.
• You may use an HB pencil for any diagrams, graphs or rough working.

INFORMATION
• The total mark for this paper is 100.
• The number of marks for each question or part question is shown in brackets [ ].
• No marks will be awarded for using brand names of software packages or hardware.

This document has 16 pages. Any blank pages are indicated.

03_0417_12_2022_1.13
© UCLES 2022 [Turn over
2

1 A tablet computer consists of both hardware and software.

(a) Define the term hardware.

...........................................................................................................................................

........................................................................................................................................... [1]

(b) One input device used on a tablet computer is a touch screen.

Name two other input devices built into a tablet computer.

1 ........................................................................................................................................

2 ........................................................................................................................................

[2]

(c) Write down two examples of system software.

1 ........................................................................................................................................

2 ........................................................................................................................................

[2]

2 Circle two items that contain personal data.

bank card bar code laser printer

medical record mouse sensor

[2]

© UCLES 2022 03_0417_12_2022_1.13


3

3 The internal memory of a computer consists of both ROM and RAM.

(a) Describe the terms ROM and RAM.

ROM .................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

RAM ..................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

[4]

(b) Modern laptop computers use Solid State Drives (SSD) rather than Hard Disk Drives (HDD).

State three advantages of using SSDs rather than HDDs in a laptop computer.

1 ........................................................................................................................................

...........................................................................................................................................

2 ........................................................................................................................................

...........................................................................................................................................

3 ........................................................................................................................................

...........................................................................................................................................

[3]

© UCLES 2022 03_0417_12_2022_1.13 [Turn over


4

4 Tick (✓) whether the following statements refer to control, measurement or modelling systems.

Only tick (✓) one answer for each statement.

control measurement modelling


(✓) (✓) (✓)
Maintaining the growing conditions in a
glasshouse

Aircraft flight simulation

Monitoring the pollution in a river

Using what-ifs

[4]

5 The World Wide Web (WWW) is often mistaken for the internet.

(a) Explain the differences between the WWW and the internet.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [4]

© UCLES 2022 03_0417_12_2022_1.13


5

(b) The web address for Cambridge IGCSE is:

https://www.cambridgeinternational.org/IGCSE

Describe the following parts of the web address.

https:// ...............................................................................................................................

...........................................................................................................................................

cambridgeinternational .....................................................................................................

...........................................................................................................................................

.org ...................................................................................................................................

...........................................................................................................................................

/IGCSE .............................................................................................................................

...........................................................................................................................................

[4]

6 Global Positioning Systems (GPS) are used for many different applications.

(a) Describe how GPS is used by a smartphone to pinpoint its location.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [4]

© UCLES 2022 03_0417_12_2022_1.13 [Turn over


6

(b) Give three other examples of the use of GPS.

1 ........................................................................................................................................

...........................................................................................................................................

2 ........................................................................................................................................

...........................................................................................................................................

3 ........................................................................................................................................

...........................................................................................................................................

[3]

© UCLES 2022 03_0417_12_2022_1.13


7

7 Tawara School is presenting a concert. For previous concerts the booking of tickets was carried
out manually using pen and paper.

For this concert they are going to use an online booking system.

(a) Discuss the advantages and disadvantages of Tawara School using an online booking system
rather than the manual system.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [8]

(b) Identify the most appropriate method of implementation of the new online booking system in
this scenario.

........................................................................................................................................... [1]

© UCLES 2022 03_0417_12_2022_1.13 [Turn over


8

(c) Explain, giving reasons, why your answer to part (b) is the most appropriate method of
implementation for this scenario.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [3]

8 Describe the advantages and disadvantages of using a smartphone rather than a laptop computer
to access the internet.

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

.................................................................................................................................................. [6]

© UCLES 2022 03_0417_12_2022_1.13


9

9 The introduction of computers into the work place has affected job patterns.

(a) Explain what is meant by part-time working.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [2]

(b) Explain what is meant by compressed hours working.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [2]

(c) Employees working in an office use computers for prolonged periods of time.

Describe three items that an employee should be provided with to help reduce the health
problems related to prolonged use of computers.

1 ........................................................................................................................................

...........................................................................................................................................

2 ........................................................................................................................................

...........................................................................................................................................

3 ........................................................................................................................................

...........................................................................................................................................

[3]

© UCLES 2022 03_0417_12_2022_1.13 [Turn over


10

(d) The office must be a safe working environment.

State two physical safety issues that might exist from the introduction of computers.

1 ........................................................................................................................................

...........................................................................................................................................

2 ........................................................................................................................................

...........................................................................................................................................

[2]

10 A touch screen is both an input device and an output device. Touch screens are used on many
devices. A tablet computer uses a touch screen.

Describe the advantages and disadvantages of using a touch screen rather than a monitor and
keyboard for the tablet computer.

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

.................................................................................................................................................. [6]

© UCLES 2022 03_0417_12_2022_1.13


11

11 When creating an ICT solution, the legal, moral, ethical and cultural implications have to be
considered.

Choose the most appropriate implication that matches the descriptions given below.

(a) Ensuring that copyright laws have been followed.

........................................................................................................................................... [1]

(b) Not giving information about the ICT solution to another company.

........................................................................................................................................... [1]

12 The manager of a car garage has asked a systems analyst to create a new database system for
the checking of cars making sure they are safe to drive. The checking of cars is known as a service.

Each car has a unique licence plate.

The cars can either be powered by electric or petrol.

Cars are serviced every 10000 km, for example 10000 km, 20000 km.

The minimum cost of the service is 1500 rupees and the maximum is 5000 rupees depending on
the model of car.

Different models of car are serviced.

The date of the service is agreed.

(a) Complete this table, filling in the field names and the most appropriate data types to create
the database using the information given above. For any numeric field, specify the type of
number.

Field name Data type

Vehicle_licence_plate

Powered_by

Numeric:integer

Cost_of_service

Text

Date_of_service

[6]

© UCLES 2022 03_0417_12_2022_1.13 [Turn over


12

(b) The systems analyst is planning to create a relational database.

Discuss the advantages and disadvantages of creating a relational database rather than a flat
file database.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [6]

© UCLES 2022 03_0417_12_2022_1.13


13

(c) For each of the fields shown, name and describe one validation check that could be used on
the data. Your answers must be different in each case.

(i) Vehicle_licence_plate

Validation check ....................................................................................................

Description ............................................................................................................

................................................................................................................................

[2]

(ii) Cost_of_service

Validation check ....................................................................................................

Description ............................................................................................................

................................................................................................................................

[2]

(iii) Date_of_service

Validation check ....................................................................................................

Description ............................................................................................................

................................................................................................................................

[2]

13 A family has a number of different devices connected to the internet.

(a) Identify three items of computer hardware that may need to be purchased in order to set up
a computer network so the devices can use the internet.

1 ........................................................................................................................................

2 ........................................................................................................................................

3 ........................................................................................................................................

[3]

© UCLES 2022 03_0417_12_2022_1.13 [Turn over


14

(b) Arjun is a member of the family. He uses the internet to carry out research and send work to
his office.

Describe three other ways he could make appropriate use of the internet.

1 ........................................................................................................................................

...........................................................................................................................................

2 ........................................................................................................................................

...........................................................................................................................................

3 ........................................................................................................................................

...........................................................................................................................................

[3]

(c) Arjun uses the internet to carry out research for his work.

Describe two drawbacks of Arjun using the internet for research.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [2]

© UCLES 2022 03_0417_12_2022_1.13


15

(d) Arjun can log directly into his office system from his home computer. The office system only
requires users to enter their user id and a password.

(i) Explain why this is not very secure.

................................................................................................................................

................................................................................................................................

................................................................................................................................

................................................................................................................................ [2]

(ii) Describe two other ways the office system could identify the user securely.

1 ............................................................................................................................

................................................................................................................................

................................................................................................................................

................................................................................................................................

2 ............................................................................................................................

................................................................................................................................

................................................................................................................................

................................................................................................................................

[4]

© UCLES 2022 03_0417_12_2022_1.13


16

BLANK PAGE

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable
effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will
be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge Assessment
International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at
www.cambridgeinternational.org after the live examination series.

Cambridge Assessment International Education is part of Cambridge Assessment. Cambridge Assessment is the brand name of the University of Cambridge Local
Examinations Syndicate (UCLES), which is a department of the University of Cambridge.

© UCLES 2022 03_0417_12_2022_1.13



Cambridge IGCSE

INFORMATION AND COMMUNICATION TECHNOLOGY 0417/11


*6189791534*

Paper 1 Theory May/June 2022


2 hours

You must answer on the question paper.

No additional materials are needed.

INSTRUCTIONS
• Answer all questions.
• Use a black or dark blue pen.
• Write your name, centre number and candidate number in the boxes at the top of the page.
• Write your answer to each question in the space provided.
• Do not use an erasable pen or correction fluid.
• Do not write on any bar codes.
• You may use an HB pencil for any diagrams, graphs or rough working.

INFORMATION
• The total mark for this paper is 100.
• The number of marks for each question or part question is shown in brackets [ ].
• No marks will be awarded for using brand names of software packages or hardware.

This document has 16 pages. Any blank pages are indicated.

06_0417_11_2022_1.16
© UCLES 2022 [Turn over
2

1 Circle two network devices.

Actuator Bridge Database DVD

Hub Linker Monitor Printer

[2]

2 Complete each sentence using the most appropriate item from the list. Your answers must be
different in each case.

ADC an applet hardware HDD


a router a sensor software SSD

(a) The physical components of a computer are called

........................................................................................................................................... [1]

(b) Programs and data are examples of

........................................................................................................................................... [1]

(c) A small application performing one or two simple functions is called

........................................................................................................................................... [1]

(d) An input device used in measurement applications is called

........................................................................................................................................... [1]

3 Identify two devices which are used in control systems.

1 ...............................................................................................................................................

2 ...............................................................................................................................................

[2]

© UCLES 2022 06_0417_11_2022_1.16


3

4 Many laptop computers use the cloud to store data. A technician has produced a report on his
laptop computer but has stored the report on a memory stick rather than storing it on the cloud.

Describe two advantages of using a memory stick rather than the cloud to store data.

1 ...............................................................................................................................................

..................................................................................................................................................

2 ...............................................................................................................................................

..................................................................................................................................................

[2]

5 Many bank cards now use contactless technology.

Describe the advantages and disadvantages of using these cards rather than cards that use chip
and PIN.

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

.................................................................................................................................................. [4]

© UCLES 2022 06_0417_11_2022_1.16 [Turn over


4

6 Stylesheets are used in web pages.

(a) Explain the term stylesheets when used in web pages.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [2]

(b) Explain the differences between attached stylesheets and inline style attributes.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [4]

© UCLES 2022 06_0417_11_2022_1.16


5

7 Two types of database are relational and flat file.

(a) Compare and contrast relational databases and flat file databases. Your answer must include
similarities and differences.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [8]

(b) Give, using an example, one reason why flat file databases are used in certain applications
rather than relational databases.

Reason .............................................................................................................................

...........................................................................................................................................

Example ............................................................................................................................

...........................................................................................................................................

[2]

© UCLES 2022 06_0417_11_2022_1.16 [Turn over


6

8 When using computers people can suffer from Repetitive Strain Injury (RSI).

(a) Describe the term RSI. Include in your answer the causes of RSI.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [3]

(b) Identify three methods of reducing the effects of RSI.

1 ........................................................................................................................................

...........................................................................................................................................

2 ........................................................................................................................................

...........................................................................................................................................

3 ........................................................................................................................................

...........................................................................................................................................

[3]

9 Martin, who is a teacher, is creating a multimedia presentation to explain a topic to his students.

(a) He produces a master slide.

Write down four objects he could include in the master slide.

1 ........................................................................................................................................

2 ........................................................................................................................................

3 ........................................................................................................................................

4 ........................................................................................................................................

[4]

© UCLES 2022 06_0417_11_2022_1.16


7

(b) Martin wants to record a message for his students. His voice will be added to the presentation.
He will also need to listen to his voice to make sure the sound is of good quality.

Name two devices that he will need.

1 ........................................................................................................................................

2 ........................................................................................................................................

[2]

(c) Martin will need to use software to create different types of content before including them in
the presentation.

Name two types of software that he might use and for each one, write down what he would
use it for.

Software 1 ........................................................................................................................

...........................................................................................................................................

Use ...................................................................................................................................

...........................................................................................................................................

Software 2 ........................................................................................................................

...........................................................................................................................................

Use ...................................................................................................................................

...........................................................................................................................................

[4]

© UCLES 2022 06_0417_11_2022_1.16 [Turn over


8

10 A river authority is concerned about levels of pollution in a major river. The quality of the water in
the river needs to be monitored using sensors.

(a) Name three sensors that could be used to measure the pollution in the river.

1 ........................................................................................................................................

2 ........................................................................................................................................

3 ........................................................................................................................................

[3]

(b) Discuss the advantages and disadvantages of using computers to measure the pollution in
the river rather than humans measuring the pollution.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [6]

© UCLES 2022 06_0417_11_2022_1.16


9

11 A system can be analysed using different methods.

Discuss the advantages and disadvantages of analysing a system by interviewing staff rather than
using questionnaires.

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

.................................................................................................................................................. [6]

© UCLES 2022 06_0417_11_2022_1.16 [Turn over


10

12 Many company computer network systems use WiFi as a communication system to help prevent
the issue of tripping over trailing cables.

(a) For each of the following physical safety issues describe two ways of helping to prevent them.

(i) Fire

Prevention 1 ..........................................................................................................

................................................................................................................................

Prevention 2 ..........................................................................................................

................................................................................................................................

[2]

(ii) Electrocution

Prevention 1 ..........................................................................................................

................................................................................................................................

Prevention 2 ..........................................................................................................

................................................................................................................................

[2]

A common use of home computers is online gaming.

(b) Describe three eSafety measures which should be taken when playing games on the internet.

1 ........................................................................................................................................

...........................................................................................................................................

2 ........................................................................................................................................

...........................................................................................................................................

3 ........................................................................................................................................

...........................................................................................................................................

[3]

© UCLES 2022 06_0417_11_2022_1.16


11

(c) In order to log onto online gaming a user ID and password is needed.

Explain what is meant by a user ID and password and why they are needed.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [4]

© UCLES 2022 06_0417_11_2022_1.16 [Turn over


12

13 (a) Explain the need for copyright legislation when data is published on the internet.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [4]

(b) Describe methods that software producers use to prevent software copyright being broken.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [4]

© UCLES 2022 06_0417_11_2022_1.16


13

(c) Emails are used by people to communicate with each other. Copyright and using acceptable
language in the email are two of the constraints that affect the use of email.

(i) Describe four other constraints that may affect the use of email.

1 ............................................................................................................................

................................................................................................................................

2 ............................................................................................................................

................................................................................................................................

3 ............................................................................................................................

................................................................................................................................

4 ............................................................................................................................

................................................................................................................................

[4]

(ii) Describe two rules of the use of acceptable language in emails.

1 ............................................................................................................................

................................................................................................................................

2 ............................................................................................................................

................................................................................................................................

[2]

© UCLES 2022 06_0417_11_2022_1.16 [Turn over


14

14 The manager of a medical centre keeps the doctor’s stock records in a database. The stock for
any item is not allowed to fall below 15 items and the manager keeps a maximum of 100 items in
stock.

The table shows examples of the stock.

Name_of_item Serial_number Number_in_stock Name_of_supplier Shelf_number

Medihoney 3081043612211 15 Capimed 0126

Sodium fusidate 1437210227870 60 Brooks Medical 0112

Crepe bandage 2541233164353 100 Capimed 0064

Crepe bandage 2834954736849 89 Cams Meds 0064

As data is entered it needs to be verified and validated.

(a) Explain why verification is carried out.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [2]

(b) Write down the field name from the table that would be the most appropriate for each of these
validation checks. Each answer must be different.

Check digit ........................................................................................................................

Length ...............................................................................................................................

Type ..................................................................................................................................

[3]

(c) Name the most appropriate field from the table that could be used as a primary key in the
database.

........................................................................................................................................... [1]

© UCLES 2022 06_0417_11_2022_1.16


15

15 A customer is booking a seat on a theatre’s online booking system. The customer reserves seats
using the theatre’s website and a debit card. The website displays the seats that are available and
a database stores the customer details, the payment details and the seat details.

When the customer enters their debit card details for a seat, the theatre’s computer communicates
with the bank’s computer.

(a) Describe four checks that the bank’s computer will make on the customer’s bank account.

1 ........................................................................................................................................

...........................................................................................................................................

2 ........................................................................................................................................

...........................................................................................................................................

3 ........................................................................................................................................

...........................................................................................................................................

4 ........................................................................................................................................

...........................................................................................................................................

[4]

(b) Describe the processing carried out by the theatre’s computer when making a booking.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [4]

© UCLES 2022 06_0417_11_2022_1.16


16

BLANK PAGE

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable
effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will
be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge Assessment
International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at
www.cambridgeinternational.org after the live examination series.

Cambridge Assessment International Education is part of Cambridge Assessment. Cambridge Assessment is the brand name of the University of Cambridge Local
Examinations Syndicate (UCLES), which is a department of the University of Cambridge.

© UCLES 2022 06_0417_11_2022_1.16



Cambridge IGCSE

INFORMATION AND COMMUNICATION TECHNOLOGY 0417/12


*8667658371*

Paper 1 Theory May/June 2022


2 hours

You must answer on the question paper.

No additional materials are needed.

INSTRUCTIONS
• Answer all questions.
• Use a black or dark blue pen.
• Write your name, centre number and candidate number in the boxes at the top of the page.
• Write your answer to each question in the space provided.
• Do not use an erasable pen or correction fluid.
• Do not write on any bar codes.
• You may use an HB pencil for any diagrams, graphs or rough working.

INFORMATION
• The total mark for this paper is 100.
• The number of marks for each question or part question is shown in brackets [ ].
• No marks will be awarded for using brand names of software packages or hardware.

This document has 16 pages.

06_0417_12_2022_1.15
© UCLES 2022 [Turn over
2

1 Circle two input devices.


Digital
3D printer Actuator CD ROM
camera

Keyboard Linker Monitor Speaker

[2]

2 A computer-controlled glasshouse is used to grow plants.

Identify two output devices used in this glasshouse.

1 ...............................................................................................................................................

2 ...............................................................................................................................................

[2]

3 Network devices are used in computer systems.

Complete each sentence by identifying the most appropriate network device.

(a) The network device that is used to transmit the data along an analogue telephone line is a

........................................................................................................................................... [1]

(b) The network device that connects a LAN to a WAN is a

........................................................................................................................................... [1]

(c) The network device that allows data to be directed to a specific computer on a LAN is a

........................................................................................................................................... [1]

(d) The internal network device that allows a computer to connect to a LAN is a

........................................................................................................................................... [1]

© UCLES 2022 06_0417_12_2022_1.15


3

4 Many word processing packages have a number of formatting features.

The paragraph below shows some of the formatting features that can be used.

(a) Write down four of the formatting features that have been used in the paragraph shown.

1 ........................................................................................................................................

2 ........................................................................................................................................

3 ........................................................................................................................................

4 ........................................................................................................................................

[4]

© UCLES 2022 06_0417_12_2022_1.15 [Turn over


4

(b) The logo for the Summer Steam Festival is shown and labelled A. The organisers of the event
are planning to create a second logo for all their correspondence. This is shown and labelled B.

Summer
Steam Festival Summer
2022 Steam Festival
2022

A B

Describe the steps that have been used to transform logo A into logo B.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [4]

© UCLES 2022 06_0417_12_2022_1.15


5

5 A library is considering the way it issues books. The librarians are planning to use RFID rather than
bar codes.

Describe the advantages of using RFID rather than bar codes.

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

.................................................................................................................................................. [4]

6 Laptop computers use Solid State Drives (SSD) rather than Hard Disc Drives (HDD).

Describe two disadvantages of using an SSD rather than an HDD in a laptop computer.

1 ...............................................................................................................................................

..................................................................................................................................................

2 ...............................................................................................................................................

..................................................................................................................................................

[2]

© UCLES 2022 06_0417_12_2022_1.15 [Turn over


6

7 A patient has an injury and the doctor treating him needs to find out information about the patient.
Most of the data he needs to collect is personal data.

The data collected is protected by data protection legislation. Most data protection acts include the
principle that data should be kept confidential and secure.

(a) List four other principles of a typical data protection act.

1 ........................................................................................................................................

...........................................................................................................................................

2 ........................................................................................................................................

...........................................................................................................................................

3 ........................................................................................................................................

...........................................................................................................................................

4 ........................................................................................................................................

...........................................................................................................................................

[4]

(b) Explain what is meant by personal data. Include two examples of personal data in your answer.

Explanation .......................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

Example 1 .........................................................................................................................

...........................................................................................................................................

Example 2 .........................................................................................................................

...........................................................................................................................................

[3]

© UCLES 2022 06_0417_12_2022_1.15


7

(c) Explain why personal data should be kept confidential and secure.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [4]

8 Uniform Resource Locators (URL) are used to locate websites and resources. A teacher needs to
find a teaching guide from Cambridge Assessment International Education. To download the
teaching guide she types in:

(a) Write down only the part of the URL which shows the file name of the teaching guide.

........................................................................................................................................... [1]

(b) Write down only the part of the URL which is the folder where the teaching guide is stored.

........................................................................................................................................... [1]

(c) Write down only the part of the URL which is the domain name.

........................................................................................................................................... [1]

(d) Explain what is meant by https.

...........................................................................................................................................

........................................................................................................................................... [1]

© UCLES 2022 06_0417_12_2022_1.15 [Turn over


8

9 A student is creating a spreadsheet of airports for a project.

The formula in G2 is:

=VLOOKUP(F2,A2:B9,2,0)

(a) Explain, in detail, what the formula in G2 does.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [4]

(b) Before the spreadsheet can be used, data needs to be entered to test the spreadsheet.

There are three types of test data: normal, abnormal and extreme.

Explain what is meant by these three types of test data.

Normal ..............................................................................................................................

...........................................................................................................................................

Abnormal ..........................................................................................................................

...........................................................................................................................................

Extreme ............................................................................................................................

...........................................................................................................................................

[3]

© UCLES 2022 06_0417_12_2022_1.15


9

(c) Explain, using examples, the differences between a function and a formula.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [6]

(d) The completed file could have been created using a database.

Describe two reasons why databases are used in certain applications rather than spreadsheets.

1 ........................................................................................................................................

...........................................................................................................................................

2 ........................................................................................................................................

...........................................................................................................................................

[2]

© UCLES 2022 06_0417_12_2022_1.15 [Turn over


10

10 The prolonged use of computers can cause several health problems particularly when sitting down
and using monitors.

Discuss the strategies that you have developed to minimise health risks which only relate to sitting
down and using a monitor.

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

.................................................................................................................................................. [8]

© UCLES 2022 06_0417_12_2022_1.15


11

11 A car manufacturing company uses computer-controlled robots to manufacture its cars.

Discuss the advantages and disadvantages to the company of using computer-controlled robots
rather than using humans to manufacture the cars.

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

.................................................................................................................................................. [6]

© UCLES 2022 06_0417_12_2022_1.15 [Turn over


12

12 Different methods can be used to analyse a system.

Discuss the benefits and drawbacks of analysing a system by observing staff rather than looking
at the current systems documentation.

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

.................................................................................................................................................. [6]

13 A librarian in a college department library is entering data into a student borrowers’ file. As the data
is entered it needs to be verified.

(a) Describe the two types of verification.

1 ........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

2 ........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

[4]

© UCLES 2022 06_0417_12_2022_1.15


13

(b) Explain, using examples, why it is necessary to carry out validation as well as verification for
this system.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [4]

© UCLES 2022 06_0417_12_2022_1.15 [Turn over


14

14 Spam is associated with ICT systems.

(a) Explain what is meant by the term spam.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [2]

(b) Describe the ways that a user can recognise spam and methods to help prevent it.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [6]

© UCLES 2022 06_0417_12_2022_1.15


15

15 (a) Explain what is meant by cloud storage and how it is used.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [6]

(b) Describe two issues related to the security of data in the cloud.

1 ........................................................................................................................................

...........................................................................................................................................

2 ........................................................................................................................................

...........................................................................................................................................

[2]

© UCLES 2022 06_0417_12_2022_1.15 [Turn over


16

16 A company uses corporate house style within the headers and footers in its documents.

(a) Explain what is meant by corporate house style.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [2]

(b) Explain why headers and footers are needed.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [2]

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable
effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will
be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge Assessment
International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at
www.cambridgeinternational.org after the live examination series.

Cambridge Assessment International Education is part of Cambridge Assessment. Cambridge Assessment is the brand name of the University of Cambridge Local
Examinations Syndicate (UCLES), which is a department of the University of Cambridge.

© UCLES 2022 06_0417_12_2022_1.15



Cambridge IGCSE

INFORMATION AND COMMUNICATION TECHNOLOGY 0417/13


*2949337011*

Paper 1 Theory May/June 2022


2 hours

You must answer on the question paper.

No additional materials are needed.

INSTRUCTIONS
• Answer all questions.
• Use a black or dark blue pen.
• Write your name, centre number and candidate number in the boxes at the top of the page.
• Write your answer to each question in the space provided.
• Do not use an erasable pen or correction fluid.
• Do not write on any bar codes.
• You may use an HB pencil for any diagrams, graphs or rough working.

INFORMATION
• The total mark for this paper is 100.
• The number of marks for each question or part question is shown in brackets [ ].
• No marks will be awarded for using brand names of software packages or hardware.

This document has 16 pages. Any blank pages are indicated.

06_0417_13_2022_1.12
© UCLES 2022 [Turn over
2

1 Circle two storage devices.

Digital DVD RAM


Bridge Linker
camera Drive

Memory
Mouse Printer Spreadsheet
stick

[2]

2 Name an appropriate validation routine for each statement. Each answer must be different.

(a) The last digit in a code used to ensure the other digits have been entered correctly.

........................................................................................................................................... [1]

(b) This validation routine ensures a password is always 8 characters.

........................................................................................................................................... [1]

(c) This validation routine ensures data has been entered into a field.

........................................................................................................................................... [1]

(d) This validation routine ensures that a date is entered as DD/MM/YYYY.

........................................................................................................................................... [1]

3 Identify two input devices which are used in computer control systems.

1 ...............................................................................................................................................

2 ...............................................................................................................................................

[2]

© UCLES 2022 06_0417_13_2022_1.12


3

4 Computers can store data in the cloud rather than using storage devices in the computer.

(a) Describe three benefits of storing data in the cloud.

1 ........................................................................................................................................

...........................................................................................................................................

2 ........................................................................................................................................

...........................................................................................................................................

3 ........................................................................................................................................

...........................................................................................................................................

[3]

(b) Describe three drawbacks of storing data in the cloud.

1 ........................................................................................................................................

...........................................................................................................................................

2 ........................................................................................................................................

...........................................................................................................................................

3 ........................................................................................................................................

...........................................................................................................................................

[3]

5 The manager of a cinema has purchased a new booking system. There are 26 rows in the cinema
with 20 seats on a row. Each seat is identified by a unique ID. The seat ID consists of the row letter
followed by the position of the seat on the row. An example of the seat on row F position 12 would
be F12.

He is setting up a test plan to test the system.

(a) Write down one example of each of the following types of test data. The answers must be
different in each case.

Normal ..............................................................................................................................

Abnormal ..........................................................................................................................

[2]

© UCLES 2022 06_0417_13_2022_1.12 [Turn over


4

(b) When a ticket is produced for the new system it contains a QR code.

Here is an example of a QR code.

Describe the benefits of using a QR code.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [5]

© UCLES 2022 06_0417_13_2022_1.12


5

(c) Discuss the advantages and disadvantages of using manual booking systems rather than
online booking systems.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [8]

© UCLES 2022 06_0417_13_2022_1.12 [Turn over


6

6 Eye strain is one of the health issues associated with using computers.

(a) Explain three causes of eye strain when using computers.

1 ........................................................................................................................................

...........................................................................................................................................

2 ........................................................................................................................................

...........................................................................................................................................

3 ........................................................................................................................................

...........................................................................................................................................

[3]

(b) Identify four methods of reducing the effects of eye strain.

1 ........................................................................................................................................

...........................................................................................................................................

2 ........................................................................................................................................

...........................................................................................................................................

3 ........................................................................................................................................

...........................................................................................................................................

4 ........................................................................................................................................

...........................................................................................................................................

[4]

© UCLES 2022 06_0417_13_2022_1.12


7

7 Tawara Stores has realised that the number of people shopping for food online has increased over
the past few years.

(a) Discuss the advantages and disadvantages to the customer of shopping for food online.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [8]

© UCLES 2022 06_0417_13_2022_1.12 [Turn over


8

(b) Tawara Stores are also aware that many current websites do not cater for older people. They
intend to create a version of their website for this audience.

Describe the features of this website to meet the needs of an older audience, giving reasons
for your choice of features.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [4]

8 Tawara Hotel uses magnetic stripe cards to allow guests access to their bedrooms. The hotel is
changing the electronic lock it uses on its bedroom doors so the lock can work with RFID cards.

Compare the use of magnetic stripe cards and RFID cards for key entry. Your answer must include
similarities and differences.

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

.................................................................................................................................................. [6]

© UCLES 2022 06_0417_13_2022_1.12


9

9 The Internet of Things (IoT) allows devices as well as computers to connect to the internet using
a router. Each device uses an IP address.

(a) Explain what is meant by an IP address.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [3]

(b) Explain how a router sends data packets to another network.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [3]

(c) The network has a firewall.

Explain why a firewall is needed.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [4]

© UCLES 2022 06_0417_13_2022_1.12 [Turn over


10

10 Both the internet and the intranet are used for communication.

(a) Define the terms internet and intranet.

(i) Internet

................................................................................................................................

................................................................................................................................

................................................................................................................................

................................................................................................................................ [2]

(ii) Intranet

................................................................................................................................

................................................................................................................................

................................................................................................................................

................................................................................................................................ [2]

(b) The World Wide Web is part of the internet.

Explain why the World Wide Web has become so popular.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [6]

© UCLES 2022 06_0417_13_2022_1.12


11

11 An image has been taken of a bird watcher and a bird. The original image has been saved as a
jpg file type. You have been asked to remove parts of the image to just show the bird and to save
it as a png file type to become the new image.

Original image

New image

(a) Explain the steps needed to change the original image to the new image.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [4]

© UCLES 2022 06_0417_13_2022_1.12 [Turn over


12

(b) Explain the differences between a jpg and a png file type.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [4]

12 The protection of personal data is important as many transactions are carried out online.

(a) Explain how to avoid inappropriate disclosure of personal data.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [4]

© UCLES 2022 06_0417_13_2022_1.12


13

(b) Controlling the freedom of speech is part of policing the internet.

Discuss whether the internet should be policed or not.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [4]

13 In a college library if a book is not available students can reserve the book. When the book becomes
available the librarian needs to inform the student. He does this by typing a letter and printing it.
He has a database of students and has decided that in future he will use mail merge to produce
the letters.

Give four advantages of using mail merge instead of typing out the letter each time.

1 ...............................................................................................................................................

..................................................................................................................................................

2 ...............................................................................................................................................

..................................................................................................................................................

3 ...............................................................................................................................................

..................................................................................................................................................

4 ...............................................................................................................................................

..................................................................................................................................................

[4]

© UCLES 2022 06_0417_13_2022_1.12 [Turn over


14

14 People can manage their banking transactions using the internet. However, if the internet signal is
poor telephone banking can be used.

A person wishes to use telephone banking without speaking to an operator to transfer money from
one bank account to another.

Describe the steps needed to do this.

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

.................................................................................................................................................. [6]

© UCLES 2022 06_0417_13_2022_1.12


15

BLANK PAGE

© UCLES 2022 06_0417_13_2022_1.12


16

BLANK PAGE

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable
effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will
be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge Assessment
International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at
www.cambridgeinternational.org after the live examination series.

Cambridge Assessment International Education is part of Cambridge Assessment. Cambridge Assessment is the brand name of the University of Cambridge Local
Examinations Syndicate (UCLES), which is a department of the University of Cambridge.

© UCLES 2022 06_0417_13_2022_1.12

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy