0% found this document useful (0 votes)
3 views

Computer Science 12 Ques Papers

Uploaded by

prishag001
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
3 views

Computer Science 12 Ques Papers

Uploaded by

prishag001
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 176

Cambridge International Examinations

Cambridge International General Certificate of Secondary Education


* 7 5 9 9 8 9 5 9 8 4 *

COMPUTER SCIENCE 0478/12


Paper 1 Theory February/March 2018
1 hour 45 minutes
Candidates answer on the Question Paper.
No Additional Materials are required.
No calculators allowed.

READ THESE INSTRUCTIONS FIRST

Write your Centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.

Answer all questions.


No marks will be awarded for using brand names of software packages or hardware.

At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.

The maximum number of marks is 75.

This syllabus is approved for use in England, Wales and Northern Ireland as a Cambridge International Level 1/Level 2 Certificate.

This document consists of 12 printed pages.

DC (LK/CGW) 161583/3 R
© UCLES 2018 [Turn over
2

1 Some types of software can be described as free software or freeware.

Draw lines to link each description to a correct type of software. A description can be linked to
more than one type of software.

Description Type of software

Free to download

Free software

Code can be
modified and
redistributed

Freeware

Subject to copyright
legislation

[2]

2 David has installed anti-virus software on his computer.

(a) State three tasks carried out by anti-virus software.

Task 1 .......................................................................................................................................

...................................................................................................................................................

Task 2 .......................................................................................................................................

...................................................................................................................................................

Task 3 .......................................................................................................................................

...................................................................................................................................................
[3]

© UCLES 2018 0478/12/F/M/18


3

(b) David is still concerned that his computer might get infected by a computer virus.

State three other ways in which David can reduce the risk of his computer getting a computer
virus.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................

3 ................................................................................................................................................

...................................................................................................................................................
[3]

3 Parity checks can be used to check for errors during data transmission.

One of the bytes has been transmitted incorrectly.

Byte 1 Byte 2 Byte 3 Byte 4


10110011 10101000 10110100 10110101

(a) State which byte was incorrectly transmitted.

...............................................................................................................................................[1]

(b) Explain how you identified the incorrectly transmitted byte.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[3]

© UCLES 2018 0478/12/F/M/18 [Turn over


4

4 An air conditioning system is used to control the temperature in a hospital.

The air conditioning system uses temperature sensors and a microprocessor.

The temperature must remain between 21 °C and 24 °C.

Describe how the sensors and the microprocessor are used to control the temperature of the
hospital.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[6]

5 The IP address of a computer is stored as a set of four 8-bit binary numbers.

The network administrator converts each binary number into hexadecimal.

(a) Complete the table to show the hexadecimal equivalent of the binary IP address.
The first number has already been converted.

Binary IP address
11000100 00010000 11111110 00001001

Hexadecimal
C4
[3]

(b) Explain why the network administrator uses hexadecimal.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[2]

© UCLES 2018 0478/12/F/M/18


5

6 Primary, secondary and off-line are types of storage.

Give an example of each type of storage.

For each example state how it is used.

Primary storage

Example ...........................................................................................................................................

Use ...................................................................................................................................................

..........................................................................................................................................................

Secondary storage

Example ...........................................................................................................................................

Use ...................................................................................................................................................

..........................................................................................................................................................

Off-line storage

Example ...........................................................................................................................................

Use ...................................................................................................................................................

..........................................................................................................................................................
[6]

© UCLES 2018 0478/12/F/M/18 [Turn over


6

7 (a) For this logic circuit:

X
B

Complete the truth table.

Working space
A B C X

0 0 0

0 0 1

0 1 0

0 1 1

1 0 0

1 0 1

1 1 0

1 1 1

[4]

© UCLES 2018 0478/12/F/M/18


7

(b) For this logic statement:

X = 1 if (B is 1 OR C is NOT 1) AND ((A is NOT 1) AND (B is 1 OR C is 1))

Draw a logic circuit.

B X

[6]

(c) Complete the truth table for the logic statement given in part (b).

Working space
A B C X

0 0 0

0 0 1

0 1 0

0 1 1

1 0 0

1 0 1

1 1 0

1 1 1

[4]

© UCLES 2018 0478/12/F/M/18 [Turn over


8

8 (a) Three descriptions and two methods of data transmission are given.

Tick () the correct box to show the Method of data transmission for each description.

Description Method
Serial Parallel
Multiple bits are sent
and received at the
same time.
Bits are sent one
at a time in a single
direction.
Bits are sent using a
single wire. Data can
be sent or received, but
not at the same time.
[3]

(b) Three descriptions and three types of data transmission are given.

Tick () the correct box to show the Type of data transmission for each description.

Description Type
Simplex Half-duplex Duplex
Multiple bits are sent
and received at the
same time.
Bits are sent one
at a time in a single
direction.
Bits are sent using a
single wire. Data can
be sent or received, but
not at the same time.
[3]

© UCLES 2018 0478/12/F/M/18


9

9 A 32-second sound clip will be recorded. The sound will be sampled 16000 times a second.

Each sample will be stored using 8 bits.

Calculate the file size in kilobytes. You must show all of your working.

File Size ..................................................................................................... kB


[3]

10 The table shows a segment of primary memory from a Von Neumann model computer.

Address Contents
10001 11001101
10010 11110001
10011 10101111
10100 10000110
10101 00011001
10110 10101100

The program counter contains the data 10010.

(a) (i) State the data that will be placed in the memory address register (MAR).

.......................................................................................................................................[1]

(ii) State the data that will be placed in the memory data register (MDR).

.......................................................................................................................................[1]

© UCLES 2018 0478/12/F/M/18 [Turn over


10

(b) Describe the stored program concept when applied to the Von Neumann model.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[4]

11 Miriam needs to use a large high-resolution photo as a thumbnail image on a website.

She will use lossy compression to reduce the file size of the photo to create the thumbnail image.

(a) State why a smaller file size is appropriate for this situation.

...................................................................................................................................................

...............................................................................................................................................[1]

(b) Explain how lossy compression reduces the file size.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[4]

© UCLES 2018 0478/12/F/M/18


11

12 A hospital stores the results of medical tests on a computer system. Each patient is given a
wristband containing a unique barcode. The barcode is used every time the patient has a medical
test.

(a) Explain two benefits of using barcodes in this situation.

Benefit 1 ...................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

Benefit 2 ...................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[4]

(b) Describe how the barcode is read.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[4]

© UCLES 2018 0478/12/F/M/18 [Turn over


12

13 State four functions of an operating system.

Function 1 ........................................................................................................................................

..........................................................................................................................................................

Function 2 ........................................................................................................................................

..........................................................................................................................................................

Function 3 ........................................................................................................................................

..........................................................................................................................................................

Function 4 ........................................................................................................................................

..........................................................................................................................................................
[4]

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.

Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.

© UCLES 2018 0478/12/F/M/18


Cambridge Assessment International Education
Cambridge International General Certificate of Secondary Education
* 6 6 7 7 5 3 2 7 6 4 *

COMPUTER SCIENCE 0478/12


Paper 1 Theory February/March 2019
1 hour 45 minutes
Candidates answer on the Question Paper.
No Additional Materials are required.
No calculators allowed.

READ THESE INSTRUCTIONS FIRST

Write your centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.

Answer all questions.


No marks will be awarded for using brand names of software packages or hardware.

Any businesses described in this paper are entirely fictitious.

At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.

The maximum number of marks is 75.

This syllabus is regulated for use in England, Wales and Northern Ireland as a Cambridge International Level 1/Level 2 Certificate.

This document consists of 11 printed pages and 1 blank page.

DC (KN/FC) 168931/3
© UCLES 2019 [Turn over
2

1 (a) Elle has a file stored on her computer that is 20 MB in size. Jordan has a file that is 10 GB in
size.

Tick (3) to show which is the larger file.

Tick
File size
(3)
20 MB

10 GB
[1]

(b) Bob has a file stored on his computer that is 3500 kB in size. Gerty has a file that is 3 MB in
size.

Tick (3) to show which is the larger file.

Tick
File size
(3)
3500 kB

3 MB
[1]

2 Many computer systems have an input device and an output device.

(a) (i) State what is meant by an input device.

...........................................................................................................................................

..................................................................................................................................... [1]

(ii) Give an example of an input device.

..................................................................................................................................... [1]

(b) (i) State what is meant by an output device.

...........................................................................................................................................

..................................................................................................................................... [1]

(ii) Give an example of an output device.

..................................................................................................................................... [1]

© UCLES 2019 0478/12/F/M/19


3

3 (a) A long distance running race uses an electronic counter that counts each competitor who
finishes the race.

The count is stored as binary in a 12-bit register.

A denary value of the count is displayed on a screen above the finish line.

(i) The screen currently displays:

0 0 3 9

State the binary value that is currently stored to display the count shown.

...........................................................................................................................................

..................................................................................................................................... [2]

(ii) More competitors cross the finish line and the screen now displays:

0 3 5 0

State the binary value that is currently stored to display the count shown.

...........................................................................................................................................

..................................................................................................................................... [2]

(iii) At the end of the race the binary value stored is:

011011000111
Give the denary value that would be displayed on the screen at the end of the race.

Show your working.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

Screen display:

[2]

© UCLES 2019 0478/12/F/M/19 [Turn over


4

(b) Sensors are used at the finish line to identify the number of competitors who finish the race.

(i) Identify two different sensors that could be used to identify the number of competitors.

Sensor 1 .............................................................................................................................

Sensor 2 .............................................................................................................................
[2]

(ii) The sensors are used with a microprocessor to count how many competitors finish the
race.

Explain how the sensor and the microprocessor are used.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [6]

© UCLES 2019 0478/12/F/M/19


5

4 Darius is writing a computer program that allows binary values to be calculated.

Darius chooses to write the program in a high-level language rather than a low-level language.

(a) Explain why Darius chooses to write the program in a high-level language.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

(b) Darius will use a translator to translate the program. He could use a compiler or an interpreter.

Five statements are given about compilers and interpreters.

Tick (3) to show if the statement applies to a Compiler or an Interpreter. Statements may
apply to both.

Compiler Interpreter
Statement
(3) (3)

A report of errors is produced at the end of translation.

The program is translated one line at a time.

The program is translated from high-level language into


machine code.

An executable file is produced.

The program will not run at all if an error is detected.

[5]

© UCLES 2019 0478/12/F/M/19 [Turn over


6

Darius is sending several programs that he has created to his friend Selma.

(c) He wants to compress the files to send them as he needs to attach them to an email.

Darius tells Selma he is going to use lossy compression. Selma tells him that he should use
lossless instead.

Explain why Selma tells Darius to use lossless compression instead of lossy.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [4]

(d) Errors can occur when data is transmitted, stored or entered into a system.

Darius could use an error detection method to find whether errors have occurred.

One error detection method he could use is a checksum.

(i) Describe how a checksum detects errors.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [5]

© UCLES 2019 0478/12/F/M/19


7

(ii) State three other error detection methods that Darius could use.

Method 1 ............................................................................................................................

Method 2 ............................................................................................................................

Method 3 ............................................................................................................................
[3]

© UCLES 2019 0478/12/F/M/19 [Turn over


8

5 Consider the following logic statement:

X = 1 if ((A is 1 NAND C is 1) NOR A is NOT 1) OR (B is 1 AND C is NOT 1)

(a) Draw a logic circuit that represents the given logic statement. Your logic gates must have a
maximum of two inputs. Do not simplify the logic statement.

B X

[6]

(b) Complete the truth table for the given logic statement.

Working space
A B C X

0 0 0

0 0 1

0 1 0

0 1 1

1 0 0

1 0 1

1 1 0

1 1 1
[4]

© UCLES 2019 0478/12/F/M/19


9

6 Nadia purchases a printer to print out her homework.

She connects the printer to her computer using USB.

(a) Explain what is meant by USB.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [3]

(b) Nadia’s printer uses powdered toner rather than liquid ink.

(i) State the type of printer Nadia has purchased.

..................................................................................................................................... [1]

(ii) Give two benefits of using this type of printer.

Benefit 1 .............................................................................................................................

...........................................................................................................................................

Benefit 2 .............................................................................................................................

...........................................................................................................................................
[2]

(iii) Give one drawback of using this type of printer.

Drawback 1 ........................................................................................................................

..................................................................................................................................... [1]

© UCLES 2019 0478/12/F/M/19 [Turn over


10

(c) Nadia uses several types of computer storage for her homework and other projects.

(i) Five examples of computer storage are given.

Tick (3) to show if the computer storage is Primary, Secondary or Off-line.

Primary Secondary Off-line


Storage example
(3) (3) (3)

Solid state drive (SSD)

Blu-ray disc

USB flash memory

Random access memory (RAM)

Read only memory (ROM)

[5]

(ii) Nadia is considering purchasing a magnetic storage device.

Describe how a magnetic storage device stores data.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [6]

© UCLES 2019 0478/12/F/M/19


11

(iii) Give two advantages of using a magnetic storage device rather than a solid state storage
device.

Advantage 1 .......................................................................................................................

...........................................................................................................................................

Advantage 2 .......................................................................................................................

...........................................................................................................................................
[2]

7 Arya regularly uses the Internet as a research tool for her school projects.

Identify and describe three risks to Arya’s computer when she is using the Internet for research.

Risk 1 ................................................................................................................................................

Description ........................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

Risk 2 ................................................................................................................................................

Description ........................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

Risk 3 ................................................................................................................................................

Description ........................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................
[6]

© UCLES 2019 0478/12/F/M/19


12

BLANK PAGE

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.

Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of
Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge.

© UCLES 2019 0478/12/F/M/19


Cambridge IGCSE™
* 0 8 0 3 7 2 8 9 4 0 *

COMPUTER SCIENCE 0478/12


Paper 1 Theory February/March 2021

1 hour 45 minutes

You must answer on the question paper.

No additional materials are needed.

INSTRUCTIONS
● Answer all questions.
● Use a black or dark blue pen. You may use an HB pencil for any diagrams or graphs.
● Write your name, centre number and candidate number in the boxes at the top of the page.
● Write your answer to each question in the space provided.
● Do not use an erasable pen or correction fluid.
● Do not write on any bar codes.
● Calculators must not be used in this paper.

INFORMATION
● The total mark for this paper is 75.
● The number of marks for each question or part question is shown in brackets [ ].
● No marks will be awarded for using brand names of software packages or hardware.

This document has 16 pages. Any blank pages are indicated.

DC (PQ/SG) 202679/4
© UCLES 2021 [Turn over
2

1 A hockey club records the number of people that watch each match. An 8-bit binary register is
used to store this value.

(a) 46 people watch the first match and 171 people watch the second match.

Show how the registers would store these denary values as 8-bit binary.

Denary
8-bit binary
value
46

171
[2]

Working space

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

(b) Give the largest denary value that can be stored in the 8-bit binary register.

............................................................................................................................................. [1]

(c) The hockey club wants to increase the number of people that can watch each match to 2000.
The 8-bit binary register may no longer be able to store the value.

Give the smallest number of bits that can be used to store the denary value 2000.

............................................................................................................................................. [1]

Working space

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

© UCLES 2021 0478/12/F/M/21


3

(d) Electronic data about the final score for the match is transmitted to a central computer
30 kilometres away, using serial transmission.

(i) Explain why serial transmission is more appropriate than parallel transmission in this
scenario.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [3]

(ii) The data transmission is also half-duplex.

Describe half-duplex data transmission.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [2]

(iii) The data transmission uses checksums.

Describe how checksums are used to detect errors in data transmission.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [3]

© UCLES 2021 0478/12/F/M/21 [Turn over


4

2 Gurdeep takes high definition photographs using a digital camera. She has set up a website where
users can view thumbnails of her photographs. A thumbnail is a small version of the high definition
photograph.

(a) Gurdeep compresses the high definition photographs to create the thumbnails. She uses
lossy compression.

Describe how lossy compression creates the thumbnails.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [3]

(b) Gurdeep sets up a web server to host her website. She reads about an Internet Protocol (IP)
address, a Media Access Control (MAC) address and a Uniform Resource Locator (URL).

Draw a line to connect each term to the correct example.

Term Example

IP address 192.168.0.255

MAC address https://www.cambridgeinternational.org

URL 00:15:E9:2B:99:3C

[2]

© UCLES 2021 0478/12/F/M/21


5

(c) Users can buy the high definition photographs from the website. When a user buys a high
definition photograph, a Secure Socket Layer (SSL) connection is created.

(i) Give one benefit of using an SSL connection.

...........................................................................................................................................

..................................................................................................................................... [1]

(ii) Explain how the SSL connection is created.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [4]

© UCLES 2021 0478/12/F/M/21 [Turn over


6

3 The given table shows the name or description of four devices. The table is incomplete.

Complete the missing device names and descriptions.

Device name Description

................................................... Uses either thermal bubble or piezoelectric technology

...............................................................................................

...............................................................................................
Actuator
...............................................................................................

...............................................................................................

Uses thousands of tiny mirrors that can move very quickly to


...................................................
create an image

...............................................................................................

...............................................................................................
Mouse
...............................................................................................

...............................................................................................
[4]

© UCLES 2021 0478/12/F/M/21


7

4 A supermarket sells many products. Each product has a barcode.

(a) Explain how the barcode is read at the supermarket checkout and how the price of the product
is found.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [6]

(b) The supermarket stores data using a Solid State Drive (SSD).

(i) Explain how an SSD stores data.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [3]

(ii) One advantage of an SSD rather than a Hard Disk Drive (HDD) is that it has no moving
parts, so it is more durable.

State one other advantage of the supermarket using SSD rather than HDD.

...........................................................................................................................................

..................................................................................................................................... [1]

© UCLES 2021 0478/12/F/M/21 [Turn over


8

5 Computers use logic gates.

(a) State the single logic gate that produces each truth table.

Truth table Logic gate

A B Output

0 0 1

0 1 1 ...................................................................................
1 0 1

1 1 0

A B Output

0 0 0

0 1 1 ...................................................................................
1 0 1

1 1 0

A B Output

0 0 1

0 1 0 ...................................................................................
1 0 0

1 1 0

[3]

(b) An aeroplane has a warning system that monitors the height of the aeroplane above the
ground, whether the aeroplane is ascending or descending, and the speed of the aeroplane.

Input Binary value Condition

Height 1 Height is less than 500 metres


(H) 0 Height is greater than or equal to 500 metres
Ascending or 1 Aeroplane is ascending or in level flight
Descending
(A) 0 Aeroplane is descending

Speed 1 Speed is less than or equal to 470 knots


(S) 0 Speed is greater than 470 knots

© UCLES 2021 0478/12/F/M/21


9

The warning system will produce an output of 1 that will sound an alarm (W) when either of
these conditions apply:

Height is less than 500 metres and the aeroplane is descending

or

The aeroplane is descending and speed is greater than 470 knots

Draw a logic circuit to represent the warning system.

A W

[5]

© UCLES 2021 0478/12/F/M/21 [Turn over


10

6 Hacking is one type of Internet risk used to obtain personal data that is stored on a computer.

(a) Explain how a firewall can help prevent hacking.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [4]

(b) Identify and describe two other types of internet risk that are used to obtain personal data.

Internet risk 1 ............................................................................................................................

Description ................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

Internet risk 2 ............................................................................................................................

Description ................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[6]

© UCLES 2021 0478/12/F/M/21


11

7 Adeel has used a high-level language to program a mobile application.

(a) Describe what is meant by a high-level language.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

(b) Adeel uses an interpreter while developing and testing the application.

Adeel uses a compiler when the application is ready to be shared with others.

Compare the features of interpreters and compilers.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [4]

(c) Adeel is considering distributing his application as free software or shareware.

Explain the difference between free software and shareware.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [5]
© UCLES 2021 0478/12/F/M/21 [Turn over
12

(d) Adeel is concerned about his application being plagiarised.

Define the term plagiarism.

...................................................................................................................................................

............................................................................................................................................. [1]

(e) Adeel copyrights his application.

State why Adeel copyrights his application.

...................................................................................................................................................

............................................................................................................................................. [1]

© UCLES 2021 0478/12/F/M/21


13

8 The Von Neumann model, for a computer system, uses the stored program concept.

(a) Describe what is meant by the stored program concept.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

(b) The fetch-execute cycle of a Von Neumann model, for a computer system, uses registers and
buses.

(i) Describe the role of the Program Counter.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [2]

(ii) Describe the role of the Control Bus.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [2]

(c) Computers based on the Von Neumann model, for a computer system, use interrupts.

Explain why interrupts are needed.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

© UCLES 2021 0478/12/F/M/21


14

BLANK PAGE

© UCLES 2021 0478/12/F/M/21


15

BLANK PAGE

© UCLES 2021 0478/12/F/M/21


16

BLANK PAGE

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.

Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of
Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge.

© UCLES 2021 0478/12/F/M/21


Cambridge IGCSE™
* 1 4 2 8 2 4 6 4 9 8 *

COMPUTER SCIENCE 0478/12


Paper 1 Theory February/March 2022

1 hour 45 minutes

You must answer on the question paper.

No additional materials are needed.

INSTRUCTIONS
● Answer all questions.
● Use a black or dark blue pen. You may use an HB pencil for any diagrams or graphs.
● Write your name, centre number and candidate number in the boxes at the top of the page.
● Write your answer to each question in the space provided.
● Do not use an erasable pen or correction fluid.
● Do not write on any bar codes.
● Calculators must not be used in this paper.

INFORMATION
● The total mark for this paper is 75.
● The number of marks for each question or part question is shown in brackets [ ].
● No marks will be awarded for using brand names of software packages or hardware.

This document has 12 pages. Any blank pages are indicated.

DC (LK) 303935/2
© UCLES 2022 [Turn over
2

1 A computer stores data in binary form. Binary numbers can be represented as hexadecimal and
denary numbers.

(a) Convert the 8-bit binary number 01010101 to denary.

............................................................................................................................................. [1]

Working space

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

(b) Convert the binary number 11000000 to hexadecimal.

............................................................................................................................................. [1]

Working space

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

(c) Convert the hexadecimal number 1A to denary.

............................................................................................................................................. [1]

Working space

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

(d) Binary numbers can be stored as bytes.

State how many bits are in two bytes.

............................................................................................................................................. [1]

© UCLES 2022 0478/12/F/M/22


3

2 Nadia creates a digital image for a school project.

(a) Give one example of an image format.

............................................................................................................................................. [1]

(b) Describe how a digital image file is stored by a computer.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [3]

(c) Nadia compresses the digital image file before emailing it to a friend.

(i) State what is meant by data compression.

...........................................................................................................................................

..................................................................................................................................... [1]

(ii) Explain why Nadia compresses the digital image file before emailing it.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [2]

© UCLES 2022 0478/12/F/M/22 [Turn over


4

(iii) Nadia’s email service uses parity bits as a method of error detection during the
transmission of data.

Describe how the parity bits are used to detect errors.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [5]

(iv) Identify and describe one other method of error detection used during the transmission
of data.

Method ..............................................................................................................................

Description ........................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................
[4]

© UCLES 2022 0478/12/F/M/22


5

3 (a) Tick (3) to show which logic gates will give an output of 1 for the given inputs A and B.

Inputs AND OR NAND NOR XOR


A=1
B=1
A=0
B=0
A=1
B=0
[3]

(b) Draw the logic circuit for the given logic statement:

X = (A XOR B) AND (B OR NOT C)

Do not attempt to simplify the logic statement. All logic gates must have a maximum of two
inputs.

B X

[4]

© UCLES 2022 0478/12/F/M/22 [Turn over


6

4 Pradeep uses his personal computer to complete work at home.

(a) Pradeep uses a mouse and a keyboard to control the computer.

(i) Complete the descriptions of the principles of operation of a mouse and a keyboard
using the most appropriate terms from the list. Not all terms in the list need to be used.

• absorbs
• ball
• biometric
• circuit
• colour
• digital
• direction
• Light-Emitting Diode (LED)
• Liquid Crystal Display (LCD)
• reflects
• speed
• switch
• transparency

An optical mouse shines a red light from a ................................................... underneath

the mouse. The light .................................................. back from a surface through a

lens in the mouse and is converted to a value. This value is transmitted to the

computer. The computer then determines the ................................................... and

................................................... of the movement.

When the user presses a key on a keyboard, the key pushes the

................................................... on the circuit board. This completes a

................................................... . Signals are sent to the computer. The computer uses

the data to calculate which key was pressed.


[6]

(ii) Identify two other input devices Pradeep could use with his personal computer.

Input device 1 ....................................................................................................................

Input device 2 ....................................................................................................................


[2]

© UCLES 2022 0478/12/F/M/22


7

(b) Pradeep uses a projector attached to the ceiling at his home to watch high-definition (HD)
films.

The projector has broken. He wants to buy a replacement. He needs to choose between an
LCD projector and a Digital Light Projector (DLP).

Explain why an LCD projector would be more appropriate for Pradeep.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [3]

(c) Pradeep stores his collection of films and his work files on his personal computer.

Pradeep wants to save a copy of all his films and files onto a single storage device.

Identify and justify an appropriate storage device to store the copies.

Storage device ..........................................................................................................................

Justification ...............................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[4]

© UCLES 2022 0478/12/F/M/22 [Turn over


8

5 A holiday company has a website where customers can create accounts and can book and pay for
holidays.

(a) The website is written in Hypertext Markup Language (HTML).

Give two examples of HTML structure and two examples of HTML presentation.

Structure 1 ................................................................................................................................

Structure 2 ................................................................................................................................

Presentation 1 ..........................................................................................................................

Presentation 2 ..........................................................................................................................
[4]

(b) The website is stored on a web server. Customers use their own computers to access the
website.

Uniform Resource Locator (URL), Internet Protocol (IP) and Media Access Control (MAC) are
three types of address used by computers when accessing the Internet.

Give two features of each type of address in the table.

Type of
Features
address

............................................................................................................................

............................................................................................................................
URL
............................................................................................................................

............................................................................................................................

............................................................................................................................

............................................................................................................................
IP
............................................................................................................................

............................................................................................................................

............................................................................................................................

............................................................................................................................
MAC
............................................................................................................................

............................................................................................................................
[6]

© UCLES 2022 0478/12/F/M/22


9

(c) The company is concerned about threats to its web server.

Complete the table by identifying:

• two potential threats to its web server


• the impact each threat could have on the company
• software the company can use to help to limit each threat.

Each impact must be different.

Threat Impact on company Software

.........................................................................
............................ ..................................
.........................................................................
............................ ..................................
.........................................................................

.........................................................................

.........................................................................
............................ ..................................
.........................................................................
............................ ..................................
.........................................................................

.........................................................................
[6]

© UCLES 2022 0478/12/F/M/22 [Turn over


10

6 A business uses a closed-circuit television (CCTV) system that starts recording when motion is
detected. It stops recording after two minutes if no further motion is detected. The system uses a
motion sensor and a microprocessor.

Describe how the motion sensor and microprocessor work together to control the CCTV system.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

.................................................................................................................................................... [7]

© UCLES 2022 0478/12/F/M/22


11

7 Ishani is a software developer who is creating a new computer game.

(a) Ishani uses an interpreter and a compiler at different stages of the game creation.

(i) Explain when it is most appropriate for Ishani to use an interpreter.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [3]

(ii) Explain when it is most appropriate for Ishani to use a compiler.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [3]

(b) Ishani has to decide between releasing her game as freeware or free software.

Describe freeware and free software.

Freeware ..................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

Free software ............................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[4]

© UCLES 2022 0478/12/F/M/22


12

BLANK PAGE

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.

Cambridge Assessment International Education is part of Cambridge Assessment. Cambridge Assessment is the brand name of the University of Cambridge
Local Examinations Syndicate (UCLES), which is a department of the University of Cambridge.

© UCLES 2022 0478/12/F/M/22


Cambridge IGCSE™
* 1 8 6 2 2 6 2 8 5 3 *

COMPUTER SCIENCE 0478/12


Paper 1 Computer Systems February/March 2023

1 hour 45 minutes

You must answer on the question paper.

No additional materials are needed.

INSTRUCTIONS
● Answer all questions.
● Use a black or dark blue pen. You may use an HB pencil for any diagrams or graphs.
● Write your name, centre number and candidate number in the boxes at the top of the page.
● Write your answer to each question in the space provided.
● Do not use an erasable pen or correction fluid.
● Do not write on any bar codes.
● Calculators must not be used in this paper.

INFORMATION
● The total mark for this paper is 75.
● The number of marks for each question or part question is shown in brackets [ ].
● No marks will be awarded for using brand names of software packages or hardware.

This document has 16 pages. Any blank pages are indicated.

DC (EF) 313505/3
© UCLES 2023 [Turn over
2

1 Computers can be infected with malware. Spyware is one example of malware.

(a) Tick (✓) one box to show a correct definition of spyware.

A Software that activates a webcam and transmits the video to a third party
that outputs it live on a website.

B Software that detects when a password is being entered and then emails
the password to a third party.

C Software that records all data entered into a computer, analyses this data
to find email addresses and passwords, then posts these to a website.

D Software that records all key presses and transmits these to a third party.

[1]

(b) Complete the table by identifying and describing two other examples of malware.

Malware Description

...........................................................................................................

...........................................................................................................
......................................
1 ...........................................................................................................
......................................
...........................................................................................................

...........................................................................................................

...........................................................................................................

...........................................................................................................
......................................
2 ...........................................................................................................
......................................
...........................................................................................................

...........................................................................................................

[6]

© UCLES 2023 0478/12/F/M/23


3

(c) Proxy‑servers and firewalls have some similar functions.

Identify two similarities and one difference between proxy‑servers and firewalls.

Similarity 1 ................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

Similarity 2 ................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

Difference .................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[3]

© UCLES 2023 0478/12/F/M/23 [Turn over


4

2 A programmer has designed a three‑dimensional (3D) interactive computer game. They are going
to develop a program for the game. The program needs to run efficiently, but it must also be
developed as soon as possible.

(a) Tick (✓) one box to identify whether the programmer should use a high‑level language or a
low‑level language to develop the program.

Explain the reasons for your choice.

High‑level language

Low‑level language

Reasons for your choice ...........................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [4]

(b) If the programmer chooses a high‑level language, they can use a compiler or an interpreter to
translate the high‑level language into a low‑level language.

Describe the operation of a compiler and of an interpreter.

Compiler ...................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

Interpreter .................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[4]

© UCLES 2023 0478/12/F/M/23


5

3 A new computer comes with primary and secondary storage.

(a) Data storage is measured using binary denominations.

Complete each conversion.

8 bytes = .............................. nibbles

512 kibibytes (KiB) = .............................. mebibytes (MiB)

4 gibibytes (GiB) = .............................. mebibytes (MiB)

1 exbibyte (EiB) = .............................. pebibytes (PiB)


[4]
Working space

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

(b) Random access memory (RAM) is an example of primary storage.

Give three examples of data that is commonly stored in RAM.

1 ................................................................................................................................................

2 ................................................................................................................................................

3 ................................................................................................................................................
[3]

(c) Describe the purpose of secondary storage.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

© UCLES 2023 0478/12/F/M/23 [Turn over


6

4 A wildlife photographer stores their digital images on a computer.

(a) Complete the table by defining each term about images.

Image term Definition

...................................................................................................................

pixel ...................................................................................................................

...................................................................................................................

...................................................................................................................

resolution ...................................................................................................................

...................................................................................................................

[2]

(b) One of the images has a resolution of 1000 × 1000 and a colour depth of 2 bytes.

Calculate the file size of the image. Give your answer in bytes.

Show your working.

Working space ..........................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

File size ...................................... bytes


[2]

© UCLES 2023 0478/12/F/M/23


7

(c) The photographer decides to purchase a solid‑state storage device to back up their images.

Complete the description of solid‑state storage.

Use the terms from the list.

Some of the terms in the list will not be used. You should only use a term once.

binary denary electrons grid neutrons

non‑volatile RAM star transistors virtual volatile

Solid‑state storage is ........................................................... . This means that the data is not

lost when the power is turned off.

Solid‑state storage is made of ........................................................... that are laid out in a

........................................................... .

Gates are used to control the flow of the ........................................................... through the

transistors. This changes the data in the transistors from 1 to 0, or from 0 to 1.


[4]

(d) The photographer compresses an image file before it is emailed.

Give one reason why a file is compressed.

...................................................................................................................................................

............................................................................................................................................. [1]

© UCLES 2023 0478/12/F/M/23 [Turn over


8

5 A website allows users to purchase items.

Computer A sends a request for the homepage to the website’s server.

(a) The request is sent using packet switching.

The structure of a packet of data has three elements. One element is the packet header.

(i) Identify two items of data contained in a packet header.

1 ........................................................................................................................................

2 ........................................................................................................................................
[2]

(ii) Identify the two other elements of a packet.

1 ........................................................................................................................................

2 ........................................................................................................................................
[2]

© UCLES 2023 0478/12/F/M/23


9

(b) Computer A needs to be directly connected to a router that is located in a different room.

(i) Tick (✓) one box to identify whether serial data transmission or parallel data transmission
is more suitable for this connection.

Explain the reasons for your choice.

Serial data transmission

Parallel data transmission

Reasons for your choice ...................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [3]

(ii) The connection will also use full‑duplex data transmission.

Define full‑duplex data transmission.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [2]

© UCLES 2023 0478/12/F/M/23 [Turn over


10

(c) The data transmission will use parity checks.

(i) The bytes need to be sent using an even parity byte check.

Complete the parity bit for each byte.

Parity
bit

Byte A 1 1 0 0 0 1 1

Byte B 0 0 0 0 0 0 0

[2]

(ii) A parity block check can be used instead of a parity byte check.

Explain how a parity block check might detect an error in transmission that would not be
detected by a parity byte check.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [2]

© UCLES 2023 0478/12/F/M/23


11

(iii) The data was sent using an even parity block check. One of the bits has been transmitted
incorrectly.

Parity
Bit 1 Bit 2 Bit 3 Bit 4 Bit 5 Bit 6 Bit 7
bit

Byte 0 1 1 1 0 1 0 0 0

Byte 1 0 0 1 0 0 1 0 0

Byte 2 1 0 1 1 0 0 0 1

Byte 3 1 1 0 0 1 1 1 1

Byte 4 1 0 1 0 0 0 1 0

Byte 5 0 0 0 0 0 0 0 0

Byte 6 0 1 1 1 1 0 0 0

Parity
0 1 1 0 1 0 1 0
byte

Identify the bit number and the byte number of the incorrect bit.

Bit number ......................................

Byte number ......................................


[2]

© UCLES 2023 0478/12/F/M/23 [Turn over


12

(d) The website allows the user to set up an account to log on and purchase items. The website
is accessed and displayed using a web browser.

(i) Two functions of the web browser are to render hypertext markup language (HTML) to
display web pages and to store cookies.

Identify two other functions of a web browser.

1 ........................................................................................................................................

2 ........................................................................................................................................
[2]

(ii) Identify two ways that cookies can be used to enhance the user’s experience of this
website.

1 ........................................................................................................................................

...........................................................................................................................................

2 ........................................................................................................................................

...........................................................................................................................................
[2]

© UCLES 2023 0478/12/F/M/23


13

6 A company is involved in robotics.

One of its robots is designed to make a specific movement depending on a binary value.

(a) The table gives some of the movements for the robot.

Complete the table by writing the missing binary, denary or hexadecimal value for each
movement.

Movement Binary Denary Hexadecimal

forward 1 step 00011111 31

back 1 step 140 8C

turn right 01011010 5A

turn left 120 78

[4]

Working space

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

(b) Describe what is meant by robotics.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

© UCLES 2023 0478/12/F/M/23 [Turn over


14

(c) The robot has a sensor and a microprocessor.

The robot will move forward continuously until it detects an object that is less than or equal to
10 cm in front of it.

If an object is less than or equal to 10 cm in front of it, the robot turns 90 degrees right. It then
tries to move forward again.

Explain how the sensor and the microprocessor are used to automate this robot.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [7]

© UCLES 2023 0478/12/F/M/23


15

(d) The robot needs to find its way through different puzzles. Each puzzle has a series of paths
that the robot needs to follow to find its way to the end of the puzzle. The puzzle contains
dead ends and obstacles, so the robot needs to decide which way to go.

The robot’s program will use artificial intelligence (AI).

(i) Describe the characteristics of AI.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [3]

(ii) Explain how the program will use AI.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [4]

© UCLES 2023 0478/12/F/M/23


16

BLANK PAGE

Permission to reproduce items where third‑party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer‑related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.

Cambridge Assessment International Education is part of Cambridge Assessment. Cambridge Assessment is the brand name of the University of Cambridge
Local Examinations Syndicate (UCLES), which is a department of the University of Cambridge.

© UCLES 2023 0478/12/F/M/23


Cambridge International Examinations
Cambridge International General Certificate of Secondary Education
* 8 0 0 3 2 9 5 9 2 1 *

COMPUTER SCIENCE 0478/12


Paper 1 Theory May/June 2018
1 hour 45 minutes
Candidates answer on the Question Paper.
No Additional Materials are required.
No calculators allowed.

READ THESE INSTRUCTIONS FIRST

Write your Centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.

Answer all questions.


No marks will be awarded for using brand names of software packages or hardware.

Any businesses described in this paper are entirely fictitious.

At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.

The maximum number of marks is 75.

This syllabus is approved for use in England, Wales and Northern Ireland as a Cambridge International Level 1/Level 2 Certificate.

This document consists of 11 printed pages and 1 blank page.

DC (SC/SW) 150229/2
© UCLES 2018 [Turn over
2

1 Different units of data can be used to represent the size of a file, as it changes in size.

Fill in the missing units of data, using the list given:

• byte
• gigabyte (GB)
• megabyte (MB)
• nibble

The units of data increase in size from smallest to largest.

Smallest bit

………………………………………………..

………………………………………………..

kilobyte (kB)

………………………………………………..

………………………………………………..

Largest terabyte (TB)


[4]

2 (a) Nancy has captured images of her holiday with her camera. The captured images are stored
as digital photo files on her camera.

Explain how the captured images are converted to digital photo files.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [4]

© UCLES 2018 0478/12/M/J/18


3

(b) Nancy wants to email the photos to Nadia.

Many of the photos are very large files, so Nancy needs to reduce their file size as much as
possible.

Identify which type of compression would be most suitable for Nancy to use. Explain your
choice.

Compression type .....................................................................................................................

Explanation ...............................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[4]

3 A stopwatch uses six digits to display hours, minutes and seconds.

The stopwatch is stopped at:

0 2 3 1 5 8
Hours Minutes Seconds

An 8-bit register is used to store each pair of digits.

(a) Write the 8-bit binary numbers that are currently stored for the Hours, Minutes and Seconds.

Hours

Minutes

Seconds

[3]

© UCLES 2018 0478/12/M/J/18 [Turn over


4

(b) The stopwatch is started again and then stopped.

When the watch is stopped, the 8-bit binary registers show:

Hours 0 0 0 0 0 1 0 1

Minutes 0 0 0 1 1 0 1 0

Seconds 0 0 1 1 0 1 1 1

Write the denary values that will now be shown on the stopwatch.

Hours Minutes Seconds


[3]

4 Jafar is using the Internet when he gets the message:

“D03, page is not available”

Jafar remembers that hexadecimal is often used to represent binary values in error codes.

Convert the hexadecimal number in the error message into 12-bit binary.

[3]

© UCLES 2018 0478/12/M/J/18


5

5 The three binary numbers in the registers X, Y and Z have been transmitted from one computer to
another.

Parity bit

Register X 1 0 0 1 0 0 1 0

Register Y 1 1 1 0 0 1 1 1

Register Z 1 1 1 0 1 0 0 1

Only one binary number has been transmitted correctly. This is identified through the use of a
parity bit.

Identify which register contains the binary number that has been transmitted correctly. Explain
the reason for your choice.

The binary number that has been transmitted correctly is in Register ............................................

Explanation ......................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................
[4]

© UCLES 2018 0478/12/M/J/18 [Turn over


6

6 Kelvin correctly answers an examination question about the Von Neumann model.

Eight different terms have been removed from his answer.

Complete the sentences in Kelvin’s answer, using the list given.

Not all items in the list need to be used.

• accumulator (ACC)
• address bus
• arithmetic logic unit (ALU)
• control unit (CU)
• data bus
• executed
• fetches
• immediate access store (IAS)
• memory address register (MAR)
• memory data register (MDR)
• program counter (PC)
• saved
• transmits

The central processing unit (CPU) ....................................................................................

the data and instructions needed and stores them in the

.................................................................................... to wait to be processed.

The .................................................................................... holds the address of the next

instruction. This address is sent to the .................................................................................... .

The data from this address is sent to the .................................................................................... .

The instruction can then be decoded and .................................................................................... .

Any calculations that are carried out on the data are done by the

.................................................................................... . During calculations, the data is temporarily

held in a register called the .................................................................................... .


[8]

© UCLES 2018 0478/12/M/J/18


7

7 Consider the logic statement:

X = 1 if ((A is 1 AND B is NOT 1) NAND C is 1) XOR ((A is 1 AND C is 1) OR B is 1)

(a) Draw a logic circuit to represent the given logic statement.

B X

[6]

(b) Complete the truth table for the given logic statement.

A B C Working space X

0 0 0

0 0 1

0 1 0

0 1 1

1 0 0

1 0 1

1 1 0

1 1 1

[4]

© UCLES 2018 0478/12/M/J/18 [Turn over


8

8 Dimitri is writing a computer program in a high-level language.

He needs to send just the machine code for the program to his friend, electronically.

It is important that the program is executed as quickly as possible.

Identify which translator will be most suitable for Dimitri to use. Explain your choice.

Type of translator .............................................................................................................................

Explanation ......................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................
[4]

9 An advertisement in a magazine displays this barcode:

(a) Identify this type of barcode.

.............................................................................................................................................. [1]

(b) Explain how the data stored in this barcode is read.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [4]
© UCLES 2018 0478/12/M/J/18
9

10 Alexandra has a new mobile device.

It has a touch screen that uses capacitive technology.

(a) Describe how a capacitive touch screen registers Alexandra’s touch.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [4]

(b) Alexandra is wearing gloves because it is cold.

She presses an icon on her touch screen but her action is not registered.

(i) Explain why the touch screen will not register her touch.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...................................................................................................................................... [2]

(ii) Alexandra does not want to remove her gloves.

Explain how Alexandra could use her mobile device whilst still wearing gloves.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...................................................................................................................................... [2]

© UCLES 2018 0478/12/M/J/18 [Turn over


10

11 A factory uses a security system to control a security light. The system uses a sensor and a
microprocessor.

Explain how the security system makes use of the sensor and the microprocessor to control the
security light.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..................................................................................................................................................... [6]

© UCLES 2018 0478/12/M/J/18


11

12 (a) Selma has some important personal information that she needs to email to her employer.

She wants to make sure that if the personal information is intercepted, it cannot be understood.

(i) State how Selma could email her personal data more securely.

...................................................................................................................................... [1]

(ii) Describe how your chosen solution works.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...................................................................................................................................... [5]

(b) Selma wants to make sure that the information received is correct.

A parity check can be used to detect errors.

Describe another error detection method that can be used to check the information received
is correct.

Error detection method .............................................................................................................

Description ................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[3]

© UCLES 2018 0478/12/M/J/18


12

BLANK PAGE

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.

Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.

© UCLES 2018 0478/12/M/J/18


Cambridge Assessment International Education
Cambridge International General Certificate of Secondary Education
* 5 1 3 5 6 8 3 2 6 3 *

COMPUTER SCIENCE 0478/12


Paper 1 Theory May/June 2019
1 hour 45 minutes
Candidates answer on the Question Paper.
No Additional Materials are required.
No calculators allowed.

READ THESE INSTRUCTIONS FIRST

Write your centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.

Answer all questions.


No marks will be awarded for using brand names of software packages or hardware.

Any businesses described in this paper are entirely fictitious.

At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.

The maximum number of marks is 75.

This syllabus is regulated for use in England, Wales and Northern Ireland as a Cambridge International Level 1/Level 2 Certificate.

This document consists of 11 printed pages and 1 blank page.

DC (KS/CB) 172695/2
© UCLES 2019 [Turn over
2

1 Input and output devices are often connected to a personal computer.

(a) Identify three input devices that can be connected to a personal computer.

1 ................................................................................................................................................

2 ................................................................................................................................................

3 ................................................................................................................................................
[3]

(b) Identify three output devices that can be connected to a personal computer.

1 ................................................................................................................................................

2 ................................................................................................................................................

3 ................................................................................................................................................
[3]

2 A finance company uses off-line storage to archive their accounts.

(a) Explain what is meant by off-line storage.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

(b) The computers in the finance company use both primary and secondary storage.

(i) Give one example of primary storage.

..................................................................................................................................... [1]

(ii) Give two examples of secondary storage.

1 ........................................................................................................................................

2 ........................................................................................................................................
[2]

© UCLES 2019 0478/12/M/J/19


3

3 Vanessa writes a paragraph as an answer to an examination question about the central processing
unit (CPU).

Use the list given to complete Vanessa’s answer by inserting the correct six missing terms.
Not all terms will be used.

• Components
• Data
• Decoded
• Executed
• Fetched
• Instructions
• RAM
• ROM
• Secondary storage

The CPU processes ........................................................ and ........................................................ .

An instruction is ........................................................ from ........................................................

into the CPU where it is then ........................................................ . Once this has taken place the

instruction is then ........................................................ .


[6]

© UCLES 2019 0478/12/M/J/19 [Turn over


4

4 (a) Marley wants to store a video he has created for his school project.

He considers using a DVD or a Blu-ray to store the video.

Explain two differences between a DVD and a Blu-ray.

1 ................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[2]

(b) (i) Marley also needs to store ten 8-bit colour images in a file for his project.

Each image is 500 pixels wide and 300 pixels high.

Calculate the total file size in megabytes (MB) for all Marley’s images.

Show all your working.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

File size ....................................................... MB


[3]

© UCLES 2019 0478/12/M/J/19


5

(ii) Marley prints the images for his project using an inkjet printer.

Describe how the inkjet printer prints an image.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [4]

5 A music company wants to send a new music file to many radio stations. It will send the music file
the day before the release date so that the radio stations can store the file ready for release.

The music company does not want the radio stations to be able to open the music file until 09:00
on the release date.

Identify two security measures and describe how each measure can be used to make sure the
music file cannot be opened until the release date.

Security measure 1 ..........................................................................................................................

Description .......................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

Security measure 2 ..........................................................................................................................

Description .......................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................
[4]

© UCLES 2019 0478/12/M/J/19 [Turn over


6

6 Priya creates a website to sell her old comic books and superhero figures.

(a) She uses HTML to create her website. The HTML she produces has both structure and
presentation.

Explain what is meant by HTML structure and presentation. Include an example of each.

Structure ...................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

Presentation .............................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[4]

(b) Priya uses cookies in her website.

Five statements are given about cookies.

Tick (✓) to show if the statement is True or False.

True False
Statement
(✓) (✓)

Cookies can be used to store a customer’s credit card details

Cookies can be used to track the items a customer has viewed on a website

Cookies will corrupt the data on a customer’s computer

Cookies are downloaded onto a customer’s computer

Cookies can be deleted from a customer’s computer

[5]

© UCLES 2019 0478/12/M/J/19


7

(c) Priya stores her website on a webserver.

To transmit the website data to the webserver she uses parallel duplex data transmission.

Describe how data is transmitted using parallel duplex data transmission.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [4]

(d) Priya has a URL for her website.

State what is meant by a URL.

...................................................................................................................................................

............................................................................................................................................. [1]

(e) Priya is concerned about a denial of service attack (DoS) occurring on her webserver.

(i) Explain what is meant by a denial of service attack.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [4]

(ii) Give one security device that can be used to help prevent a denial of service attack.

..................................................................................................................................... [1]

© UCLES 2019 0478/12/M/J/19 [Turn over


8

7 (a) An office has an automated lighting system. When movement is detected in the office the
lights are switched on. If movement is not detected for a period of 2 minutes the lights are
switched off. The system uses a sensor and a microprocessor.

Describe how the automated lighting system uses a sensor and a microprocessor.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [6]

(b) A microprocessor uses ROM.

Explain what is meant by ROM.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [3]

© UCLES 2019 0478/12/M/J/19


9

8 Consider the logic statement:

X = 1 if ((A is 1 NOR C is 1) AND (B is NOT 1 NOR C is 1)) OR (A is 1 AND B is 1)

(a) Draw a logic circuit to match the given logic statement. Each logic gate used must have a
maximum of two inputs. Do not attempt to simplify the logic statement.

B X

[6]

(b) Complete the truth table for the given logic statement.

Working space
A B C X

0 0 0

0 0 1

0 1 0

0 1 1

1 0 0

1 0 1

1 1 0

1 1 1
[4]

© UCLES 2019 0478/12/M/J/19 [Turn over


10

9 The contents of three binary registers have been transmitted from one computer to another. Even
parity has been used as an error detection method.

The outcome after transmission is:

Register A and Register C have been transmitted correctly.

Register B has been transmitted incorrectly.

Complete the Parity bit for each register to show the given outcome.

Parity bit

Register A 0 1 0 0 1 0 1

Register B 1 0 0 0 0 0 1

Register C 1 0 0 0 0 1 1

[3]

© UCLES 2019 0478/12/M/J/19


11

10 Remy has a mobile device that has a capacitive touch screen.

Describe how the capacitive touch screen registers Remy’s touch.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

.................................................................................................................................................... [4]

© UCLES 2019 0478/12/M/J/19


12

BLANK PAGE

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.

Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of
Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge.

© UCLES 2019 0478/12/M/J/19


Cambridge IGCSE™
* 1 8 7 5 9 9 1 1 3 6 *

COMPUTER SCIENCE 0478/12


Paper 1 Theory May/June 2021

1 hour 45 minutes

You must answer on the question paper.

No additional materials are needed.

INSTRUCTIONS
● Answer all questions.
● Use a black or dark blue pen. You may use an HB pencil for any diagrams or graphs.
● Write your name, centre number and candidate number in the boxes at the top of the page.
● Write your answer to each question in the space provided.
● Do not use an erasable pen or correction fluid.
● Do not write on any bar codes.
● Calculators must not be used in this paper.

INFORMATION
● The total mark for this paper is 75.
● The number of marks for each question or part question is shown in brackets [ ].
● No marks will be awarded for using brand names of software packages or hardware.

This document has 12 pages. Any blank pages are indicated.

DC (DH/SG) 202677/4
© UCLES 2021 [Turn over
2

1 A denary value can be converted into hexadecimal and binary.

(a) Complete the table to show the hexadecimal and 8-bit binary values of the given denary
values.

Denary Hexadecimal 8-bit binary

49

123

200

[6]

Working space

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

(b) Give two benefits, to users, of converting binary values to hexadecimal.

Benefit 1 ....................................................................................................................................

...................................................................................................................................................

Benefit 2 ....................................................................................................................................

...................................................................................................................................................
[2]

(c) Hexadecimal is used to represent Hypertext Markup Language (HTML) colour codes in
computer science.

Identify three other ways that hexadecimal is used in computer science.

1 ................................................................................................................................................

2 ................................................................................................................................................

3 ................................................................................................................................................
[3]

© UCLES 2021 0478/12/M/J/21


3

2 Data storage can be magnetic, solid state or optical.

(a) Six statements are given about data storage.

Tick (3) to show if the statement applies to magnetic, solid state or optical storage. Some
statements may apply to more than one type of storage.

Magnetic Solid state Optical


Statement
(3) (3) (3)
no moving parts are used to store data

pits and lands are used to store data

data is stored on platters

flash memory is used to store data

parts are rotated to store data

data can be stored permanently


[6]

(b) (i) Give one example of magnetic storage.

..................................................................................................................................... [1]

(ii) Give one example of optical storage.

..................................................................................................................................... [1]

(iii) Identify which type of storage would be the most suitable for use in a web server and
justify your choice.

Type of storage ..................................................................................................................

Justification ........................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................
[3]

(c) Describe the operation of USB flash memory and how it stores data.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [3]

© UCLES 2021 0478/12/M/J/21 [Turn over


4

3 Consider the logic statement:

X = ((((NOT A AND B) OR C) AND B) NOR (B OR C))

(a) Draw a logic circuit to represent the given logic statement.

Do not attempt to simplify the statement. All logic gates must have a maximum of two inputs.

B X

[6]

© UCLES 2021 0478/12/M/J/21


5

(b) Consider the completed truth table for the given logic statement.

Row Working space


A B C X
number
1 0 0 0 1

2 0 0 1 1

3 0 1 0 1

4 0 1 1 0

5 1 0 0 1

6 1 0 1 0

7 1 1 0 1

8 1 1 1 1

There are four errors in the truth table in the output (X) column.

Identify the four incorrect outputs.

Write the row number to identify each incorrect output.

Row .......................

Row .......................

Row .......................

Row .......................
[4]

© UCLES 2021 0478/12/M/J/21 [Turn over


6

4 Three types of Internet security risk are virus, spyware and denial of service (DoS) attack.

(a) Six statements are given about Internet security risks.

Tick (3) to show whether the statement applies to virus, spyware or denial of service. Some
statements may apply to more than one Internet security risk.

Denial of
Statement Virus Spyware service
(3) (3) (3)
captures all data entered using a keyboard

can be installed onto a web server

prevents access to a website

is malicious code on a computer

is self-replicating

damages the files on a user’s hard drive


[6]

(b) Identify three other types of Internet security risks.

1 ................................................................................................................................................

2 ................................................................................................................................................

3 ................................................................................................................................................
[3]

(c) Some Internet security risks can maliciously damage data. Data can also be damaged
accidentally.

State three ways that data could be accidentally damaged.

1 ................................................................................................................................................

2 ................................................................................................................................................

3 ................................................................................................................................................
[3]

© UCLES 2021 0478/12/M/J/21


7

5 A security light system is used by a factory. The light only comes on when it is dark and when
movement is detected. The light will stay on for 1 minute before switching off.

Sensors and a microprocessor are used to control the security light system.

(a) Identify two sensors that would be used in the security light system.

Sensor 1 ...................................................................................................................................

Sensor 2 ...................................................................................................................................
[2]

(b) Describe how the sensors and the microprocessor control the security light system.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [8]

© UCLES 2021 0478/12/M/J/21 [Turn over


8

6 Cookies can be used to store a user’s personal data and online browsing habits.

(a) A cookie could be used to automatically enter a user’s payment details when the user makes
a purchase online.

Describe how cookies can be used to store and automatically enter a user’s payment details.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [3]

(b) Explain why a user may be concerned about their personal data and online browsing habits
being stored in cookies.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [4]

© UCLES 2021 0478/12/M/J/21


9

7 Jolene uses HTML to create a website. She separates the HTML into structure and presentation.

(a) (i) Give one example of HTML structure.

..................................................................................................................................... [1]

(ii) Give two examples of HTML presentation.

1 ........................................................................................................................................

2 ........................................................................................................................................
[2]

(b) Explain why Jolene separates the HTML into structure and presentation.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

8 A keyboard is a type of input device that can be used to enter data into a computer.

Complete the paragraph that describes one method of operation for a keyboard, using the most
appropriate terms from the given list. Not all terms in the list need to be used.

• Binary
• Breaks
• Calculated
• Character
• Circuit
• Current
• Information
• Network
• Press
• Processor
• Signal
• Switch

A keyboard has a key matrix underneath the keys. When a key is pressed, it presses a

............................................. that completes a ............................................. . This allows

............................................. to flow. The location of the key pressed is

............................................. . The location of the key pressed is compared to a

............................................. map to find the ............................................. value for the key that

has been pressed.


[6]

© UCLES 2021 0478/12/M/J/21


10

BLANK PAGE

© UCLES 2021 0478/12/M/J/21


11

BLANK PAGE

© UCLES 2021 0478/12/M/J/21


12

BLANK PAGE

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.

Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of
Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge.

© UCLES 2021 0478/12/M/J/21


Cambridge IGCSE™
* 4 9 1 4 2 9 0 2 3 5 *

COMPUTER SCIENCE 0478/12


Paper 1 Theory May/June 2022

1 hour 45 minutes

You must answer on the question paper.

No additional materials are needed.

INSTRUCTIONS
● Answer all questions.
● Use a black or dark blue pen. You may use an HB pencil for any diagrams or graphs.
● Write your name, centre number and candidate number in the boxes at the top of the page.
● Write your answer to each question in the space provided.
● Do not use an erasable pen or correction fluid.
● Do not write on any bar codes.
● Calculators must not be used in this paper.

INFORMATION
● The total mark for this paper is 75.
● The number of marks for each question or part question is shown in brackets [ ].
● No marks will be awarded for using brand names of software packages or hardware.

This document has 12 pages.

DC (RW) 303775/2
© UCLES 2022 [Turn over
2

1 (a) Denary values are converted to binary values to be processed by a computer.

Draw one line from each denary value to the correctly converted 8‑bit binary value.

Denary 8-bit binary

00100001

41
10100110

00101001

174

10000110

10101110
86

01010110

[3]

Working space

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

(b) Binary values can also be converted to denary values.

Give the correct denary value for the 12‑bit binary value 000101010111
Show all your working.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

Denary value ..........................................................


[2]

© UCLES 2022 0478/12/M/J/22


3

2 Hexadecimal is used for Hypertext Markup Language (HTML) colour codes.

An HTML colour code is:


#2F15D6
Each pair of digits is stored as binary in an 8‑bit register.

(a) Give the 8‑bit binary value that would be stored for each pair of hexadecimal digits.

2F

15

D6

[6]

Working space

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

(b) HTML colour codes and Media Access Control (MAC) addresses are two examples of where
hexadecimal is used in Computer Science.

Give two other examples of where hexadecimal can be used in Computer Science.

Example 1 .................................................................................................................................

Example 2 .................................................................................................................................
[2]

© UCLES 2022 0478/12/M/J/22 [Turn over


4

(c) Websites can be created using HTML structure and presentation.

State what is meant by HTML structure and presentation.

Give an example of each in your answer.

Structure ...................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

Presentation .............................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[4]

(d) Explain why presentation is often separated from structure when creating a web page.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

© UCLES 2022 0478/12/M/J/22


5

3 Joelle is a student who uses the Internet.

(a) The table contains five terms or definitions that relate to the Internet.

Complete the table by writing each missing term or definition.

Term Definition

........................................................................................

browser ........................................................................................

........................................................................................

this is the company that provides a user with a


...................................................
connection to the Internet

this is a protocol that is used to send data for web


...................................................
pages across the Internet

........................................................................................

Uniform Resource Locator (URL) ........................................................................................

........................................................................................

........................................................................................

cookie ........................................................................................

........................................................................................

[5]

© UCLES 2022 0478/12/M/J/22 [Turn over


6

(b) Joelle uses a firewall to keep her data safe when she uses the Internet.

Tick (3) to show which statement about firewalls is true.

Tick (3)

Firewalls can only be hardware‑based

Firewalls can only be software‑based

Firewalls can be hardware‑based or software‑based


[1]

(c) Joelle’s parent also uses the firewall to limit the websites that Joelle can access.

Explain how the firewall is used to limit the websites that Joelle can access.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [4]

© UCLES 2022 0478/12/M/J/22


7

4 Jason is a programmer who writes computer programs in a high‑level language.

(a) Describe what is meant by a high‑level language.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [3]

(b) Jason wants to distribute a computer program he has written. He is considering distributing it
to users as freeware or free software.

(i) Explain one drawback to a user if the program is distributed as freeware.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [2]

(ii) Explain one benefit to a user if the program is distributed as free software.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [2]

© UCLES 2022 0478/12/M/J/22 [Turn over


8

5 Consider the following logic statement:

X = ((A OR B) AND (NOT (B XOR C)) AND C)

(a) Draw a logic circuit to represent the given logic statement.

Do not attempt to simplify the logic statement. All logic gates must have a maximum of two
inputs.

B X

[5]

© UCLES 2022 0478/12/M/J/22


9

(b) Complete the truth table for the given logic statement.

Working space
A B C X

0 0 0

0 0 1

0 1 0

0 1 1

1 0 0

1 0 1

1 1 0

1 1 1
[4]

6 Millions of emails are sent between users on a daily basis.

(a) Identify two online security attacks that can be carried out using email.

Describe how email is used to enable the attack.

Online security attack 1 ............................................................................................................

Description ................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

Online security attack 2 ............................................................................................................

Description ................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[6]

© UCLES 2022 0478/12/M/J/22 [Turn over


10

(b) Online security attacks can maliciously damage data.

One security method to keep data safe from online attacks is a firewall.

Identify two other security methods that keep data safe from online attacks.

Security method 1 .....................................................................................................................

Security method 2 .....................................................................................................................


[2]

(c) Data can also be damaged accidentally.

One example of how data can be damaged accidentally is by shutting down a computer
before saving data. To prevent this from happening, a user should make sure they have
saved all data before shutting down a computer.

Complete the table by giving three other examples of how data can be damaged accidentally.

Give a method of prevention for each example.

Example Method of prevention

...................................................................... ......................................................................

...................................................................... ......................................................................

...................................................................... ......................................................................

......................................................................

...................................................................... ......................................................................

...................................................................... ......................................................................

...................................................................... ......................................................................

......................................................................

...................................................................... ......................................................................

...................................................................... ......................................................................

...................................................................... ......................................................................

......................................................................

[6]

© UCLES 2022 0478/12/M/J/22


11

7 Cassie stores data for her business every day. She stores the data using optical data storage.

(a) Identify three examples of optical data storage.

Example 1 .................................................................................................................................

Example 2 .................................................................................................................................

Example 3 .................................................................................................................................
[3]

(b) Six statements are given about the operation of three different types of storage.

Tick (3) to show which statements apply to each type of storage. Some statements may
apply to more than one type of storage.

Type of storage
Magnetic Optical Solid state
Statement
(3) (3) (3)

this storage has no moving parts

this storage uses a laser to read and write data

this storage uses a read/write head

this storage burns pits onto a reflective surface

this storage uses NAND and NOR technology

this storage stores data in tracks and sectors

[6]

© UCLES 2022 0478/12/M/J/22 [Turn over


12

8 Sam develops a software application. He distributes a version of the software as shareware.

(a) Describe what is meant by shareware.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [4]

(b) Identify three ethical issues that may need to be considered when developing and distributing
software.

Ethical issue 1 ..........................................................................................................................

Ethical issue 2 ..........................................................................................................................

Ethical issue 3 ..........................................................................................................................


[3]

Permission to reproduce items where third‑party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer‑related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.

Cambridge Assessment International Education is part of Cambridge Assessment. Cambridge Assessment is the brand name of the University of Cambridge
Local Examinations Syndicate (UCLES), which is a department of the University of Cambridge.

© UCLES 2022 0478/12/M/J/22


Cambridge International Examinations
Cambridge International General Certificate of Secondary Education
* 6 2 9 5 6 2 5 4 5 1 *

COMPUTER SCIENCE 0478/12


Paper 1 Theory October/November 2018
1 hour 45 minutes
Candidates answer on the Question Paper.
No Additional Materials are required.
No calculators allowed.

READ THESE INSTRUCTIONS FIRST

Write your Centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.

Answer all questions.


No marks will be awarded for using brand names of software packages or hardware.

Any businesses described in this paper are entirely fictitious.

At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.

The maximum number of marks is 75.

This syllabus is approved for use in England, Wales and Northern Ireland as a Cambridge International Level 1/Level 2 Certificate.

This document consists of 11 printed pages and 1 blank page.

DC (LEG/SW) 150227/2
© UCLES 2018 [Turn over
2

1 Computers use a character set to convert text into binary.

One character set that can be used is ASCII.

Each letter in ASCII can also be represented as a denary value.

(a) The word BUS has the denary values:

B U S

66 85 83

Convert the denary values into 8-bit binary.

66

85

83
[3]

(b) Each letter in ASCII can also be represented as a hexadecimal value.

The word KEY has the 8-bit binary values:

K E Y

01001011 01000101 01011001

(i) Convert the three 8-bit binary values into hexadecimal.

01001011 ...............................................

01000101 ...............................................

01011001 ...............................................
[3]

© UCLES 2018 0478/12/O/N/18


3

(ii) Give three other uses of hexadecimal notation in computer science.

1 .........................................................................................................................................

2 .........................................................................................................................................

3 .........................................................................................................................................
[3]

(iii) State two benefits of using hexadecimal notation to represent binary values.

Benefit 1 ............................................................................................................................

...........................................................................................................................................

Benefit 2 ............................................................................................................................

...........................................................................................................................................
[2]

2 A computer uses RAM and ROM to store data.

(a) The table contains three statements about RAM or ROM.

Tick (✓) to show whether each statement describes RAM or ROM.

RAM ROM
Statement
(✓) (✓)

Stores the programs and data that are currently in use

Used to boot up the computer when power is turned on

Contents are retained when power is turned off


[3]

(b) Circle the storage category that includes both RAM and ROM.

Primary Secondary Off-line


[1]

(c) Explain what is meant by off-line storage.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[2]

© UCLES 2018 0478/12/O/N/18 [Turn over


4

3 A greenhouse uses a system to monitor the conditions that plants need to grow.

The inputs to the system are:

Binary
Input Condition
value
1 Window is open
W
0 Window is closed
1 Temperature >=26 °C
T
0 Temperature <26 °C
1 Humidity >=50%
H
0 Humidity <50%

The system will sound an alarm when certain conditions are detected.

Alarm (X) will sound (=1) when:

window is closed and temperature >=26 °C

or

temperature <26 °C and humidity >=50%

Draw a logic circuit to represent the system.

T X

[5]

© UCLES 2018 0478/12/O/N/18


5

4 (a) Identify three security issues that can put a computer system at risk.

Security issue 1 ........................................................................................................................

Security issue 2 ........................................................................................................................

Security issue 3 ........................................................................................................................


[3]

(b) Explain how a firewall can help to protect a computer system from security issues.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[4]

5 (a) Karina is taking her Computer Science examination. She has three questions to answer
about output devices.

(i) For the first question she writes the answer:

“It is a high powered laser that cuts materials such as thin metals or wood.”

Identify the output device that Karina is describing.

.......................................................................................................................................[1]

(ii) For the second question she writes the answer:

“The screen is made up of blocks of red, green and blue pixels. The screen uses layers
of different types of liquid.”

Identify the output device that Karina is describing.

.......................................................................................................................................[1]

(iii) For the third question she writes the answer:

“It is responsible for powering and moving a motor in machinery, such as a robot arm in
a factory.”

Identify the output device that Karina is describing.

.......................................................................................................................................[1]

© UCLES 2018 0478/12/O/N/18 [Turn over


6

(b) Karina correctly answers another examination question about some more output devices.

Five different terms have been removed from her answer.

Complete the sentences in Karina’s answer, using the list given. Not all terms in the list need
to be used.

• 3D
• digital light projector
• inkjet
• interactive whiteboard
• laser
• rotating
• scanning
• sliding
• speaker
• thermal bubble

An ................................................................................................... allows a user to write on a

surface using a pen, the text and drawings can then be captured and stored for later use.

An ................................................................................................... printer produces a hard

copy of a document using ................................................................................................... and

piezoelectric technology. A ...................................................................................................

printer uses a .............................................................................................. drum, and positive

and negative charges, to produce a hard copy of a document.


[5]

© UCLES 2018 0478/12/O/N/18


7

6 (a) Many programmers write computer programs in high-level languages. The programs need to
be translated into machine code to be read by the computer.

State two types of translator that can be used.

Translator 1 ...............................................................................................................................

Translator 2 ...............................................................................................................................
[2]

(b) Explain two reasons why a computer programmer may choose to write a program in a high-
level language, rather than a low-level language.

Reason 1 ..................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

Reason 2 ..................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[4]

(c) Three examples of computer code are given in the table.

Tick (✓) to show whether each example of computer code is High-level language, Assembly
language or Machine code.

High-level Assembly Machine


Computer code language language code
(✓) (✓) (✓)
10110111
11001100
01011100
FOR X = 1 TO 10
PRINT X
NEXT X
INP X
STA X
LDA Y
[3]

© UCLES 2018 0478/12/O/N/18 [Turn over


8

7 Six internet terms and six definitions are listed.

Draw a line to connect each term to a correct definition.

Internet term Definition

A program that allows a user to view


Browser
webpages

Internet Service Provider The main protocol that governs the


(ISP) transmission of data using the Internet

Hyper Text Transfer Protocol The website address that is typed into the
(HTTP) address bar

Uniform Resource Locator An address given to each device on a network.


(URL) It is provided by the network

A unique address given to a device on a


MAC address
network. It is provided by the manufacturer

A company that provides a connection to


IP address
access the Internet

[5]

8 Describe the purpose of an interrupt in a computer system.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[4]

© UCLES 2018 0478/12/O/N/18


9

9 (a) Computers can transmit data using different methods.

Describe the three data transmission methods given.

(i) Serial data transmission

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

.......................................................................................................................................[2]

(ii) Parallel data transmission

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

.......................................................................................................................................[2]

(iii) Duplex data transmission

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

.......................................................................................................................................[2]

© UCLES 2018 0478/12/O/N/18 [Turn over


10

(b) Data can sometimes be corrupted when it is transmitted from one computer to another,
causing errors to be present in the data.

Identify and describe three methods of error detection that could be used to see if an error
has occurred.

Error detection method 1 ..........................................................................................................

Description ................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

Error detection method 2 ..........................................................................................................

Description ................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

Error detection method 3 ..........................................................................................................

Description .................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[9]

© UCLES 2018 0478/12/O/N/18


11

10 A system uses pH sensors and a microprocessor to help monitor pollution in a river.

The pH of the water should be between 6 and 8. The system outputs an alert if the pH of the water
is not in this range.

Explain how the system uses the pH sensors and the microprocessor to help monitor the pollution.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[5]

© UCLES 2018 0478/12/O/N/18


12

BLANK PAGE

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.

Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.

© UCLES 2018 0478/12/O/N/18


Cambridge Assessment International Education
Cambridge International General Certificate of Secondary Education
* 3 4 9 1 6 5 4 1 7 1 *

COMPUTER SCIENCE 0478/12


Paper 1 Theory October/November 2019
1 hour 45 minutes
Candidates answer on the Question Paper.
No Additional Materials are required.
No calculators allowed.

READ THESE INSTRUCTIONS FIRST

Write your centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.

Answer all questions.


No marks will be awarded for using brand names of software packages or hardware.

Any businesses described in this paper are entirely fictitious.

At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.

The maximum number of marks is 75.

This syllabus is regulated for use in England, Wales and Northern Ireland as a Cambridge International Level 1/Level 2 Certificate.

This document consists of 10 printed pages and 2 blank pages.

DC (SC/TP) 201739/3
© UCLES 2019 [Turn over
2

1 Computer memory size is measured in multiples of bytes.

Four statements about computer memory sizes are given in the table.

Tick (✓) to show if the statement is True or False.

True False
Statement
(✓) (✓)
25 kB is larger than 100 MB
999 MB is larger than 50 GB
3500 kB is smaller than 2 GB
2350 bytes is smaller than 2 kB
[4]

2 The Von Neumann model for a computer system uses several components in the fetch-execute
cycle. One component that is used is the Control Unit (CU).

Identify four other components that are used in the Von Neumann model for a computer system.

1 .......................................................................................................................................................

2 .......................................................................................................................................................

3 .......................................................................................................................................................

4 .......................................................................................................................................................
[4]

3 The data from a sensor must be converted from analogue to digital to be processed by a computer.

(a) State what is meant by analogue data.

...................................................................................................................................................

............................................................................................................................................. [1]

(b) State what is meant by digital data.

...................................................................................................................................................

............................................................................................................................................. [1]

© UCLES 2019 0478/12/O/N/19


3

4 An 8-bit binary register contains the value:

0 0 1 1 0 1 0 0

(a) Convert the binary value to denary.

...................................................................................................................................................

............................................................................................................................................. [1]

(b) The contents of the register shifted one place to the right would give the result:

0 0 0 1 1 0 1 0

The contents of the register shown at the start of question 4 are shifted two places to the left.

Show the contents of the register after this shift has taken place.

[1]

(c) State the effect this shift has on the denary value in part (a).

...................................................................................................................................................

............................................................................................................................................. [1]

5 Audrey wants to send a sound file to Nico using email.

The file is too large to attach to an email so Audrey decides to compress the file.

She uses lossy compression to reduce the size of the sound file.

(a) Describe how lossy compression reduces the size of the sound file.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [4]

© UCLES 2019 0478/12/O/N/19 [Turn over


4

(b) Nico asks Audrey why she used lossy compression rather than lossless.

(i) State one advantage Audrey could give of using lossy rather than lossless to compress
the sound file.

...........................................................................................................................................

..................................................................................................................................... [1]

(ii) State one disadvantage Nico could give of using lossy rather than lossless to compress
the sound file.

...........................................................................................................................................

..................................................................................................................................... [1]

(c) Audrey sometimes records MIDI files.

(i) Explain what is meant by a MIDI file.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [4]

(ii) MIDI uses serial data transmission.

Explain two advantages of using serial transmission rather than parallel transmission.

Advantage 1 ......................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

Advantage 2 ......................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................
[4]
© UCLES 2019 0478/12/O/N/19
5

6 Touch screen technologies can be described as resistive or capacitive.

Six statements are given about resistive and capacitive technology.

Tick (✓) to show if the statement applies to Resistive or Capacitive technology.

Resistive Capacitive
Statement
(✓) (✓)
This touch screen has multi-touch capabilities
This touch screen cannot be used whilst wearing gloves
This touch screen is made up of two layers with a small
space in between
This touch screen uses the electrical properties of the
human body
This touch screen is normally cheaper to manufacture
This touch screen has a quicker response time
[6]

7 Gerald uses a keyboard to enter a website address into the address bar of his browser.

(a) Describe how Gerald’s key presses on his keyboard are processed by the computer.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [4]

© UCLES 2019 0478/12/O/N/19 [Turn over


6

(b) State three functions of a browser.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................

3 ................................................................................................................................................

...................................................................................................................................................
[3]

(c) The website Gerald visits uses https.

Explain what is meant by https.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [3]

© UCLES 2019 0478/12/O/N/19


7

8 Consider the logic circuit:

X
B

(a) Write a logic statement to match the given logic circuit.

............................................................................................................................................. [3]

(b) Complete the truth table for the given logic circuit.

Working space
A B C X

0 0 0

0 0 1

0 1 0

0 1 1

1 0 0

1 0 1

1 1 0

1 1 1
[4]

© UCLES 2019 0478/12/O/N/19 [Turn over


8

9 Maisey purchases a new router and attaches it to her computer. The connection she sets up uses
duplex data transmission.

(a) Five statements are given about duplex data transmission.

Tick (✓) to show if the statement is True or False.

True False
Statement
(✓) (✓)
Duplex data transmission can be either serial or
parallel
Duplex data transmission is when data is transmitted
both ways, but only one way at a time
Duplex data transmission is always used to connect
a device to a computer
Duplex data transmission is when data is transmitted
both ways at the same time
Duplex data transmission automatically detects any
errors in data
[5]

(b) Maisey’s computer uses an integrated circuit (IC) for data transmission that sends multiple
bits at the same time.

State whether the IC uses serial or parallel data transmission.

............................................................................................................................................. [1]

(c) Maisey purchases a new printer and connects it to her computer using the USB port.

Explain two benefits of using a USB connection.

Benefit 1 ...................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

Benefit 2 ...................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[4]

© UCLES 2019 0478/12/O/N/19


9

10 Data is valuable to a company.

(a) Companies use error detection methods to make sure that data is accurate.

One error detection method is the use of a check digit.

Explain what is meant by a check digit and how it is used to detect errors.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [4]

(b) Companies can use a range of security methods to keep their data secure.

Identify two security methods that a company can use to keep their data secure and explain
how each method can keep the data secure.

Security method 1 .....................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

Security method 2 .....................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[6]

© UCLES 2019 0478/12/O/N/19 [Turn over


10

11 Robert has a mobile device that uses RAM, ROM and an SSD.

(a) State what the RAM, ROM and SSD are used for.

RAM ..........................................................................................................................................

...................................................................................................................................................

ROM .........................................................................................................................................

...................................................................................................................................................

SSD ..........................................................................................................................................

...................................................................................................................................................
[3]

(b) Give two reasons why an SSD, rather than a HDD, is used in the mobile device.

Reason 1 ..................................................................................................................................

...................................................................................................................................................

Reason 2 ..................................................................................................................................

...................................................................................................................................................
[2]

© UCLES 2019 0478/12/O/N/19


11

BLANK PAGE

© UCLES 2019 0478/12/O/N/19


12

BLANK PAGE

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.

Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of
Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge.

© UCLES 2019 0478/12/O/N/19


Cambridge IGCSE™
* 1 8 6 8 6 1 8 8 1 5 *

COMPUTER SCIENCE 0478/12


Paper 1 Theory October/November 2020

1 hour 45 minutes

You must answer on the question paper.

No additional materials are needed.

INSTRUCTIONS
● Answer all questions.
● Use a black or dark blue pen. You may use an HB pencil for any diagrams or graphs.
● Write your name, centre number and candidate number in the boxes at the top of the page.
● Write your answer to each question in the space provided.
● Do not use an erasable pen or correction fluid.
● Do not write on any bar codes.
● Calculators must not be used in this paper.

INFORMATION
● The total mark for this paper is 75.
● The number of marks for each question or part question is shown in brackets [ ].
● No marks will be awarded for using brand names of software packages or hardware.

This document has 12 pages. Blank pages are indicated.

DC (LK) 186556/2
© UCLES 2020 [Turn over
2

1 Tina is creating a website for charity events. She uses HTML to create the website.

(a) State what is meant by HTML.

...................................................................................................................................................

............................................................................................................................................. [1]

(b) She uses the hexadecimal colour code #43B7F0 as the background colour for her website.

(i) State whether background colour is an example of structure or presentation, in the


website.

..................................................................................................................................... [1]

(ii) The hexadecimal colour code #43B7F0 is stored in three 8-bit registers.

Give the 8-bit binary values for each part of the hexadecimal code.

43

B7

F0
[6]

(c) Tina uses a microphone to record a welcome message for her website.

(i) State whether the microphone is an input or output device.

..................................................................................................................................... [1]

© UCLES 2020 0478/12/O/N/20


3

(ii) She wants to compress the recording to make sure that the file is as small as possible
for the website.

Identify which type of compression she should use and describe how this would compress
the file for the website.

Type of compression .........................................................................................................

Description

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [4]

(iii) Give two benefits of compressing the file for the website.

Benefit 1 ............................................................................................................................

...........................................................................................................................................

Benefit 2 ............................................................................................................................

...........................................................................................................................................
[2]

© UCLES 2020 0478/12/O/N/20 [Turn over


4

(d) Tina will use the TLS protocol in her website when selling tickets to people for different charity
events. This makes sure that their personal data is transmitted securely.

(i) Identify the two layers that are present in the TLS protocol.

Layer 1 ..............................................................................................................................

Layer 2 ..............................................................................................................................
[2]

(ii) Explain how data is sent securely using the TLS protocol.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [6]

© UCLES 2020 0478/12/O/N/20


5

(e) Tina is concerned about security threats to her web server.

(i) Identify three security threats to her web server that Tina might be concerned about.

1 ........................................................................................................................................

2 ........................................................................................................................................

3 ........................................................................................................................................
[3]

(ii) Tina installs a proxy server to help protect her website from security threats.

Describe how the proxy server will help protect the website.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [4]

2 Four 7-bit binary values are transmitted from one computer to another. A parity bit was added
to each binary value creating 8-bit binary values. All the binary values have been transmitted
correctly.

(a) Tick (✓) to show whether an Even or an Odd parity check has been used for each binary
value.

Even Odd
8-bit binary value
(✓) (✓)

11111111

01100110

01111011

10000000
[4]

© UCLES 2020 0478/12/O/N/20 [Turn over


6

(b) The data will also be checked using a checksum.

Describe how a checksum can be used to check that the data has been transmitted correctly.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [5]

3 Alessandro has some important data stored on his computer.

He is concerned about accidental damage to his data.

(a) (i) Identify three ways that the data could be accidentally damaged.

1 ........................................................................................................................................

2 ........................................................................................................................................

3 ........................................................................................................................................
[3]

(ii) State what Alessandro could do to make sure that he can retrieve his data if it is
accidentally damaged.

..................................................................................................................................... [1]

© UCLES 2020 0478/12/O/N/20


7

(b) Alessandro uses an SSD to store his data.

Describe what is meant by an SSD and how it operates to store data.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [4]

(c) Alessandro also uses off-line storage to store his data.

Three examples of off-line storage are Blu-ray, CD and DVD.

Six statements are given about off-line storage.

Tick (✓) to show if each statement applies to Blu-ray, CD, or DVD.

Some statements apply to more than one example of off-line storage.

Blu-ray CD DVD
Statement
(✓) (✓) (✓)

A type of optical storage

Has the largest storage capacity

Can be dual layer

Read using a red laser

Has the smallest storage capacity

Stores data in a spiral track


[6]

© UCLES 2020 0478/12/O/N/20 [Turn over


8

4 Consider the logic statement:

X = (((A NAND B) NOR (B AND C)) OR C)

(a) Draw a logic circuit to match the given logic statement.

All logic gates must have a maximum of two inputs. Do not attempt to simplify the logic
statement.

B X

[4]

(b) Complete the truth table for the given logic statement.

A B C Working space X

0 0 0

0 0 1

0 1 0

0 1 1

1 0 0

1 0 1

1 1 0

1 1 1
[4]

© UCLES 2020 0478/12/O/N/20


9

5 Tammy is buying a new computer that has an LED display.

(a) Five statements about LED displays are given.

Tick (✓) to show if each statement is True or False.

True False
Statement
(✓) (✓)

It is a flat panel display

It creates images using red, green and blue diodes

It is not very energy efficient and gives off heat

It can be used in mobile devices such as smartphones and tablets

It is a front-lit display
[5]

© UCLES 2020 0478/12/O/N/20 [Turn over


10

(b) Tammy connects the computer to her home network. The computer has a MAC address and
an IP address.

A paragraph is given about MAC addresses and IP addresses.

Complete the paragraph using the list of terms given. Not all terms need to be used.

• compiled
• computer
• control
• dynamic
• identify
• packet
• principal
• protocol
• similar
• unique

A MAC address is a media access …………………………………………………….. address.

A network device has a ……………………………………………………… MAC address that

can help ………………………………………………. the device in the network. An IP address

is an Internet ………………………………………… address. An IP address can be static or

…………………………………………… .
[5]

(c) Tammy uses a browser when accessing the Internet.

Describe the role of the browser.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [4]

© UCLES 2020 0478/12/O/N/20


11

BLANK PAGE

© UCLES 2020 0478/12/O/N/20


12

BLANK PAGE

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.

Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of
Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge.

© UCLES 2020 0478/12/O/N/20


Cambridge IGCSE™
* 9 3 8 8 8 6 9 5 2 8 *

COMPUTER SCIENCE 0478/12


Paper 1 Theory October/November 2021

1 hour 45 minutes

You must answer on the question paper.

No additional materials are needed.

INSTRUCTIONS
● Answer all questions.
● Use a black or dark blue pen. You may use an HB pencil for any diagrams or graphs.
● Write your name, centre number and candidate number in the boxes at the top of the page.
● Write your answer to each question in the space provided.
● Do not use an erasable pen or correction fluid.
● Do not write on any bar codes.
● Calculators must not be used in this paper.

INFORMATION
● The total mark for this paper is 75.
● The number of marks for each question or part question is shown in brackets [ ].
● No marks will be awarded for using brand names of software packages or hardware.

This document has 12 pages. Any blank pages are indicated.

DC (KS/FC) 202713/4
© UCLES 2021 [Turn over
2

1 (a) Denary is a number system that is used by programmers.

Tick (✓) one box to show whether denary is a base-2, base-10 or base-16 number system.

Tick
(✓)

Base-2

Base-10

Base-16
[1]

(b) Hexadecimal values can be used to represent denary values.

Convert these four hexadecimal values into denary values.

05 ......................................................

20 ......................................................

1A ......................................................

AB ......................................................
[4]

Working space

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

© UCLES 2021 0478/12/O/N/21


3

(c) Hexadecimal values can also be converted to binary values.

Tick (✓) one box to show the correct 8-bit binary value for each hexadecimal value.

(i) Hexadecimal value 25

Tick
(✓)

00011001

00100101

10100001
[1]

(ii) Hexadecimal value 1B

Tick
(✓)

00011011

10110001

00011010
[1]

(d) (i) Give one way that hexadecimal is used in website development.

..................................................................................................................................... [1]

(ii) Give one way that hexadecimal is used in low-level programming.

..................................................................................................................................... [1]

2 A train company wants to install a self-service ticket machine system for its train stations. When
the customer has purchased their tickets, the machine will provide a paper ticket.

(a) One output device that is used in the ticket machine is a display screen.

Identify one other output device that is used in the ticket machine system.

............................................................................................................................................. [1]

(b) The train company does not want users to use a keyboard or a mouse to enter their data,
when buying a ticket. The company is worried that they may be stolen or get too dirty.

Identify one other input device that would be suitable for use in the ticket machine system, to
allow users to enter their data.

............................................................................................................................................. [1]

© UCLES 2021 0478/12/O/N/21 [Turn over


4

3 (a) Six statements are given about methods of data transmission.

Tick (✓) to show if each statement applies to serial simplex, parallel simplex, parallel
half-duplex or serial duplex data transmission. Some statements may apply to more than one
data transmission method.

Serial Parallel Parallel Serial


Statement simplex simplex half-duplex duplex
(✓) (✓) (✓) (✓)

bits are transmitted along a single wire

data is transmitted in both directions

it is only suitable for distances less


than 5 metres
bits from the same byte are
transmitted one after the other
data may not arrive in the correct
sequence
data is transmitted in both directions,
but only one direction at a time
[6]

(b) A Universal Serial Bus (USB) connection can be used to transmit data from a mobile device
to a computer.

Give three benefits of using a USB connection for this purpose.

Benefit 1 ...................................................................................................................................

...................................................................................................................................................

Benefit 2 ...................................................................................................................................

...................................................................................................................................................

Benefit 3 ...................................................................................................................................

...................................................................................................................................................
[3]

© UCLES 2021 0478/12/O/N/21


5

4 The paragraph explains the operation of different touch screen technologies.

Complete the paragraph using the list of terms. Not all terms in the list need to be used.

• capacitive
• change
• circuit
• conductive
• coordinates
• grid
• heat
• infra-red
• insulating
• light
• manufacture
• pressure
• resistive

In ............................................................................ touch screen technology, an electrostatic field

is present on the surface of the touch screen. The ............................................................................

properties of a user cause a ............................................................................ in the field. The

............................................................................ of the user’s touch can be calculated.

In ............................................................................ touch screen technology, a user pushes the

top layer of the screen and makes it connect with the bottom layer to complete a

............................................................................ .

This type of touch screen is cheaper to ............................................................................ .


[7]

© UCLES 2021 0478/12/O/N/21 [Turn over


6

5 Sammi works for a finance company and has a laptop that he uses for his work. He has confidential
data about his customers stored on his laptop.

Sammi does not connect the laptop to any networks.

(a) Sammi is concerned about his customers’ confidential data being viewed by other people in
his office.

One method he uses to prevent others viewing the data is encryption.

Identify three other methods Sammi could use to prevent his customers’ confidential data
being viewed.

1 ................................................................................................................................................

2 ................................................................................................................................................

3 ................................................................................................................................................
[3]

(b) Sammi creates videos for the finance company website that give customers advice about
their finances.

He uses lossy compression to reduce the file size of the videos for the website.

(i) Give three ways that lossy compression can reduce the file size of the videos.

1 ........................................................................................................................................

...........................................................................................................................................

2 ........................................................................................................................................

...........................................................................................................................................

3 ........................................................................................................................................

...........................................................................................................................................
[3]

(ii) Give one drawback of using lossy compression to reduce the file size of the videos.

...........................................................................................................................................

..................................................................................................................................... [1]

© UCLES 2021 0478/12/O/N/21


7

(c) Sammi could have used lossless compression to compress the videos for the website.

(i) Give one reason why he would use lossless compression, rather than lossy compression,
for the videos.

...........................................................................................................................................

..................................................................................................................................... [1]

(ii) Give two disadvantages of Sammi using lossless compression, rather than lossy
compression, for the videos.

Disadvantage 1 .................................................................................................................

...........................................................................................................................................

Disadvantage 2 .................................................................................................................

...........................................................................................................................................
[2]

6 A programmer can use translators, such as an interpreter and a compiler, when developing a
computer program.

(a) Give one similarity between a compiler and an interpreter.

...................................................................................................................................................

............................................................................................................................................. [1]

(b) Describe two differences between a compiler and an interpreter.

Difference 1 ..............................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

Difference 2 ..............................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[4]

(c) Identify one other type of translator.

............................................................................................................................................. [1]

© UCLES 2021 0478/12/O/N/21 [Turn over


8

7 Five statements are given about devices.

Tick (✓) to show if each statement applies to a 3D scanner, barcode reader or a Quick Response
(QR) code reader. Some statements may apply to more than one type of device.

3D Barcode QR code
Statement scanner reader reader
(✓) (✓) (✓)
uses position and alignment markers for orientation
when scanning

scans the shape and appearance of an object

uses reflected light from a laser to convert


a black-and-white pattern into binary
can often be built into an Electronic Point Of Sale
(EPOS) terminal, for example, a supermarket checkout

it is an example of an input device


[5]

8 An electronic game has three square mats that are coloured red, green and blue.

The player will see a colour displayed on a screen and has 1 second to hit the mat that matches
the colour. If the player hits the correct mat, within 1 second, a counter is incremented. When a
player hits an incorrect mat, the game ends.

The game uses sensors and a microprocessor to determine if the player hits the correct mat within
1 second.

Explain how the game uses sensors and a microprocessor to count the number of times a player
hits a correct mat within 1 second.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

© UCLES 2021 0478/12/O/N/21


9

..........................................................................................................................................................

..........................................................................................................................................................

.................................................................................................................................................... [7]

9 Padma opens an application on her computer.

An interrupt is generated to inform the Central Processing Unit (CPU) that the application has
been opened.

(a) Give three other examples of when an interrupt signal could be generated.

1 ................................................................................................................................................

2 ................................................................................................................................................

3 ................................................................................................................................................
[3]

(b) State what would happen if interrupt signals were not used in a computer.

...................................................................................................................................................

............................................................................................................................................. [1]

10 Jermain uses the Secure Socket Layer (SSL) protocol for secure transmission when sending data
using the internet.

(a) Explain how the SSL protocol secures the data for transmission.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

(b) Identify an alternative protocol that could be used for secure transmission of data using the
internet.

............................................................................................................................................. [1]

(c) Give two ways that a user can identify if a website uses secure data transmission.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................
[2]
© UCLES 2021 0478/12/O/N/21 [Turn over
10

11 Consider the following logic statement:

X = (((A AND B) OR (NOT (B OR C))) NAND C)

(a) Draw a logic circuit to represent the given logic statement.

Do not attempt to simplify the logic statement. All logic gates must have a maximum of two
inputs.

B X

[5]

© UCLES 2021 0478/12/O/N/21


11

(b) Complete the truth table for the given logic statement.

A B C Working space X

0 0 0

0 0 1

0 1 0

0 1 1

1 0 0

1 0 1

1 1 0

1 1 1
[4]

(c) Identify two logic gates that are not included in the given logic statement.

Logic gate 1 ...............................................................................................................................

Logic gate 2 ..............................................................................................................................


[2]

© UCLES 2021 0478/12/O/N/21


12

BLANK PAGE

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.

Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of
Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge.

© UCLES 2021 0478/12/O/N/21


Cambridge IGCSE™
* 6 1 0 4 1 1 8 3 2 6 *

COMPUTER SCIENCE 0478/12


Paper 1 Theory October/November 2022

1 hour 45 minutes

You must answer on the question paper.

No additional materials are needed.

INSTRUCTIONS
● Answer all questions.
● Use a black or dark blue pen. You may use an HB pencil for any diagrams or graphs.
● Write your name, centre number and candidate number in the boxes at the top of the page.
● Write your answer to each question in the space provided.
● Do not use an erasable pen or correction fluid.
● Do not write on any bar codes.
● Calculators must not be used in this paper.

INFORMATION
● The total mark for this paper is 75.
● The number of marks for each question or part question is shown in brackets [ ].
● No marks will be awarded for using brand names of software packages or hardware.

This document has 12 pages.

DC (MB) 303733/3
© UCLES 2022 [Turn over
2

1 A bus station has a ticket machine.

A customer can use the ticket machine to select and pay for their ticket.

One input device built into the ticket machine is a touch screen.

(a) Identify two other input devices that could be built into the ticket machine.

Input device 1 ...........................................................................................................................

Input device 2 ...........................................................................................................................


[2]

(b) The ticket machine has a help icon that a user can touch to contact customer support.

The ticket machine has an output device that allows the user to hear the customer support
person.

Identify an output device that would be used for this purpose.

............................................................................................................................................. [1]

(c) The touch screen for the ticket machine uses resistive technology.

(i) Describe how resistive touch screen technology operates to recognise a user’s touch.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [4]

© UCLES 2022 0478/12/O/N/22


3

(ii) Give two benefits of using resistive touch screen technology for the ticket machine.

Benefit 1 ............................................................................................................................

...........................................................................................................................................

Benefit 2 ............................................................................................................................

...........................................................................................................................................
[2]

(iii) Give two drawbacks of using resistive touch screen technology for the ticket machine.

Drawback 1 .......................................................................................................................

...........................................................................................................................................

Drawback 2 .......................................................................................................................

...........................................................................................................................................
[2]

(iv) Identify one other touch screen technology that could have been used.

..................................................................................................................................... [1]

(d) The computer in the ticket machine uses the stored program concept.

Describe the stored program concept.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

© UCLES 2022 0478/12/O/N/22 [Turn over


4

(e) The computer in the ticket machine has an operating system.

One function of the operating system is to provide an interface for the user.

State three other functions of the operating system.

Function 1 .................................................................................................................................

Function 2 .................................................................................................................................

Function 3 .................................................................................................................................
[3]

(f) The computer uses 12-bit binary registers to store data whilst it is being processed.

Customers are given a denary ticket number.

(i) Give the 12-bit binary value that is stored in the register for each denary ticket number.

100 ....................................................................................................................................

235 ....................................................................................................................................

301 ....................................................................................................................................

Working space

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................
[3]

© UCLES 2022 0478/12/O/N/22


5

(ii) Show the denary ticket number that would be given to the customer for each 12-bit binary
value.

000000010110 ...................................................................................................................

000001110111 ...................................................................................................................

001101011001 ...................................................................................................................

Working space

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................
[3]

(iii) Binary values can also be represented as hexadecimal values.

Show the hexadecimal value that represents each of the two 12-bit binary values.

000010010101 ..................................................................................................................

101011010001 ...................................................................................................................

Working space

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................
[4]

© UCLES 2022 0478/12/O/N/22 [Turn over


6

2 An automated water tap system uses a sensor and a microprocessor to operate. Water flows
from the tap when a person’s hands are placed underneath the tap. Water stops flowing when the
person’s hands are removed from underneath the tap.

(a) Explain how the water tap system uses a sensor and a microprocessor to operate.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [6]

(b) Three descriptions are shown of different systems.

Identify the most suitable sensor that could be used in each system.

Description of system Sensor

it checks the air is dry enough in a garage that spray paints cars

it automatically switches on the headlights on a car when it is dark

it checks that the soil in a greenhouse has the correct level of acidity

[3]

© UCLES 2022 0478/12/O/N/22


7

3 Five statements are shown about Random Access Memory (RAM), an internal
Solid State Drive (SSD) and a USB flash memory drive.

Tick (✓) to show which statements apply to each component. Some statements may apply to
more than one component.

Component
Internal USB flash
RAM
Statement SSD memory drive
(✓)
(✓) (✓)

it is a type of primary storage

it is volatile

it uses NAND and NOR technology

it does not have any moving parts

it is not directly connected to the


central processing unit (CPU)
[5]

4 Doris has data stored on her computer.

She accidentally loses some data by deleting a file.

State two methods she could use to help prevent accidental loss of data in this way.

Describe how each method would help prevent accidental loss of the data.

Method 1 ..........................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

Method 2 ..........................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................
[4]

© UCLES 2022 0478/12/O/N/22 [Turn over


8

5 8 bytes of data are transmitted from one computer to another. Each byte of data has a parity bit.

The data is also sent with a parity byte. Each bit in the parity byte allows a check to be performed
on each column of bits.

A parity check is performed on the data and an error is found in one bit. The table shows the data
that was received.

Parity
Bit 2 Bit 3 Bit 4 Bit 5 Bit 6 Bit 7 Bit 8
bit

Byte 1 0 1 0 1 0 0 1 1

Byte 2 1 0 0 1 1 1 1 1

Byte 3 1 1 1 1 1 1 0 0

Byte 4 1 1 0 1 0 1 0 1

Byte 5 1 0 0 0 1 1 1 0

Byte 6 1 1 1 0 1 0 1 1

Byte 7 1 1 0 0 1 1 0 0

Byte 8 1 1 1 1 0 0 1 1

Parity
1 0 1 1 0 1 1 1
byte

Identify which bit has an error by giving the Byte number and Bit number.

Explain how you found the error.

Byte number ..............................

Bit number .................................

Explanation ......................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................
[4]

© UCLES 2022 0478/12/O/N/22


9

6 Jian has a website that uses the Secure Socket Layer (SSL) protocol to make sure that data is
kept secure during transmission.

(a) Give two ways that a user could check that a website uses the SSL protocol.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................
[2]

(b) State the name of the updated version of the SSL protocol.

............................................................................................................................................. [1]

(c) Jian’s system for his website has a proxy server.

Explain why Jian uses a proxy server as part of the system for his website.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [4]

© UCLES 2022 0478/12/O/N/22 [Turn over


10

(d) Jian sells products using his website. He wants to create a secure login system for user
accounts.

He is worried that a user’s login details may be gathered by malware when they are logging
into their account.

(i) State the type of malware that could be used to gather a user’s login details.

..................................................................................................................................... [1]

(ii) Give three methods that could be used to help prevent a user’s login details being
gathered by malware, when they are logging into their account.

Describe how each method can help prevent this happening.

Method 1 ...........................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

Method 2 ...........................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

Method 3 ...........................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................
[6]

© UCLES 2022 0478/12/O/N/22


11

(e) The paragraph describes how the web pages are obtained and displayed for the user.

Complete the paragraph using the list of terms. Not all terms in the list need to be used.

• browser
• Hypertext Markup Language (HTML)
• Internet Protocol (IP) address
• Internet Service Provider (ISP)
• Media Access Control (MAC) address
• presentation
• protocols
• structure
• Uniform Resource Locator (URL)
• web pages
• web server

The browser sends the ....................................................................................... to the

Domain Name Server (DNS) that looks up the corresponding

..................................................................................... . This is returned to the browser, which

then sends a request to the ...................................................................................... where the

.......................................................................................... are stored. The website is written in

.......................................................................................... that is rendered by the

.......................................................................................... .
[6]

7 NAND, OR and XOR are three types of logic gate.

(a) Four statements are shown about the logic gates.

Tick (✓) to show which statements apply to each logic gate. Some statements may apply to
more than one logic gate.

NAND OR XOR
Statement
(✓) (✓) (✓)

if both inputs are 1, the output is 1

if both inputs are different from each other, the output is 1

if both inputs are 0, the output is 0

if both inputs are the same as each other, the output is always 0

[4]

© UCLES 2022 0478/12/O/N/22 [Turn over


12

(b) NAND, OR, XOR, NOR and NOT are all examples of logic gates.

State the name of one other logic gate and complete its truth table.

Logic gate .................................................... Truth table:

A B Output

0 0

0 1

1 0

1 1
[2]

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.

Cambridge Assessment International Education is part of Cambridge Assessment. Cambridge Assessment is the brand name of the University of Cambridge
Local Examinations Syndicate (UCLES), which is a department of the University of Cambridge.

© UCLES 2022 0478/12/O/N/22

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy