0% found this document useful (0 votes)
1 views

CS Past Paper Book

This document is an examination paper for the Cambridge IGCSE Computer Science course, specifically for Paper 1 on Computer Systems for the February/March 2023 session. It includes instructions for answering the questions, information about the total marks, and various questions related to computer systems, malware, data storage, and robotics. The paper is designed for Year 11 students and consists of multiple sections requiring written responses.

Uploaded by

Arhamm Jain
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
1 views

CS Past Paper Book

This document is an examination paper for the Cambridge IGCSE Computer Science course, specifically for Paper 1 on Computer Systems for the February/March 2023 session. It includes instructions for answering the questions, information about the total marks, and various questions related to computer systems, malware, data storage, and robotics. The paper is designed for Year 11 students and consists of multiple sections requiring written responses.

Uploaded by

Arhamm Jain
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 177

COMP

SCI
IGCSE
23-24
PYQ
YEAR 11
Cambridge IGCSE™
* 1 8 6 2 2 6 2 8 5 3 *

COMPUTER SCIENCE 0478/12


Paper 1 Computer Systems February/March 2023

1 hour 45 minutes

You must answer on the question paper.

No additional materials are needed.

INSTRUCTIONS
● Answer all questions.
● Use a black or dark blue pen. You may use an HB pencil for any diagrams or graphs.
● Write your name, centre number and candidate number in the boxes at the top of the page.
● Write your answer to each question in the space provided.
● Do not use an erasable pen or correction fluid.
● Do not write on any bar codes.
● Calculators must not be used in this paper.

INFORMATION
● The total mark for this paper is 75.
● The number of marks for each question or part question is shown in brackets [ ].
● No marks will be awarded for using brand names of software packages or hardware.

This document has 16 pages. Any blank pages are indicated.

DC (EF) 313505/3
© UCLES 2023 [Turn over
2

1 Computers can be infected with malware. Spyware is one example of malware.

(a) Tick (✓) one box to show a correct definition of spyware.

A Software that activates a webcam and transmits the video to a third party
that outputs it live on a website.

B Software that detects when a password is being entered and then emails
the password to a third party.

C Software that records all data entered into a computer, analyses this data
to find email addresses and passwords, then posts these to a website.

D Software that records all key presses and transmits these to a third party.

[1]

(b) Complete the table by identifying and describing two other examples of malware.

Malware Description

...........................................................................................................

...........................................................................................................
......................................
1 ...........................................................................................................
......................................
...........................................................................................................

...........................................................................................................

...........................................................................................................

...........................................................................................................
......................................
2 ...........................................................................................................
......................................
...........................................................................................................

...........................................................................................................

[6]

© UCLES 2023 0478/12/F/M/23


3

(c) Proxy-servers and firewalls have some similar functions.

Identify two similarities and one difference between proxy-servers and firewalls.

Similarity 1 ................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

Similarity 2 ................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

Difference .................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[3]

© UCLES 2023 0478/12/F/M/23 [Turn over


4

2 A programmer has designed a three-dimensional (3D) interactive computer game. They are going
to develop a program for the game. The program needs to run efficiently, but it must also be
developed as soon as possible.

(a) Tick (✓) one box to identify whether the programmer should use a high-level language or a
low-level language to develop the program.

Explain the reasons for your choice.

High-level language

Low-level language

Reasons for your choice ...........................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [4]

(b) If the programmer chooses a high-level language, they can use a compiler or an interpreter to
translate the high-level language into a low-level language.

Describe the operation of a compiler and of an interpreter.

Compiler ...................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

Interpreter .................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[4]

© UCLES 2023 0478/12/F/M/23


5

3 A new computer comes with primary and secondary storage.

(a) Data storage is measured using binary denominations.

Complete each conversion.

8 bytes = .............................. nibbles

512 kibibytes (KiB) = .............................. mebibytes (MiB)

4 gibibytes (GiB) = .............................. mebibytes (MiB)

1 exbibyte (EiB) = .............................. pebibytes (PiB)


[4]
Working space

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

(b) Random access memory (RAM) is an example of primary storage.

Give three examples of data that is commonly stored in RAM.

1 ................................................................................................................................................

2 ................................................................................................................................................

3 ................................................................................................................................................
[3]

(c) Describe the purpose of secondary storage.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

© UCLES 2023 0478/12/F/M/23 [Turn over


6

4 A wildlife photographer stores their digital images on a computer.

(a) Complete the table by defining each term about images.

Image term Definition

...................................................................................................................

pixel ...................................................................................................................

...................................................................................................................

...................................................................................................................

resolution ...................................................................................................................

...................................................................................................................

[2]

(b) One of the images has a resolution of 1000 × 1000 and a colour depth of 2 bytes.

Calculate the file size of the image. Give your answer in bytes.

Show your working.

Working space ..........................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

File size ...................................... bytes


[2]

© UCLES 2023 0478/12/F/M/23


7

(c) The photographer decides to purchase a solid-state storage device to back up their images.

Complete the description of solid-state storage.

Use the terms from the list.

Some of the terms in the list will not be used. You should only use a term once.

binary denary electrons grid neutrons

non-volatile RAM star transistors virtual volatile

Solid-state storage is ........................................................... . This means that the data is not

lost when the power is turned off.

Solid-state storage is made of ........................................................... that are laid out in a

........................................................... .

Gates are used to control the flow of the ........................................................... through the

transistors. This changes the data in the transistors from 1 to 0, or from 0 to 1.


[4]

(d) The photographer compresses an image file before it is emailed.

Give one reason why a file is compressed.

...................................................................................................................................................

............................................................................................................................................. [1]

© UCLES 2023 0478/12/F/M/23 [Turn over


8

5 A website allows users to purchase items.

Computer A sends a request for the homepage to the website’s server.

(a) The request is sent using packet switching.

The structure of a packet of data has three elements. One element is the packet header.

(i) Identify two items of data contained in a packet header.

1 ........................................................................................................................................

2 ........................................................................................................................................
[2]

(ii) Identify the two other elements of a packet.

1 ........................................................................................................................................

2 ........................................................................................................................................
[2]

© UCLES 2023 0478/12/F/M/23


9

(b) Computer A needs to be directly connected to a router that is located in a different room.

(i) Tick (✓) one box to identify whether serial data transmission or parallel data transmission
is more suitable for this connection.

Explain the reasons for your choice.

Serial data transmission

Parallel data transmission

Reasons for your choice ...................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [3]

(ii) The connection will also use full-duplex data transmission.

Define full-duplex data transmission.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [2]

© UCLES 2023 0478/12/F/M/23 [Turn over


10

(c) The data transmission will use parity checks.

(i) The bytes need to be sent using an even parity byte check.

Complete the parity bit for each byte.

Parity
bit

Byte A 1 1 0 0 0 1 1

Byte B 0 0 0 0 0 0 0

[2]

(ii) A parity block check can be used instead of a parity byte check.

Explain how a parity block check might detect an error in transmission that would not be
detected by a parity byte check.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [2]

© UCLES 2023 0478/12/F/M/23


11

(iii) The data was sent using an even parity block check. One of the bits has been transmitted
incorrectly.

Parity
Bit 1 Bit 2 Bit 3 Bit 4 Bit 5 Bit 6 Bit 7
bit

Byte 0 1 1 1 0 1 0 0 0

Byte 1 0 0 1 0 0 1 0 0

Byte 2 1 0 1 1 0 0 0 1

Byte 3 1 1 0 0 1 1 1 1

Byte 4 1 0 1 0 0 0 1 0

Byte 5 0 0 0 0 0 0 0 0

Byte 6 0 1 1 1 1 0 0 0

Parity
0 1 1 0 1 0 1 0
byte

Identify the bit number and the byte number of the incorrect bit.

Bit number ......................................

Byte number ......................................


[2]

© UCLES 2023 0478/12/F/M/23 [Turn over


12

(d) The website allows the user to set up an account to log on and purchase items. The website
is accessed and displayed using a web browser.

(i) Two functions of the web browser are to render hypertext markup language (HTML) to
display web pages and to store cookies.

Identify two other functions of a web browser.

1 ........................................................................................................................................

2 ........................................................................................................................................
[2]

(ii) Identify two ways that cookies can be used to enhance the user’s experience of this
website.

1 ........................................................................................................................................

...........................................................................................................................................

2 ........................................................................................................................................

...........................................................................................................................................
[2]

© UCLES 2023 0478/12/F/M/23


13

6 A company is involved in robotics.

One of its robots is designed to make a specific movement depending on a binary value.

(a) The table gives some of the movements for the robot.

Complete the table by writing the missing binary, denary or hexadecimal value for each
movement.

Movement Binary Denary Hexadecimal

forward 1 step 00011111 31

back 1 step 140 8C

turn right 01011010 5A

turn left 120 78

[4]

Working space

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

(b) Describe what is meant by robotics.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

© UCLES 2023 0478/12/F/M/23 [Turn over


14

(c) The robot has a sensor and a microprocessor.

The robot will move forward continuously until it detects an object that is less than or equal to
10 cm in front of it.

If an object is less than or equal to 10 cm in front of it, the robot turns 90 degrees right. It then
tries to move forward again.

Explain how the sensor and the microprocessor are used to automate this robot.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [7]

© UCLES 2023 0478/12/F/M/23


15

(d) The robot needs to find its way through different puzzles. Each puzzle has a series of paths
that the robot needs to follow to find its way to the end of the puzzle. The puzzle contains
dead ends and obstacles, so the robot needs to decide which way to go.

The robot’s program will use artificial intelligence (AI).

(i) Describe the characteristics of AI.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [3]

(ii) Explain how the program will use AI.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [4]

© UCLES 2023 0478/12/F/M/23


16

BLANK PAGE

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.

Cambridge Assessment International Education is part of Cambridge Assessment. Cambridge Assessment is the brand name of the University of Cambridge
Local Examinations Syndicate (UCLES), which is a department of the University of Cambridge.

© UCLES 2023 0478/12/F/M/23


Cambridge IGCSE™
* 8 4 5 6 7 7 9 7 4 9 *

COMPUTER SCIENCE 0478/11


Paper 1 Computer Systems May/June 2023

1 hour 45 minutes

You must answer on the question paper.

No additional materials are needed.

INSTRUCTIONS
● Answer all questions.
● Use a black or dark blue pen. You may use an HB pencil for any diagrams or graphs.
● Write your name, centre number and candidate number in the boxes at the top of the page.
● Write your answer to each question in the space provided.
● Do not use an erasable pen or correction fluid.
● Do not write on any bar codes.
● Calculators must not be used in this paper.

INFORMATION
● The total mark for this paper is 75.
● The number of marks for each question or part question is shown in brackets [ ].
● No marks will be awarded for using brand names of software packages or hardware.

This document has 12 pages. Any blank pages are indicated.

DC (EF) 313965/2
© UCLES 2023 [Turn over
2

1 Binary is a number system used by computers.

(a) Tick (3) one box to show which statement about the binary number system is correct.

A It is a base 1 system

B It is a base 2 system

C It is a base 10 system

D It is a base 16 system
[1]

(b) Denary numbers are converted to binary numbers to be processed by a computer.

Convert these three denary numbers to 8-bit binary numbers.

50 ..............................................................................................................................................

102 ............................................................................................................................................

221 ............................................................................................................................................
[3]

Working space

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

© UCLES 2023 0478/11/M/J/23


3

(c) Binary numbers are stored in registers.

Negative denary numbers can be represented as binary using two’s complement.

Complete the binary register for the denary number –78

You must show all your working.

Working space ..........................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

Register:

[2]

(d) Two 8-bit binary numbers are given.

Add the two 8-bit binary numbers using binary addition.

Give your answer in binary. Show all your working.

00110011
+01100001

[3]

(e) Two binary numbers are added by a computer and an overflow error occurs.

Explain why the overflow error occurred.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

© UCLES 2023 0478/11/M/J/23 [Turn over


4

2 A student has a sound file that is too large to be stored on their external secondary storage device.
The student compresses the sound file to make the file size smaller.

The compression method used reduces the sample rate and the sample resolution of the sound
file.

(a) State what is meant by the sample rate and sample resolution.

Sample rate ..............................................................................................................................

...................................................................................................................................................

Sample resolution .....................................................................................................................

...................................................................................................................................................
[2]

(b) Identify which type of compression has been used to compress the sound file.

...................................................................................................................................................

............................................................................................................................................. [1]

(c) The student sends the sound file to a friend. The file is transmitted across a network that uses
packet switching.

(i) Identify two pieces of data that would be included in the header of each packet.

1 ........................................................................................................................................

2 ........................................................................................................................................
[2]

(ii) Explain how the file is transmitted using packet switching.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [5]

© UCLES 2023 0478/11/M/J/23


5

3 Secondary storage devices are used to store data in a computer.

(a) Circle three components that are secondary storage devices.

central processing unit (CPU) compact disk (CD)

hard disk drive (HDD) random access memory (RAM) read only memory (ROM)

register sensor solid-state drive (SSD)

[3]

(b) Tick (3) one box to show which statement about secondary storage is correct.

A It is directly accessed by the CPU.

B It is magnetic storage only.

C It is used to permanently store software and data files.

D It is volatile.
[1]

4 Complete the statements about different types of software.

Use the terms from the list.

Some of the terms in the list will not be used. You should only use a term once.

application assembly language bootloader central processing unit (CPU)

firmware hardware operating output system user

........................................................................ software provides the services that the computer

requires; an example is utility software.

........................................................................ software is run on the operating system.

The ........................................................................ system is run on the firmware, which is run on

the ........................................................................ .
[4]

© UCLES 2023 0478/11/M/J/23 [Turn over


6

5 A farm has an automated drinking system for its animals. The drinking system has a water bowl
that contains the water. When the water bowl is empty, it is automatically refilled.

The system uses a sensor and a microprocessor.

(a) Identify the most appropriate sensor for this system.

............................................................................................................................................. [1]

(b) Describe how the sensor and the microprocessor are used to automatically refill the water
bowl.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [6]

© UCLES 2023 0478/11/M/J/23


7

6 A user wants to connect their computer to a network.

(a) (i) Identify the component in the computer that is needed to access a network.

..................................................................................................................................... [1]

(ii) Identify the type of address that is allocated to the component by the manufacturer,
which is used to uniquely identify the device.

..................................................................................................................................... [1]

(b) A dynamic internet protocol (IP) address is allocated to the computer when it is connected to
the network.

(i) Identify the device on the network that can connect multiple devices and automatically
assign them an IP address.

..................................................................................................................................... [1]

(ii) Describe what is meant by a dynamic IP address.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [3]

7 A programmer uses a low-level language to write a computer program for a vending machine.

(a) Describe what is meant by a low-level language.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

(b) Give two reasons why the programmer would choose to write the computer program in a
low-level language instead of a high-level language.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................
[2]
© UCLES 2023 0478/11/M/J/23 [Turn over
8

8 A manager at a company is concerned about a brute-force attack on its employee user accounts.

(a) Describe how a brute-force attack can be used to gain access to the employee user accounts.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [3]

(b) One possible aim for carrying out a brute-force attack is to install malware onto the company
network.

(i) State two other aims for carrying out a brute-force attack to gain access to the employee
user accounts.

1 ........................................................................................................................................

...........................................................................................................................................

2 ........................................................................................................................................

...........................................................................................................................................
[2]

(ii) Identify three types of malware that could be installed.

1 ........................................................................................................................................

2 ........................................................................................................................................

3 ........................................................................................................................................
[3]

(c) Give two security solutions that could be used to help prevent a brute-force attack being
successful.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................
[2]

© UCLES 2023 0478/11/M/J/23


9

9 A company uses robots in its factory to manufacture large pieces of furniture.

(a) One characteristic of a robot is that it is programmable.

State two other characteristics of a robot.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................
[2]

(b) Give two advantages to company employees of using robots to manufacture large pieces of
furniture.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................
[2]

(c) Give one disadvantage to the company’s owners of using robots to manufacture large pieces
of furniture.

...................................................................................................................................................

............................................................................................................................................. [1]

© UCLES 2023 0478/11/M/J/23 [Turn over


10

10 A student uses the internet for their schoolwork to research what is meant by pharming.

(a) State the aim of pharming.

...................................................................................................................................................

............................................................................................................................................. [1]

(b) Draw and annotate a diagram to represent the process of pharming.

[4]

(c) The student uses a web browser to access data on the internet.

Explain the purpose of the web browser.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

© UCLES 2023 0478/11/M/J/23


11

(d) Storing cookies is one function of the web browser.

Give three other functions of the web browser.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................

3 ................................................................................................................................................

...................................................................................................................................................
[3]

(e) A student visits a website that uses session cookies, instead of persistent cookies.

Explain the difference between session cookies and persistent cookies.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [4]

© UCLES 2023 0478/11/M/J/23


12

BLANK PAGE

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.

Cambridge Assessment International Education is part of Cambridge Assessment. Cambridge Assessment is the brand name of the University of Cambridge
Local Examinations Syndicate (UCLES), which is a department of the University of Cambridge.

© UCLES 2023 0478/11/M/J/23


Cambridge IGCSE™
* 8 1 0 7 6 2 2 0 5 5 *

COMPUTER SCIENCE 0478/12


Paper 1 Computer Systems May/June 2023

1 hour 45 minutes

You must answer on the question paper.

No additional materials are needed.

INSTRUCTIONS
● Answer all questions.
● Use a black or dark blue pen. You may use an HB pencil for any diagrams or graphs.
● Write your name, centre number and candidate number in the boxes at the top of the page.
● Write your answer to each question in the space provided.
● Do not use an erasable pen or correction fluid.
● Do not write on any bar codes.
● Calculators must not be used in this paper.

INFORMATION
● The total mark for this paper is 75.
● The number of marks for each question or part question is shown in brackets [ ].
● No marks will be awarded for using brand names of software packages or hardware.

This document has 12 pages. Any blank pages are indicated.

DC (EF) 313966/2
© UCLES 2023 [Turn over
2

1 Output devices are used to output data from a computer.

Circle three devices that are output devices.

actuator digital versatile disk (DVD) keyboard

microphone mouse printer scanner

sensor solid-state drive (SSD) speaker


[3]

2 Binary numbers can be converted to hexadecimal.

(a) Convert the two binary numbers to hexadecimal.

10010011 ..................................................................................................................................

00001101 ..................................................................................................................................
[4]

Working space

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

(b) A value is stored as a binary number in a register.

0 1 1 1 1 0 1 0

A logical right shift of three places is performed on the binary number.

(i) Complete the binary register to show its contents after this logical right shift.

[1]

(ii) State one effect this logical shift has on the binary number.

...........................................................................................................................................

..................................................................................................................................... [1]

© UCLES 2023 0478/12/M/J/23


3

(c) Give two reasons why a programmer may use hexadecimal to represent binary numbers.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................
[2]

(d) Denary numbers can also be converted to hexadecimal.

Convert the denary number to hexadecimal.

301 ...................................................................................................................................... [2]

Working space

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

© UCLES 2023 0478/12/M/J/23 [Turn over


4

3 When keys are pressed on a keyboard, the text is converted to binary to be processed by the
computer.

(a) Describe how the text is converted to binary to be processed by the computer.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [3]

(b) Text that is input into a computer can be stored in a text file.

A text file can be compressed using lossless compression.

(i) State what effect this has on the file size.

...........................................................................................................................................

..................................................................................................................................... [1]

(ii) Describe how lossless compression compresses the text file.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [4]

(iii) Give two reasons why the text file may have been compressed.

1 ........................................................................................................................................

...........................................................................................................................................

2 ........................................................................................................................................

...........................................................................................................................................
[2]

© UCLES 2023 0478/12/M/J/23


5

4 A student uses a mobile phone to take photographs for a school project.

The student needs to transmit the photographs to their computer. They could use serial data
transmission or parallel data transmission to transmit the photographs.

(a) (i) Describe how the photographs would be transmitted using serial data transmission.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [2]

(ii) Give two benefits of transmitting the photographs using serial data transmission.

1 ........................................................................................................................................

...........................................................................................................................................

2 ........................................................................................................................................

...........................................................................................................................................
[2]

(iii) State one benefit of the student using parallel data transmission instead of serial data
transmission.

...........................................................................................................................................

..................................................................................................................................... [1]

(b) The photographs are also transmitted across a network to cloud storage. A device on the
network forwards the data towards its correct destination.

(i) State the name of this device.

..................................................................................................................................... [1]

(ii) Describe what is meant by cloud storage.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [2]

(iii) Give one disadvantage of storing the photographs in cloud storage instead of storing
them locally.

...........................................................................................................................................

..................................................................................................................................... [1]
© UCLES 2023 0478/12/M/J/23 [Turn over
6

5 A programmer writes a computer program using a high-level language.

(a) Tick (3) one box to show which statement is correct about writing computer programs in a
high-level language.

A Mnemonics are used to create instructions.

B The computer program is harder to debug than a low-level language program.

C The computer program is machine independent.

D The hardware of the computer can be directly manipulated.


[1]

(b) The programmer uses a compiler to translate the computer program.

(i) Describe how the compiler translates the computer program.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [3]

(ii) Describe how the compiler reports errors.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [2]

(c) The programmer uses an integrated development environment (IDE) to create the computer
program.

One function of the IDE is that it has the built-in compiler.

Give three other common functions of an IDE.

1 ................................................................................................................................................

2 ................................................................................................................................................

3 ................................................................................................................................................
[3]

© UCLES 2023 0478/12/M/J/23


7

6 (a) Complete the statements about cookies.

Use the terms from the list.

Some of the terms in the list will not be used. Some terms may be used more than once.

compression executable hypertext markup language (HTML)

hypertext transfer protocol (HTTP) image internet protocol (IP) address

persistent session sound text

uniform resource locater (URL) web browser web server

Cookies are small ........................................................... files that are sent between a

........................................................... and a ........................................................... .

........................................................... cookies are stored in memory and not in the user’s

secondary storage.

When the web browser is closed a ........................................................... cookie is lost,

whereas a ........................................................... cookie is not lost.


[6]

(b) Give three functions of a cookie.

1 ................................................................................................................................................

2 ................................................................................................................................................

3 ................................................................................................................................................
[3]

© UCLES 2023 0478/12/M/J/23 [Turn over


8

7 A distributed denial of service attack (DDoS) is a cyber security threat.

(a) Draw and annotate a diagram to represent the process of a DDoS.

[6]

© UCLES 2023 0478/12/M/J/23


9

(b) State two aims of carrying out a DDoS attack.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................
[2]

(c) Give two security solutions that can be used to help prevent a DDoS attack being successful.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................
[2]

8 A computer is connected to a network and assigned an IPv4 address.

(a) Tick (3) one box to show which device would assign the IPv4 address to the computer.

A Domain name server (DNS)

B Network interface card (NIC)

C Router

D Web server
[1]

(b) Describe the characteristics of an IPv4 address.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [4]

© UCLES 2023 0478/12/M/J/23 [Turn over


10

9 One component of an expert system is the inference engine.

(a) Identify the three other components in an expert system.

1 ................................................................................................................................................

2 ................................................................................................................................................

3 ................................................................................................................................................
[3]

(b) Describe the role of the inference engine in an expert system.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

© UCLES 2023 0478/12/M/J/23


11

10 A user has both system software and application software installed on their computer.

(a) Describe the difference between system software and application software.

Give an example of each software in your answer.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [4]

(b) State which component in the computer would store both types of software when the power is
turned off.

............................................................................................................................................. [1]

© UCLES 2023 0478/12/M/J/23


12

BLANK PAGE

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.

Cambridge Assessment International Education is part of Cambridge Assessment. Cambridge Assessment is the brand name of the University of Cambridge
Local Examinations Syndicate (UCLES), which is a department of the University of Cambridge.

© UCLES 2023 0478/12/M/J/23


Cambridge IGCSE™
* 4 6 2 4 3 2 5 5 3 0 *

COMPUTER SCIENCE 0478/13


Paper 1 Computer Systems May/June 2023

1 hour 45 minutes

You must answer on the question paper.

No additional materials are needed.

INSTRUCTIONS
● Answer all questions.
● Use a black or dark blue pen. You may use an HB pencil for any diagrams or graphs.
● Write your name, centre number and candidate number in the boxes at the top of the page.
● Write your answer to each question in the space provided.
● Do not use an erasable pen or correction fluid.
● Do not write on any bar codes.
● Calculators must not be used in this paper.

INFORMATION
● The total mark for this paper is 75.
● The number of marks for each question or part question is shown in brackets [ ].
● No marks will be awarded for using brand names of software packages or hardware.

This document has 12 pages.

DC (CJ) 313967/3
© UCLES 2023 [Turn over
2

1 Computers store data as binary. The binary number 10101110 is stored.

(a) Convert the binary number to denary.

............................................................................................................................................. [1]

Working space

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

(b) Convert the binary number to hexadecimal.

............................................................................................................................................. [2]

Working space

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

(c) A logical left shift of three places is performed on the binary number.

(i) Give the 8-bit binary number that would be stored after this logical left shift.

..................................................................................................................................... [1]

(ii) Tick (3) one box to show which statement is true about the impact the logical left binary
shift would have on the binary number.

A The least significant bits are lost.

B The most significant bits are lost.

C The number has been divided by six.

D The number stays the same.


[1]

© UCLES 2023 0478/13/M/J/23


3

(d) Add the two 8-bit binary numbers 11101110 and 00110001 using binary addition.

Give your answer in binary. Show all your working.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [4]

(e) The denary number 301 needs to be stored.

Calculate the least number of bits that can be used to store the denary number 301.

............................................................................................................................................. [1]

Working space

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

(f) The hexadecimal number A4D needs to be stored.

Calculate the least number of bits that can be used to store the hexadecimal number A4D.

............................................................................................................................................. [1]

Working space

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

© UCLES 2023 0478/13/M/J/23 [Turn over


4

2 A library has a self-checkout system that allows customers to register books that they want to
borrow.

The self-checkout system has a central processing unit (CPU).

The CPU has two cores.

(a) State the purpose of a core in the CPU.

...................................................................................................................................................

............................................................................................................................................. [1]

(b) The CPU is replaced with one that has four cores.

Explain the effect this has on the performance of the self-checkout system.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

(c) The CPU contains registers and buses.

(i) Describe the role of a register in the CPU.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [2]

(ii) Identify one bus that can be found in the CPU and explain its purpose in the
fetch–decode–execute cycle.

Bus ....................................................................................................................................

Purpose .............................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................
[3]

© UCLES 2023 0478/13/M/J/23


5

(d) The self-checkout system allows the user to input their library membership number.

Give two appropriate input devices that would allow the user to do this.

1 ................................................................................................................................................

2 ................................................................................................................................................
[2]

(e) The self-checkout system uses a monitor to display information about the book.

Users who are blind also need to use the self-checkout system.

Give an appropriate output device that would allow a blind user to be given this information.

............................................................................................................................................. [1]

(f) The self-checkout system uses two types of primary storage.

Circle two types of primary storage that would be used in the system.

compact disk (CD) digital versatile disk (DVD)

hard disk drive (HDD) random access memory (RAM)

read only memory (ROM) universal serial bus (USB) flash memory drive
[2]

(g) The self-checkout system is linked to a stock control system that is updated every time a
book is borrowed from the library.

A microprocessor is used in the stock control system to update the stock.

Explain the role of the microprocessor in this system and how it is used to update the stock
when a book is borrowed.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [3]

© UCLES 2023 0478/13/M/J/23 [Turn over


6

3 Five network terms or definitions are given in the table.

Complete the table by giving the missing term or definition.

Term Definition

.............................................................................................

.............................................................................................
router
.............................................................................................

.............................................................................................

This address is assigned by the network and used to


identify a device on a network.
.............................................................

.............................................................................................

.............................................................................................
network interface card (NIC)
.............................................................................................

.............................................................................................

This address is assigned by the manufacturer and is used


to uniquely identify the device.
.............................................................

This can be hardware or software based and filters traffic


coming into and out of a network.
.............................................................
[5]

© UCLES 2023 0478/13/M/J/23


7

4 A programmer writes a computer program in a high-level language.

(a) Tick (3) one box to show which statement is a benefit of writing a program in a high-level
language, instead of a low-level language.

A The program can directly manipulate the hardware.

B The program is machine independent.

C The program is more memory efficient.

D The program is quicker to execute.


[1]

(b) Translators are used to translate the high-level language so that it can be processed by the
computer.

(i) State what the high-level language is translated into.

..................................................................................................................................... [1]

(ii) One translator converts and executes the code line by line.

Identify which type of translator would do this.

..................................................................................................................................... [1]

(iii) One translator creates an error report displaying all the errors in the code before it can
be executed.

Identify which type of translator would do this.

..................................................................................................................................... [1]

(iv) One translator creates an executable file.

Identify which type of translator would do this.

..................................................................................................................................... [1]

© UCLES 2023 0478/13/M/J/23 [Turn over


8

5 Complete and annotate the diagram to demonstrate how packet switching is used to transmit data
across a network, including the use of routers, from Device A to Device B.

Device A Device B

[4]

6 A student is writing a help guide about how to recognise and avoid the cyber-security threat of
pharming.

(a) Give three appropriate solutions he could include.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................

3 ................................................................................................................................................

...................................................................................................................................................
[3]

© UCLES 2023 0478/13/M/J/23


9

(b) The student also wants to include information in the help guide about the use of social
engineering as a cyber-security threat.

Describe what is meant by social engineering.

Include one example of social engineering in your answer.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [3]

(c) The student includes information about the security solution of access levels.

Describe what is meant by access levels.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [3]

7 The rule base and the inference engine are two components of an expert system.

(a) Identify the other two components of an expert system.

1 ................................................................................................................................................

2 ................................................................................................................................................
[2]

(b) Describe the role of the rule base in an expert system.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

© UCLES 2023 0478/13/M/J/23 [Turn over


10

8 Complete the statements about a distributed denial of service (DDoS) attack.

Use the terms from the list.

Some of the terms in the list will not be used. You should only use a term once.

anti-virus bot botnet hacker

internet malware secondary storage

spyware web browser web server website

The attacker encourages people to download ...................................................................... onto

their computer. This will turn each computer into a ...................................................................... ,

creating a network called a ...................................................................... .

When the attacker wants the DDoS to take place, repeated requests are simultaneously sent from

the computers to a ...................................................................... . This causes it to crash, meaning

that users can no longer access the ...................................................................... that is stored on

this hardware.
[5]

9 A device can be given an internet protocol (IP) address. This can be an IPv4 or IPv6.

(a) Give one similarity between IPv4 and IPv6.

...................................................................................................................................................

............................................................................................................................................. [1]

(b) Describe two differences between IPv4 and IPv6.

1 ................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[4]

© UCLES 2023 0478/13/M/J/23


11

(c) A web page is requested using an IP address.

(i) Identify the system that stores a database of uniform resource locators (URLs) and their
corresponding IP addresses.

..................................................................................................................................... [1]

(ii) Identify the software that sends a request to the IP address to obtain the web page data.

..................................................................................................................................... [1]

10 A computer has pages A, B and C that are stored in RAM. Page D needs to be sent to the RAM
but the RAM is full.

Page B is not needed immediately.

Explain how virtual memory can be used in this scenario.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

.................................................................................................................................................... [4]

© UCLES 2023 0478/13/M/J/23 [Turn over


12

11 Software is installed on a computer to manage files, memory and multitasking.

(a) State the name of the software that can do these tasks.

............................................................................................................................................. [1]

(b) Give one task that the software allows the user to do to manage files.

............................................................................................................................................. [1]

(c) Describe what is meant by managing memory.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

(d) A signal is sent within the computer to allow multitasking to occur.

State the name of this type of signal.

............................................................................................................................................. [1]

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.

Cambridge Assessment International Education is part of Cambridge Assessment. Cambridge Assessment is the brand name of the University of Cambridge
Local Examinations Syndicate (UCLES), which is a department of the University of Cambridge.

© UCLES 2023 0478/13/M/J/23


Cambridge IGCSE™
* 7 7 1 9 9 1 0 7 7 6 *

COMPUTER SCIENCE 0478/11


Paper 1 Computer Systems October/November 2023

1 hour 45 minutes

You must answer on the question paper.

No additional materials are needed.

INSTRUCTIONS
● Answer all questions.
● Use a black or dark blue pen. You may use an HB pencil for any diagrams or graphs.
● Write your name, centre number and candidate number in the boxes at the top of the page.
● Write your answer to each question in the space provided.
● Do not use an erasable pen or correction fluid.
● Do not write on any bar codes.
● Calculators must not be used in this paper.

INFORMATION
● The total mark for this paper is 75.
● The number of marks for each question or part question is shown in brackets [ ].
● No marks will be awarded for using brand names of software packages or hardware.

This document has 12 pages. Any blank pages are indicated.

DC (LK) 314031/3
© UCLES 2023 [Turn over
2

1 A student uses a computer and several hardware devices to complete his schoolwork.

The computer has a central processing unit (CPU).

(a) The student uses a keyboard to complete his schoolwork.

Tick (3) one box to show which type of device the keyboard is.

A input

B memory

C output

D storage
[1]

(b) The student uses a printer to print his schoolwork.

Tick (3) one box to show which type of device the printer is.

A input

B memory

C output

D storage
[1]

(c) A component in the CPU sends signals to manage the fetch-decode-execute cycle.

State the name of this component.

............................................................................................................................................. [1]

(d) The CPU has a clock speed of 2.4 Ghz.

Describe what is meant by a 2.4 Ghz clock speed.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

© UCLES 2023 0478/11/O/N/23


3

(e) The CPU contains registers including the memory data register (MDR).

(i) Describe the role of the MDR in the fetch-decode-execute cycle.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [2]

(ii) Identify three other registers contained in the CPU.

1 ........................................................................................................................................

2 ........................................................................................................................................

3 ........................................................................................................................................
[3]

2 A car park has a payment machine that allows a customer to pay for their parking.

The cost of parking is displayed as a denary number on a screen on the payment machine.

The cost of parking is stored in two 8-bit binary registers.

For the parking cost of $10.50:


• register 1 stores the denary value 10 as binary
• register 2 stores the denary value 50 as binary.

(a) Give the parking cost that would be displayed on the payment machine when the registers
store:
• register 1: 00010001
• register 2: 01000110

Parking cost displayed $ ............................................................................... [2]

Working space

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

© UCLES 2023 0478/11/O/N/23 [Turn over


4

(b) The parking cost of $14.98 is displayed on the payment machine.

Give the 8-bit binary numbers that are stored in the registers to display the parking cost.

Register 1 .................................................................................................................................

Register 2 .................................................................................................................................
[2]

Working space

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

(c) The payment machine gives the customer a ticket when they have paid their parking cost.
Each ticket has a 4-digit hexadecimal ticket number that is stored as binary.

The binary number 1010000000111101 is stored for a customer’s ticket number.

Give the hexadecimal ticket number that would be displayed on this customer’s ticket.

Hexadecimal ticket number ................................................................................................ [4]

Working space

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

(d) Explain why data input into the payment machine needs to be converted to binary.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

© UCLES 2023 0478/11/O/N/23


5

(e) When a customer is leaving the car park they arrive at a barrier. The customer needs to insert
their ticket into a system at the barrier. This system reads the ticket number then checks
whether the parking cost has been paid for the car. The barrier is raised if it has been paid.

The system uses a microprocessor.

Describe the role of the microprocessor in the system and how it checks whether the parking
cost has been paid.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [4]

3 The table contains four descriptions about a computer system.

Complete the table by writing the correct term for each description.

Term Description

A collective term for the physical components


....................................................................... of the computer system.

A type of software that provides services


that the user requires and allows the user to
.......................................................................
perform tasks on the computer.

A type of software that manages the


main functions of the computer, including
.......................................................................
managing files and managing memory.

A type of software that is stored in the


read only memory (ROM). It includes the
....................................................................... basic input output system (BIOS) and the
bootloader.
[4]

© UCLES 2023 0478/11/O/N/23 [Turn over


6

4 Data is transmitted between a computer and a printer.

(a) The data is transmitted one bit at a time down a single wire. The computer can transmit data
to the printer and the printer can transmit data to the computer, using the same connection.

Circle the two data transmission methods that will transmit data in this way.

parallel full-duplex parallel half-duplex parallel simplex

serial full-duplex serial half-duplex serial simplex


[2]

(b) An odd parity check is used to detect errors in the data transmission.

Explain how the odd parity check detects errors.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [4]

(c) Another error detection method sends the data from the computer to the printer, then a copy
of the data received is sent back from the printer to the computer. The two sets of data are
compared to see if they match.

State the name of this type of error detection method.

............................................................................................................................................. [1]

© UCLES 2023 0478/11/O/N/23


7

5 A musician is recording herself playing the music for a song on the piano.

(a) Explain how the analogue sound is recorded and converted to digital.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [5]

(b) State two ways that the accuracy of the recording could be increased.

1 ................................................................................................................................................

2 ................................................................................................................................................
[2]

(c) The musician compresses the sound file using lossless compression instead of lossy
compression.

Explain why the musician would choose to use lossless compression instead of lossy
compression.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [3]

© UCLES 2023 0478/11/O/N/23 [Turn over


8

(d) The musician types the words for the song into a document.

Two character sets that can be used when converting text to digital are the American standard
code for information interchange (ASCII) and Unicode.

Explain the differences between the ASCII character set and the Unicode character set.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [4]

6 Draw and annotate a diagram to demonstrate how a firewall works.

[4]
© UCLES 2023 0478/11/O/N/23
9

7 Complete the statements about data packets and packet switching.

Use the terms from the list.

Some of the terms in the list will not be used. You should only use a term once.

destination address first footer header

last main data packets payload

routers servers trailer

Data is broken down into packets. A data packet has a packet .......................................................

that contains the packet number and the ....................................................... .

Each packet could take a different path from the sender to the receiver; this is controlled by

...................................................... .

Packets may arrive out of order. Once the ...................................................... packet has arrived,

the packets are reordered.


[4]

8 Storage can be described as being magnetic, solid-state or optical.

(a) Give two features of magnetic storage.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................
[2]

(b) Give three features of solid-state storage.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................

3 ................................................................................................................................................

...................................................................................................................................................
[3]
© UCLES 2023 0478/11/O/N/23 [Turn over
10

(c) Give one example of each type of storage.

Magnetic ...................................................................................................................................

Solid-state .................................................................................................................................

Optical ......................................................................................................................................
[3]

9 An interrupt is a type of signal that is used in a computer.

(a) State the name of the type of software that manages interrupts.

............................................................................................................................................. [1]

(b) Describe how interrupts are used when a key is pressed on a keyboard.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [5]

(c) Interrupts can be hardware based or software based.

A key press is one example of a hardware interrupt.

(i) Give two other examples of a hardware interrupt.

1 ........................................................................................................................................

...........................................................................................................................................

2 ........................................................................................................................................

...........................................................................................................................................
[2]

© UCLES 2023 0478/11/O/N/23


11

(ii) Give two examples of a software interrupt.

1 ........................................................................................................................................

...........................................................................................................................................

2 ........................................................................................................................................

...........................................................................................................................................
[2]

© UCLES 2023 0478/11/O/N/23


12

BLANK PAGE

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.

Cambridge Assessment International Education is part of Cambridge Assessment. Cambridge Assessment is the brand name of the University of Cambridge
Local Examinations Syndicate (UCLES), which is a department of the University of Cambridge.

© UCLES 2023 0478/11/O/N/23


Cambridge IGCSE™
* 9 1 5 0 6 4 5 6 9 9 *

COMPUTER SCIENCE 0478/12


Paper 1 Computer Systems October/November 2023

1 hour 45 minutes

You must answer on the question paper.

No additional materials are needed.

INSTRUCTIONS
● Answer all questions.
● Use a black or dark blue pen. You may use an HB pencil for any diagrams or graphs.
● Write your name, centre number and candidate number in the boxes at the top of the page.
● Write your answer to each question in the space provided.
● Do not use an erasable pen or correction fluid.
● Do not write on any bar codes.
● Calculators must not be used in this paper.

INFORMATION
● The total mark for this paper is 75.
● The number of marks for each question or part question is shown in brackets [ ].
● No marks will be awarded for using brand names of software packages or hardware.

This document has 12 pages.

DC (LK) 314033/2
© UCLES 2023 [Turn over
2

1 Malware can be used to corrupt data stored on a computer.

(a) Tick (3) one box to show which cyber security threat is not a type of malware.

A Phishing

B Ransomware

C Virus

D Worm
[1]

(b) Identify one other example of malware than those given in part 1(a).

............................................................................................................................................. [1]

(c) Identify the type of software that is used to find and remove malware from a computer.

............................................................................................................................................. [1]

2 A register stores the binary number:

1 1 1 0 0 0 1 1

(a) Give the denary number for the binary number stored in the register.

............................................................................................................................................. [1]

Working space

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

(b) Give the hexadecimal number for the binary number stored in the register.

............................................................................................................................................. [2]

Working space

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

© UCLES 2023 0478/12/O/N/23


3

(c) A logical left shift of two places is performed on the binary number stored in the register.

Complete the binary register to show its contents after this logical left shift.

[1]

(d) The negative denary number −99 needs to be stored in the register.

Complete the register to show the binary number that would be stored, using two’s
complement. Show all your working.

Working space ..........................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

Register:
[2]

(e) The number 01001100 is added to 11100011

Add the two 8-bit binary numbers, using binary addition.

Give your answer in binary. Show all your working.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [4]

© UCLES 2023 0478/12/O/N/23 [Turn over


4

3 A user’s computer has a central processing unit (CPU) that has a clock speed of 2 GHz.

She wants to change it to a CPU that has a clock speed of 3 GHz.

(a) (i) State what is meant by clock speed.

...........................................................................................................................................

..................................................................................................................................... [1]

(ii) Explain the effect this change will have on the performance of the CPU.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [2]

(b) The CPU contains a memory address register (MAR).

Describe the role of the MAR in the fetch–decode–execute cycle.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

(c) The CPU has a list of all the machine code commands it can process.

State the name of this list of commands.

............................................................................................................................................. [1]

4 A washing machine is an example of an embedded system.

(a) Give two characteristics of an embedded system.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................
[2]

© UCLES 2023 0478/12/O/N/23


5

(b) Circle three other examples of an embedded system.

freezer laptop

personal computer (PC) security light system smartphone

vending machine web server


[3]

5 A band is recording their new song. They need to consider the sample rate and sample resolution
of their recording.

(a) Give one benefit of using a higher sample rate to record the song.

...................................................................................................................................................

............................................................................................................................................. [1]

(b) Give one drawback of using a higher sample rate to record the song.

...................................................................................................................................................

............................................................................................................................................. [1]

(c) Describe what is meant by sample resolution.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

(d) The band wants to compress the sound file, but they do not want any data to be permanently
removed.

Identify the compression method that should be used.

............................................................................................................................................. [1]

© UCLES 2023 0478/12/O/N/23 [Turn over


6

6 The table contains descriptions about data transmission methods.

Complete the table by identifying which data transmission methods are described.

Data transmission method Description

Data is transmitted down a single wire, one bit at a time,


............................................................ in one direction only.

Data is transmitted down multiple wires, multiple bits at a


............................................................ time, in both directions, but only one direction at a time.

Data is transmitted down a single wire, one bit at a time,


............................................................ in both directions at the same time.

Data is transmitted down multiple wires, multiple bits at


............................................................ a time, in one direction only.

[4]

7 A train station has a ticket inspector who checks each customer’s ticket before they are allowed to
get on the train.

The train station wants a system that will allow the tickets to be automatically checked.

(a) Identify two suitable input devices that can be used to automatically read the tickets.

1 ................................................................................................................................................

2 ................................................................................................................................................
[2]

© UCLES 2023 0478/12/O/N/23


7

(b) The train driver pushes a button to close the train door when all passengers have boarded
the train. The train door will only close when there are no passengers in the doorway.

The system to check there are no passengers in the doorway uses a sensor and a
microprocessor.

Explain how the sensor and the microprocessor are used to check whether the train door can
be closed.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [6]

© UCLES 2023 0478/12/O/N/23 [Turn over


8

8 (a) Draw and annotate a diagram that demonstrates the cyber security threat of data interception.

[4]

(b) Identify one security solution that will help keep data safe from data interception and state
why it will help keep the data safe.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]
© UCLES 2023 0478/12/O/N/23
9

9 The table contains terms and descriptions about the internet.

Complete the table with the missing terms and descriptions.

Term Description

.................................................. the collective name for all the web pages available

a small text file, stored by the web browser, that can store
..................................................
a user’s personal data

...........................................................................................

uniform resource locator (URL) ...........................................................................................

...........................................................................................

...........................................................................................

web server ...........................................................................................

...........................................................................................

the language used to create a website. Example tags are


..................................................
<head> and <body>

.................................................. a protocol that is used to request and send web pages

[6]

© UCLES 2023 0478/12/O/N/23 [Turn over


10

10 A business has a system that is described as having artificial intelligence (AI).

(a) State one of the main characteristics of an AI system.

...................................................................................................................................................

............................................................................................................................................. [1]

(b) An AI system is an expert system.

Explain how an expert system operates.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [6]

11 A manufacturing company uses an automated system in its manufacturing process.

(a) The automated system uses a flow sensor.

Identify what a flow sensor measures.

...................................................................................................................................................

............................................................................................................................................. [1]

© UCLES 2023 0478/12/O/N/23


11

(b) Explain one advantage to employees of using an automated system in manufacturing.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

(c) Explain one disadvantage to the company owner of using an automated system in
manufacturing.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

12 Digital currency can be used to pay for products and services.

Digital currencies are often tracked using digital ledgers.

(a) Give two other features of digital currency.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................
[2]

(b) Identify the process that uses a digital ledger to track the use of digital currency.

............................................................................................................................................. [1]

© UCLES 2023 0478/12/O/N/23 [Turn over


12

13 Storage and memory are important components of a computer system.

(a) Primary storage is one type of storage in a computer system.

(i) Tick (3) one box to show which is an example of primary storage.

A compact disk (CD)

B hard disk drive (HDD)

C random access memory (RAM)

D solid-state drive (SSD)


[1]

(ii) Give one characteristic of primary storage.

..................................................................................................................................... [1]

(b) Virtual memory can be created in a computer system.

Complete the description about virtual memory.

Use the terms from the list.

Some of the terms in the list will not be used. Some terms may be used more than once.

binary hard disk drive (HDD) hexadecimal operating system

pages random access memory (RAM) read only memory (ROM)

sectors software tracks virtual memory

Virtual memory is used when the ...................................................................... is full. It is

created by partitioning the ...................................................................... . Data is divided into

...................................................................... that can be sent from

...................................................................... to the

...................................................................... to be temporarily stored until they are required.


[5]

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.

Cambridge Assessment International Education is part of Cambridge Assessment. Cambridge Assessment is the brand name of the University of Cambridge
Local Examinations Syndicate (UCLES), which is a department of the University of Cambridge.

© UCLES 2023 0478/12/O/N/23


Cambridge IGCSE™
* 2 3 6 8 9 8 2 0 0 8 *

COMPUTER SCIENCE 0478/13


Paper 1 Computer Systems October/November 2023

1 hour 45 minutes

You must answer on the question paper.

No additional materials are needed.

INSTRUCTIONS
● Answer all questions.
● Use a black or dark blue pen. You may use an HB pencil for any diagrams or graphs.
● Write your name, centre number and candidate number in the boxes at the top of the page.
● Write your answer to each question in the space provided.
● Do not use an erasable pen or correction fluid.
● Do not write on any bar codes.
● Calculators must not be used in this paper.

INFORMATION
● The total mark for this paper is 75.
● The number of marks for each question or part question is shown in brackets [ ].
● No marks will be awarded for using brand names of software packages or hardware.

This document has 12 pages. Any blank pages are indicated.

DC (LK) 314035/3
© UCLES 2023 [Turn over
2

1 A mobile telephone has built-in input and output devices.

(a) Give two examples of an input device that would be built into a mobile telephone.

1 ................................................................................................................................................

2 ................................................................................................................................................
[2]

(b) Give one example of an output device that would be built into a mobile telephone.

............................................................................................................................................. [1]

(c) The data storage in the mobile telephone can be measured using different units of
measurement.

(i) State how many bits are equal to a byte.

..................................................................................................................................... [1]

(ii) State how many kibibytes (KiB) equal a mebibyte (MiB).

..................................................................................................................................... [1]

(d) The mobile telephone has an operating system.

Describe the purpose of the operating system.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [3]

2 Humans use a denary number system and computers use a binary number system.

(a) Explain what is meant by a binary number system.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

© UCLES 2023 0478/13/O/N/23


3

(b) Convert the denary numbers 14, 59 and 234 to binary.

14 ..............................................................................................................................................

59 ..............................................................................................................................................

234 ............................................................................................................................................
[3]

Working space

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

(c) Convert the denary numbers 9, 26 and 65 to hexadecimal.

9 ................................................................................................................................................

26 ..............................................................................................................................................

65 ..............................................................................................................................................
[3]

Working space

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

(d) Convert the positive denary number 123 to 8-bit binary using two’s complement.

Show all your working.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

© UCLES 2023 0478/13/O/N/23 [Turn over


4

(e) Add the binary values 00110011 and 01111000 using binary addition.

Give your answer in binary. Show all your working.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [3]

3 A computer has a central processing unit (CPU).

(a) Circle three components that are built into the CPU.

accumulator (ACC) control unit (CU) graphics card

hard disk drive (HDD) motherboard program counter (PC)

random access memory (RAM) read only memory (ROM)


[3]

(b) The CPU has cache.

Explain the purpose of the cache.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

© UCLES 2023 0478/13/O/N/23


5

(c) The CPU has a component that regulates the number of fetch–decode–execute cycles the
CPU can perform in a second.

State the name of this component.

............................................................................................................................................. [1]

(d) The CPU has a component that carries out all calculations and logical operations.

State the name of this component.

............................................................................................................................................. [1]

4 An employee uses a web browser on their computer.

(a) Describe the main purpose of a web browser.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

(b) The employee wants his payment details to be automatically filled in when he buys products
using the internet.

Identify the function of a web browser that could be used for this purpose.

............................................................................................................................................. [1]

(c) The employee wants to be able to quickly access websites that he regularly uses.

Identify the function of a web browser that could be used for this purpose.

............................................................................................................................................. [1]

(d) The web browser uses the secure socket layer (SSL) protocol to transmit personal data
securely over the internet.

State how the SSL protocol secures the data for transmission.

...................................................................................................................................................

............................................................................................................................................. [1]

© UCLES 2023 0478/13/O/N/23 [Turn over


6

5 Errors can occur when data is transmitted.

(a) Give one reason an error may occur when data is transmitted.

...................................................................................................................................................

............................................................................................................................................. [1]

(b) Some error detection methods use a calculated value to check for errors.

Tick (3) one box to show which error detection method does not use a calculated value to
check for errors.

A Check digit

B Checksum

C Echo check

D Parity check
[1]

(c) An automatic repeat request (ARQ) can be used to make sure that data is received free of
errors. It can use a positive or negative acknowledgement method to do this.

Explain how an ARQ operates using a positive acknowledgement method.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [5]

© UCLES 2023 0478/13/O/N/23


7

6 A company uses cloud storage to store its data.

(a) Tick (3) one box to show which is not a characteristic of cloud storage.

A Data is accessed through a network

B Data is stored locally

C Data is stored remotely

D Physical servers are used to store the data


[1]

(b) Explain two advantages for the owners of the company of storing its data in cloud storage.

1 ................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[4]

(c) Explain one disadvantage to employees of the company storing data in the cloud.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

© UCLES 2023 0478/13/O/N/23 [Turn over


8

7 A photographer takes an image with a digital camera. The photographer sets the resolution and
colour depth for the image.

(a) State what is meant by the image resolution.

...................................................................................................................................................

............................................................................................................................................. [1]

(b) State what is meant by the image colour depth.

...................................................................................................................................................

............................................................................................................................................. [1]

(c) Give one benefit of increasing the colour depth of the image.

...................................................................................................................................................

............................................................................................................................................. [1]

(d) The photographer compresses the image using a method that permanently reduces the
colour depth and resolution of the image.

Identify which compression method the photographer uses.

............................................................................................................................................. [1]

(e) One benefit for compressing the image is to reduce the storage space it uses.

Give two other benefits of compressing the image.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................
[2]

© UCLES 2023 0478/13/O/N/23


9

8 Draw and annotate a diagram to represent the role of a router.

[4]

9 A computer has secondary storage.

(a) The table contains statements about secondary storage.

Complete the table by writing the type of secondary storage that applies to each statement.
Some types of secondary storage may apply to more than one statement.

Type of secondary storage Statement

data is stored using pits and lands


................................................

data is stored using control gates and floating gates


................................................

data is stored using electromagnets


................................................

data is stored using a laser


................................................
data is stored on a platter that is divided into tracks and
................................................ sectors
[5]

© UCLES 2023 0478/13/O/N/23 [Turn over


10

(b) Explain two differences between primary storage and secondary storage.

1 ................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[4]

10 A car repair garage uses an expert system.

(a) Complete the description about the operation of the expert system.

Use the terms from the list. Some of the terms in the list will not be used.

inference engine interface knowledge base

machine learning mechanical engine output device

question base rule base

An expert system has a ....................................................... that contains a list of facts.

The ....................................................... applies the .......................................................

to the ....................................................... to reach a diagnosis for the repair of the car.

The user provides data to the system using an ....................................................... .


[5]

© UCLES 2023 0478/13/O/N/23


11

(b) The expert system has machine learning capabilities.

Describe what is meant by machine learning capabilities.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [4]

© UCLES 2023 0478/13/O/N/23


12

BLANK PAGE

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.

Cambridge Assessment International Education is part of Cambridge Assessment. Cambridge Assessment is the brand name of the University of Cambridge
Local Examinations Syndicate (UCLES), which is a department of the University of Cambridge.

© UCLES 2023 0478/13/O/N/23


Cambridge IGCSE™
* 5 0 1 5 4 0 7 3 5 7 *

COMPUTER SCIENCE 0478/12


Paper 1 Computer Systems February/March 2024

1 hour 45 minutes

You must answer on the question paper.

No additional materials are needed.

INSTRUCTIONS
● Answer all questions.
● Use a black or dark blue pen. You may use an HB pencil for any diagrams or graphs.
● Write your name, centre number and candidate number in the boxes at the top of the page.
● Write your answer to each question in the space provided.
● Do not use an erasable pen or correction fluid.
● Do not write on any bar codes.
● Calculators must not be used in this paper.

INFORMATION
● The total mark for this paper is 75.
● The number of marks for each question or part question is shown in brackets [ ].
● No marks will be awarded for using brand names of software packages or hardware.

This document has 16 pages. Any blank pages are indicated.

DC (DE) 327909/3
© UCLES 2024 [Turn over
2

1 Computers represent different types of data in binary.

(a) Tick (✓) one box to show the reason why computers use binary to represent data.

A Computers only allow 1s and 0s to be entered.

B Computers are made of switches and gates that can only be on or off.

C Binary does not need to be converted into other forms of data to be displayed.

D Both computers and humans can quickly process binary data.


[1]

(b) One form of data is characters.

The American standard code for information interchange (ASCII) denary number for the
character ‘N’ is 78.

(i) Tick (✓) one box to identify the ASCII denary number for the character ‘Q’.

A 81

B 80

C 79

D 77
[1]

(ii) Give the binary number for the ASCII denary number for ‘N’.

..................................................................................................................................... [1]

Working space

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

(iii) Explain how the word ‘RED’ is represented using a character set.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [2]
© UCLES 2024 0478/12/F/M/24
3

(c) Sound can be represented as binary.

(i) Explain why recording sound with a higher sampling resolution creates a more accurate
recording.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [2]

(ii) Give one other way that the accuracy of a sound recording can be improved.

...........................................................................................................................................

..................................................................................................................................... [1]

© UCLES 2024 0478/12/F/M/24 [Turn over


4

2 A computer has a central processing unit (CPU).

The CPU includes the registers:


• Program counter (PC)
• Memory address register (MAR)
• Memory data register (MDR)
• Accumulator (ACC)
• Current instruction register (CIR).

(a) The table contains five statements about the role of registers in the fetch–decode–execute
cycle of a CPU.

Letter Statement
A PC stores the address of the next instruction to be accessed
B MAR stores the instructions of the program that is running
C MDR stores the data passed to it from the PC
D ACC stores the result of each calculation
E CIR stores the instruction currently being executed

Two of the statements are not correct.

Identify the letter of each incorrect statement.

Suggest a corrected statement for each.

Incorrect statement 1 .........................................

Corrected statement .................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

Incorrect statement 2 .........................................

Corrected statement .................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[4]

(b) The computer has a single core 3.5 GHz processor and an 8 kB cache.

(i) State what is meant by a 3.5 GHz processor.

...........................................................................................................................................

..................................................................................................................................... [1]

© UCLES 2024 0478/12/F/M/24


5

(ii) The CPU is changed to a dual-core 3.5 GHz processor.

Explain how the number of cores affects the performance of a CPU.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [2]

(iii) The amount of cache is increased to 64 kB.

Explain how the amount of cache affects the performance of a computer.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [2]

(c) The computer has both primary and secondary storage.

(i) Random access memory (RAM) is one example of primary storage.

Describe what is meant by RAM.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [2]

(ii) Read only memory (ROM) is another example of primary storage. ROM often stores the
start-up instructions for a computer.

Identify one other item of data that is commonly stored in ROM.

...........................................................................................................................................

..................................................................................................................................... [1]

(iii) Some computers make use of virtual memory.

State the purpose of virtual memory.

...........................................................................................................................................

..................................................................................................................................... [1]

© UCLES 2024 0478/12/F/M/24 [Turn over


6

3 A computer has an operating system (OS).

(a) Complete the table by writing each missing OS function name and description.

Function name Description

……………………………………………………………………………

……………………………………………………………………………
managing memory
……………………………………………………………………………

……………………………………………………………………………

……………………................…
allows application software to run on the computer
……………………................…

……………………………………………………………………………

……………………………………………………………………………
managing peripherals
……………………………………………………………………………

……………………………………………………………………………

[3]

(b) The OS handles interrupts.

(i) State the purpose of an interrupt.

...........................................................................................................................................

..................................................................................................................................... [1]

(ii) Identify one input device and one example of an interrupt that it can generate.

Input device .......................................................................................................................

Interrupt .............................................................................................................................
[1]

© UCLES 2024 0478/12/F/M/24


7

(iii) A processor is currently executing a program. The processor receives an interrupt.

Explain how the processor manages the current program and the interrupt.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [5]

© UCLES 2024 0478/12/F/M/24 [Turn over


8

4 A student enters a uniform resource locator (URL) into their web browser.

Draw and annotate a diagram to show the process from the user entering the URL to the web
browser displaying the web page.

[5]

© UCLES 2024 0478/12/F/M/24


9

5 Complete the description of digital currencies using the terms provided.

blockchains changed datachains decentralised

deleted encryption passport physical address

physically records time-stamp traced

transaction-chains virtually

A digital currency does not exist ........................................................... , it can only be accessed

electronically.

Some digital currencies have digital ledgers called ........................................................... .

These are decentralised databases where each transaction is stored as a new set of data with

a ........................................................... and is linked to the previous set of data. This means that

transactions cannot be altered, only new transactions added, which allows the location of the data

to be ........................................................... .
[4]

© UCLES 2024 0478/12/F/M/24 [Turn over


10

6 A self-driving tractor sows seeds and harvests crops for a farmer. The self-driving tractor moves
automatically through the field, turning at each end and stopping when it has finished.

(a) One reason the self-driving tractor is a robot is because it has a mechanical structure that
includes wheels, an engine, and a framework.

Give one other reason why the self-driving tractor is an example of a robot.

...................................................................................................................................................

............................................................................................................................................. [1]

(b) If a person is detected within 3 metres whilst the tractor is moving, the self-driving tractor
must stop.

(i) Explain how an infra-red sensor, microprocessor and actuator can be used to stop the
self-driving tractor if a person is detected within 3 metres.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [5]

(ii) Identify one other sensor that the self-driving tractor might use and how it will use the
sensor.

Sensor ...............................................................................................................................

Use ....................................................................................................................................

...........................................................................................................................................
[2]

© UCLES 2024 0478/12/F/M/24


11

(c) Explain the drawbacks of a farmer using a self-driving tractor to sow seeds and harvest crops.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [3]

(d) The self-driving tractor has an in-built expert system that the farmer can use to solve any
errors with the tractor.

Identify three components of an expert system.

1 ................................................................................................................................................

2 ................................................................................................................................................

3 ................................................................................................................................................
[3]

(e) At the end of each day the self-driving tractor transmits the data it has collected to the farmer’s
computer in their house.

The transmission uses an echo check.

(i) Describe the role of the self-driving tractor and the farmer’s computer in the echo check.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [3]

© UCLES 2024 0478/12/F/M/24 [Turn over


12

(ii) Another method of error checking is a parity block check.

The table shows 7 bytes that are transmitted using odd parity. The parity bit has been
completed for each byte.

Complete the parity byte for the data.

parity
bit 7 bit 6 bit 5 bit 4 bit 3 bit 2 bit 1
bit

byte 1 1 1 0 0 1 1 1 0

byte 2 1 0 0 0 0 1 1 0

byte 3 0 1 0 0 0 0 0 0

byte 4 0 1 0 0 1 1 1 1

byte 5 1 0 0 0 0 0 0 0

byte 6 0 1 1 1 1 1 1 1

byte 7 1 1 0 0 1 1 0 1

parity
byte
[3]

© UCLES 2024 0478/12/F/M/24


13

7 Data is transmitted using the internet.

(a) The data is encrypted before transmission.

(i) State the purpose of encrypting data.

...........................................................................................................................................

..................................................................................................................................... [1]

(ii) Describe the differences between symmetric and asymmetric encryption.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [4]

(b) The data is transmitted using packet switching.

(i) Identify two items of data contained in a packet header.

1 ........................................................................................................................................

2 ........................................................................................................................................
[2]

(ii) Give the purpose of a router in the packet-switching process.

...........................................................................................................................................

..................................................................................................................................... [1]

© UCLES 2024 0478/12/F/M/24 [Turn over


14

8 (a) Hexadecimal can be used to represent binary numbers.

(i) Convert the denary number 236 into hexadecimal.

...........................................................................................................................................

..................................................................................................................................... [1]

Working space

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

(ii) Give one benefit of using hexadecimal instead of binary to represent data.

...........................................................................................................................................

..................................................................................................................................... [1]

(b) Two’s complement can be used to represent positive and negative binary integers.

(i) Convert the two’s complement integer 10110111 into denary.

Show all your working.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [2]

(ii) Convert the denary number 45 into an 8-bit two’s complement integer.

...........................................................................................................................................

..................................................................................................................................... [1]

Working space

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

© UCLES 2024 0478/12/F/M/24


15

(c) Logical shifts are performed on binary integers.

State the mathematical effect of a right shift of four places on a positive binary integer.

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

© UCLES 2024 0478/12/F/M/24


16

BLANK PAGE

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.

Cambridge Assessment International Education is part of Cambridge Assessment. Cambridge Assessment is the brand name of the University of Cambridge
Local Examinations Syndicate (UCLES), which is a department of the University of Cambridge.

© UCLES 2024 0478/12/F/M/24


Cambridge IGCSE™
* 7 9 3 8 9 3 6 4 4 9 *

COMPUTER SCIENCE 0478/11


Paper 1 Computer Systems May/June 2024

1 hour 45 minutes

You must answer on the question paper.

No additional materials are needed.

INSTRUCTIONS
● Answer all questions.
● Use a black or dark blue pen. You may use an HB pencil for any diagrams or graphs.
● Write your name, centre number and candidate number in the boxes at the top of the page.
● Write your answer to each question in the space provided.
● Do not use an erasable pen or correction fluid.
● Do not write on any bar codes.
● Calculators must not be used in this paper.

INFORMATION
● The total mark for this paper is 75.
● The number of marks for each question or part question is shown in brackets [ ].
● No marks will be awarded for using brand names of software packages or hardware.

This document has 12 pages. Any blank pages are indicated.

DC (CJ) 329154/3
© UCLES 2024 [Turn over
2

1 A student has a portable tablet computer.

(a) Identify two input devices that could be built into the portable tablet computer.

1 ................................................................................................................................................

2 ................................................................................................................................................
[2]

(b) Identify one output device that could be built into the portable tablet computer.

............................................................................................................................................. [1]

(c) Identify one type of storage device that could be built into the portable tablet computer.

............................................................................................................................................. [1]

2 Hypertext markup language (HTML) colour codes can be represented as hexadecimal.

(a) Tick (3) one box to show which statement about the hexadecimal number system is incorrect.

A It uses the values 0 to 9 and A to F.

B It can be used as a shorter representation of binary.

C It is a base 10 system.

D It can be used to represent error codes.


[1]

(b) Denary numbers can be converted to hexadecimal.

Convert the three denary numbers to hexadecimal.

20 ..............................................................................................................................................

32 ..............................................................................................................................................

165 ............................................................................................................................................
[3]

Working space

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

© UCLES 2024 0478/11/M/J/24


3

3 The binary number 10100011 is stored in random access memory (RAM).

A logical left shift of three places is performed on the binary number.

(a) Give the 8-bit binary number that will be stored after the shift has taken place.

............................................................................................................................................. [1]

(b) Tick (3) one box to show which statement about a logical left shift of two places is correct.

A It would divide the binary number by 2.

B It would multiply the binary number by 2.

C It would divide the binary number by 4.

D It would multiply the binary number by 4.


[1]

(c) 10100011 can be stored as a two’s complement integer.

Convert the two’s complement integer 10100011 to denary. Show all your working.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

(d) The binary number is measured as a byte because it has 8 bits.

State how many bytes there are in a kibibyte (KiB).

............................................................................................................................................. [1]

© UCLES 2024 0478/11/M/J/24 [Turn over


4

4 Data packets are transmitted across a network from one computer to another computer.

(a) Describe the structure of a data packet.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [3]

(b) Packet switching is used to transmit the data packets across the network.

Identify the device that controls which path is taken by each data packet.

............................................................................................................................................. [1]

(c) Serial data transmission is used to transmit the data packets across the network.

Explain why serial data transmission is used to transmit the data packets.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [3]

© UCLES 2024 0478/11/M/J/24


5

5 A computer uses both random access memory (RAM) and secondary storage.

(a) State the purpose of secondary storage.

...................................................................................................................................................

............................................................................................................................................. [1]

(b) One type of secondary storage is optical.

Circle three examples of optical storage.

read only memory (ROM) secure digital (SD) card compact disk (CD)

hard disk drive (HDD) digital versatile disk (DVD)

Blu-ray disk universal serial bus (USB) drive solid-state drive (SSD)
[3]

(c) Explain why a computer needs RAM.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [3]

(d) The computer processes instructions using the fetch–decode–execute (FDE) cycle.

Draw and annotate a diagram to show the process of the fetch stage of the FDE cycle.

[4]

© UCLES 2024 0478/11/M/J/24 [Turn over


6

6 A computer needs firmware and system software to operate.

(a) State the purpose of firmware.

...................................................................................................................................................

............................................................................................................................................. [1]

(b) Give one example of firmware.

............................................................................................................................................. [1]

(c) Give two examples of system software.

1 ................................................................................................................................................

2 ................................................................................................................................................
[2]

7 Data is encrypted to keep it safe during transmission.

Complete the paragraph about asymmetric encryption.

Use the terms from the list.

Some of the terms in the list will not be used. You should only use a term once.

asymmetric certificate cipher text

decrypted encrypted parallel key plain text private key

protected public key serial key symmetric

.............................................................. is encrypted into ..............................................................

using a .............................................................. . The encrypted data is then transmitted from the

sender to the receiver. The encrypted data is then decrypted using a

.............................................................. . [4]

© UCLES 2024 0478/11/M/J/24


7

BLANK PAGE

© UCLES 2024 0478/11/M/J/24 [Turn over


8

8 A farmer uses an automated robot to plant seeds in the field.

(a) State what is meant by the robot being automated.

...................................................................................................................................................

............................................................................................................................................. [1]

(b) Give three characteristics of a robot.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................

3 ................................................................................................................................................

...................................................................................................................................................
[3]

(c) The robot plants seeds and stops when it reaches a fence. It then turns and continues planting
seeds. The robot uses sensors and a microprocessor to know when it reaches a fence.

Explain how the robot uses sensors and a microprocessor to know it has reached a fence.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [6]

© UCLES 2024 0478/11/M/J/24


9

(d) Give two advantages of the farmer using an automated robot to plant seeds.

1 ................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[2]

(e) Give two disadvantages of the farmer using an automated robot to plant seeds.

1 ................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[2]

(f) The robot is adapted to have machine learning capabilities.

Explain how this will improve the robot.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

© UCLES 2024 0478/11/M/J/24 [Turn over


10

9 A company owner has installed a new network. Data is correct before it is transmitted across the
network.

The company owner is concerned that data might have errors after transmission.

(a) Explain how the data might have errors after transmission.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [3]

(b) The company owner decides to introduce an error detection system to check the data for
errors after transmission.

The error detection system uses an odd parity check and a positive automatic repeat query
(ARQ).

(i) Describe how the error detection system operates to check for errors.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [8]
© UCLES 2024 0478/11/M/J/24
11

(ii) Give two other error detection methods that could be used.

1 ........................................................................................................................................

2 ........................................................................................................................................
[2]

(c) The company owner also installs a firewall to help protect the network from hackers and
malware.

(i) Explain how the firewall operates to help protect the network.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [5]

(ii) Give two examples of malware that the firewall can help protect the network from.

1 ........................................................................................................................................

2 ........................................................................................................................................
[2]

© UCLES 2024 0478/11/M/J/24


12

BLANK PAGE

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.

Cambridge Assessment International Education is part of Cambridge Assessment. Cambridge Assessment is the brand name of the University of Cambridge
Local Examinations Syndicate (UCLES), which is a department of the University of Cambridge.

© UCLES 2024 0478/11/M/J/24


* 0019654976301 *

Cambridge IGCSE™
* 8 4 8 6 8 9 2 6 8 8 *

COMPUTER SCIENCE 0478/12


Paper 1 Computer Systems May/June 2024

1 hour 45 minutes

You must answer on the question paper.

No additional materials are needed.

INSTRUCTIONS
● Answer all questions.
● Use a black or dark blue pen. You may use an HB pencil for any diagrams or graphs.
● Write your name, centre number and candidate number in the boxes at the top of the page.
● Write your answer to each question in the space provided.
● Do not use an erasable pen or correction fluid.
● Do not write on any bar codes.
● Calculators must not be used in this paper.

INFORMATION
● The total mark for this paper is 75.
● The number of marks for each question or part question is shown in brackets [ ].
● No marks will be awarded for using brand names of software packages or hardware.

This document has 12 pages. Any blank pages are indicated.

DC (KS) 329152/4
© UCLES 2024 [Turn over
* 0019654976302 *

DO NOT WRITE IN THIS MARGIN


2

1 Data can be measured in bits.

(a) Give the name of the data storage measurement that is equal to 8 bits.

............................................................................................................................................. [1]

(b) State how many bits there are in a kibibyte (KiB).

............................................................................................................................................. [1]

(c) Give the name of the data storage measurement that is equal to 1024 gibibytes (GiB).

DO NOT WRITE IN THIS MARGIN


............................................................................................................................................. [1]

(d) A 16-bit colour image has a resolution of 512 pixels wide by 512 pixels high.

Calculate the file size of the image in kibibytes (KiB). Show all your working.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

DO NOT WRITE IN THIS MARGIN


...................................................................................................................................................

...................................................................................................................................................

Answer ......................................................... KiB


[3]

2 Data can be transmitted from one device to another.

(a) Tick (3) one box to show which of the terms is not a method for transmitting data.

DO NOT WRITE IN THIS MARGIN


A serial

B simplex

C parallel

D parity
[1]

(b) Data is broken down into smaller units to be transmitted from one device to another.
DO NOT WRITE IN THIS MARGIN

Give the name of the unit that data is broken down into.

............................................................................................................................................. [1]

© UCLES 2024 0478/12/M/J/24


* 0019654976303 *
DO NOT WRITE IN THIS MARGIN

(c) Data is often encrypted when it is transmitted from one device to another.

(i) Explain how data is encrypted using symmetric encryption.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................
DO NOT WRITE IN THIS MARGIN

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [4]

(ii) Give the purpose of encryption.

...........................................................................................................................................
DO NOT WRITE IN THIS MARGIN

..................................................................................................................................... [1]
DO NOT WRITE IN THIS MARGIN
DO NOT WRITE IN THIS MARGIN

© UCLES 2024 0478/12/M/J/24 [Turn over


* 0019654976304 *

DO NOT WRITE IN THIS MARGIN


4

3 Binary is a base 2 number system.

(a) Give the name of the number system that is base 16.

............................................................................................................................................. [1]

(b) Three denary numbers are entered into a computer. The computer converts the numbers and
stores them as binary.

(i) Give the binary number that would be stored for each of the denary numbers.

DO NOT WRITE IN THIS MARGIN


10 ......................................................................................................................................

50 ......................................................................................................................................

201 ....................................................................................................................................
[3]

Working space

...........................................................................................................................................

...........................................................................................................................................

DO NOT WRITE IN THIS MARGIN


...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

(ii) Explain why the data is converted to binary by the computer.

...........................................................................................................................................

...........................................................................................................................................

DO NOT WRITE IN THIS MARGIN


...........................................................................................................................................

..................................................................................................................................... [2]

(c) The two binary integers 00110000 and 01100110 are added together.

Add the binary integers using binary addition and show your answer in binary. Show all your
working.

...................................................................................................................................................

...................................................................................................................................................
DO NOT WRITE IN THIS MARGIN

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [3]

© UCLES 2024 0478/12/M/J/24


* 0019654976305 *
DO NOT WRITE IN THIS MARGIN

(d) The denary integer –32 is stored as a two’s complement integer.

Calculate the two’s complement integer that would be stored.

Show all your working.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
DO NOT WRITE IN THIS MARGIN

...................................................................................................................................................

............................................................................................................................................. [2]

4 A student uses both system software and application software on their computer.

(a) Give one example of system software.

............................................................................................................................................. [1]
DO NOT WRITE IN THIS MARGIN

(b) Give two examples of application software.

1 ................................................................................................................................................

2 ................................................................................................................................................
[2]

(c) Describe the difference between system software and application software.

...................................................................................................................................................

...................................................................................................................................................
DO NOT WRITE IN THIS MARGIN

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]
DO NOT WRITE IN THIS MARGIN

© UCLES 2024 0478/12/M/J/24 [Turn over


* 0019654976306 *

DO NOT WRITE IN THIS MARGIN


6

5 Instructions are processed by a central processing unit (CPU) in a computer.

(a) Complete the paragraph about fetching an instruction into the CPU to be processed.

Use the terms from the list.

Some of the terms in the list will not be used. You should only use a term once.

address arithmetic logic unit (ALU) binary control unit (CU)

DO NOT WRITE IN THIS MARGIN


current instruction register (CIR) data denary driver

fetch interrupt memory address register (MAR)

memory data register (MDR) random access memory (RAM)

read only memory (ROM) secondary storage signal

The program counter contains the ………………………………………………………

DO NOT WRITE IN THIS MARGIN


of the next instruction to be processed; this is then sent to the

……………………………………………………… using the address bus. The address is then

sent to the ……………………………………………………… .

Once the address is received, the instruction stored at the location is

sent to the ………………………………………………………, using the

……………………………………………………… bus. The instruction is then

sent to the ……………………………………………………… that is built into the

DO NOT WRITE IN THIS MARGIN


……………………………………………………… .
[7]

(b) The CPU uses an instruction set to decode the instruction.

State what is meant by an instruction set.

...................................................................................................................................................

............................................................................................................................................. [1]
DO NOT WRITE IN THIS MARGIN

© UCLES 2024 0478/12/M/J/24


* 0019654976407 *
DO NOT WRITE IN THIS MARGIN

6 The table contains statements about error detection methods.

Complete the table by giving the correct error detection method for each statement.

error detection method statement

…………………………………………… An odd or even process can be used.

A value is calculated from the data, using an


…………………………………………… algorithm. This happens before and after the data
DO NOT WRITE IN THIS MARGIN

is transmitted.

A copy of the data is sent back to the sender by


……………………………………………
the receiver.

…………………………………………… Acknowledgement and timeout are used.

A value is appended to data that has been


…………………………………………… calculated using the data. This value is checked
on data entry.
[5]
DO NOT WRITE IN THIS MARGIN

7 A computer has both a media access control (MAC) address and an internet protocol (IP) address.

(a) Tick (3) one box to show which of the statements is correct about the MAC address.

A It is assigned by the manufacturer.

B It is assigned by a router.

C It can be static or dynamic.


DO NOT WRITE IN THIS MARGIN

D It is made up of three different parts.


[1]

(b) An IP address can have an IPv4 or IPv6 format.

(i) Give an example of an IP address that has an IPv4 format.

..................................................................................................................................... [1]

(ii) Give two characteristics of the IPv6 format.

1 ........................................................................................................................................
DO NOT WRITE IN THIS MARGIN

...........................................................................................................................................

2 ........................................................................................................................................

...........................................................................................................................................
[2]

© UCLES 2024 0478/12/M/J/24 [Turn over


* 0019654976408 *

DO NOT WRITE IN THIS MARGIN


8

8 A company has a website that is suffering a distributed denial of service (DDoS) attack.

(a) Draw and annotate a diagram to show the process of the DDoS.

DO NOT WRITE IN THIS MARGIN


DO NOT WRITE IN THIS MARGIN
[5]

(b) Identify a solution that can be used to help prevent the DDoS attack being successful.

............................................................................................................................................. [1]

DO NOT WRITE IN THIS MARGIN


DO NOT WRITE IN THIS MARGIN

© UCLES 2024 0478/12/M/J/24


* 0019654976409 *
DO NOT WRITE IN THIS MARGIN

9 A company uses both solid-state and optical secondary storage.

(a) Explain why a computer needs secondary storage.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]
DO NOT WRITE IN THIS MARGIN

(b) Describe three differences between solid-state and optical storage.

1 ................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................
DO NOT WRITE IN THIS MARGIN

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

3 ................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
DO NOT WRITE IN THIS MARGIN

...................................................................................................................................................
[6]
DO NOT WRITE IN THIS MARGIN

© UCLES 2024 0478/12/M/J/24 [Turn over


* 0019654976410 *

DO NOT WRITE IN THIS MARGIN


10

10 A garage uses an expert system to help diagnose any problems with cars that need repair.

(a) The expert system is an example of artificial intelligence (AI).

Describe what is meant by AI.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

DO NOT WRITE IN THIS MARGIN


............................................................................................................................................. [2]

(b) A car has a problem with its braking system, so it is brought into the garage.

Explain how the expert system operates and how it is used to help diagnose the problem.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

DO NOT WRITE IN THIS MARGIN


...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

DO NOT WRITE IN THIS MARGIN


............................................................................................................................................. [5]

DO NOT WRITE IN THIS MARGIN

© UCLES 2024 0478/12/M/J/24


* 0019654976411 *
DO NOT WRITE IN THIS MARGIN

11

11 A company has a website. Users use the internet and the world wide web to access the website.

(a) Describe the difference between the internet and the world wide web.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]
DO NOT WRITE IN THIS MARGIN

(b) The website has a uniform resource locator (URL). The URL has three different parts.

Identify the three different parts that are included in the URL.

1 ................................................................................................................................................

2 ................................................................................................................................................

3 ................................................................................................................................................
[3]
DO NOT WRITE IN THIS MARGIN

(c) One function of a web browser is to provide an address bar for a user to enter a URL.

Give three other functions of a web browser.

1 ................................................................................................................................................

2 ................................................................................................................................................

3 ................................................................................................................................................
[3]
DO NOT WRITE IN THIS MARGIN
DO NOT WRITE IN THIS MARGIN

© UCLES 2024 0478/12/M/J/24


* 0019654976412 *

DO NOT WRITE IN THIS MARGIN


12

BLANK PAGE

DO NOT WRITE IN THIS MARGIN


DO NOT WRITE IN THIS MARGIN
DO NOT WRITE IN THIS MARGIN
DO NOT WRITE IN THIS MARGIN

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.

Cambridge Assessment International Education is part of Cambridge Assessment. Cambridge Assessment is the brand name of the University of Cambridge
Local Examinations Syndicate (UCLES), which is a department of the University of Cambridge.

© UCLES 2024 0478/12/M/J/24


Cambridge IGCSE™
* 2 0 8 1 7 4 3 8 5 1 *

COMPUTER SCIENCE 0478/13


Paper 1 Computer Systems May/June 2024

1 hour 45 minutes

You must answer on the question paper.

No additional materials are needed.

INSTRUCTIONS
● Answer all questions.
● Use a black or dark blue pen. You may use an HB pencil for any diagrams or graphs.
● Write your name, centre number and candidate number in the boxes at the top of the page.
● Write your answer to each question in the space provided.
● Do not use an erasable pen or correction fluid.
● Do not write on any bar codes.
● Calculators must not be used in this paper.

INFORMATION
● The total mark for this paper is 75.
● The number of marks for each question or part question is shown in brackets [ ].
● No marks will be awarded for using brand names of software packages or hardware.

This document has 12 pages. Any blank pages are indicated.

DC (CE) 329144/3
© UCLES 2024 [Turn over
2

1 The size of a file can be measured in different units.

(a) State how many bits there are in a byte.

............................................................................................................................................. [1]

(b) State how many kibibytes (KiB) there are in 2 mebibytes (MiB).

............................................................................................................................................. [1]

(c) Identify the unit of data that is equal to 4 bits.

............................................................................................................................................. [1]

2 An image has a 16-bit colour depth and a resolution of 1000 × 1750 pixels.

(a) State what is meant by a 16-bit colour depth.

...................................................................................................................................................

............................................................................................................................................. [1]

(b) The resolution of the image is changed to 750 × 1500 pixels.

Give the effect this will have on the file size of the image.

...................................................................................................................................................

............................................................................................................................................. [1]

© UCLES 2024 0478/13/M/J/24


3

3 A programmer is creating a computer game. One character is not moving correctly.

The programmer needs to debug the program. To do this they need to look at addresses that are
locations in memory.

The addresses are displayed as hexadecimal numbers.

(a) One address is A2F.

(i) Convert the address to binary.

..................................................................................................................................... [3]

(ii) Convert the address to denary.

..................................................................................................................................... [1]

Working space

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

(b) The binary number stored for another address is 000110011011.

(i) Convert the binary number to hexadecimal.

..................................................................................................................................... [3]

(ii) Convert the binary number to denary.

..................................................................................................................................... [1]

Working space

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

(c) Give one reason why the addresses are displayed in hexadecimal instead of binary.

...................................................................................................................................................

............................................................................................................................................. [1]

© UCLES 2024 0478/13/M/J/24 [Turn over


4

(d) Identify two other ways that hexadecimal is used in computer science.

1 ................................................................................................................................................

2 ................................................................................................................................................
[2]

(e) The health value for a character in the computer game can sometimes be a negative value.
The negative values are stored as two’s complement 8-bit integers.

A character has a health value of –25.

Calculate the two’s complement 8-bit integer for –25. Show all your working.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

4 The table contains statements about types of secondary storage.

Complete the table by writing the correct type of secondary storage for each statement.

type of secondary storage statement

................................................. Pits and lands are created on a reflective surface.

................................................. NAND or NOR technology is used.

................................................. Platters are spun that are divided into tracks and sectors.

................................................. Electromagnets are used to read and write data.

................................................. Transistors are used as control gates and floating gates.

................................................. A red or blue laser is used to read and write data.

[6]

© UCLES 2024 0478/13/M/J/24


5

5 A computer uses both random access memory (RAM) and read only memory (ROM).

(a) Tick (3) one box to show which statement is correct about RAM.

A It is non-volatile storage.

B It stores the bootloader.

C It stores data that is currently in use.

D It is not directly accessible by the central processing unit (CPU).


[1]

(b) ROM is a type of primary storage.

State the characteristic of ROM that makes it a type of primary storage.

...................................................................................................................................................

............................................................................................................................................. [1]

6 A sensor is an input device that is used to capture data from its surrounding environment.

(a) Circle three other input devices.

touch screen hard disk drive (HDD) headphones

speaker microphone actuator

universal serial bus (USB) drive printer keyboard


[3]

(b) Sensors can be used in an automated system.

Give two benefits of using sensors in this type of system.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................
[2]

© UCLES 2024 0478/13/M/J/24 [Turn over


6

(c) The table contains different types of sensors and a use for each.

Complete the table by giving a suitable use for each type of sensor. The first one has been
done for you.

type of sensor use

to monitor whether a water pipe has cracked and is leaking and dripping
acoustic
onto the floor

................................................................................................................
temperature
................................................................................................................

................................................................................................................

................................................................................................................
humidity
................................................................................................................

................................................................................................................

................................................................................................................
infra-red
................................................................................................................

................................................................................................................

................................................................................................................
magnetic field
................................................................................................................

................................................................................................................
[4]

© UCLES 2024 0478/13/M/J/24


7

7 A company has a network that includes a web server.

Data is transmitted across the network using serial half-duplex data transmission.

(a) Draw and annotate a diagram to show how the data is transmitted using serial half-duplex
data transmission.

[4]

(b) Give two benefits of the company using serial half-duplex data transmission for this purpose.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................
[2]

(c) Give one drawback of the company using serial half-duplex data transmission for this
purpose.

...................................................................................................................................................

............................................................................................................................................. [1]

© UCLES 2024 0478/13/M/J/24 [Turn over


8

(d) The company uses a proxy server to help protect the web server and the network from cyber
security threats.

(i) Give three cyber security threats that the proxy server can help protect against.

1 ........................................................................................................................................

2 ........................................................................................................................................

3 ........................................................................................................................................
[3]

(ii) Identify two functions of the proxy server that can be used to help protect the web server
and the network.

1 ........................................................................................................................................

...........................................................................................................................................

2 ........................................................................................................................................

...........................................................................................................................................
[2]

(e) Customers access the company’s web pages that are stored on the web server.

Describe how the web pages are located, retrieved and displayed on a customer’s computer.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [6]

© UCLES 2024 0478/13/M/J/24


9

8 A student has a computer that has a central processing unit (CPU).

(a) Describe the role of the CPU in the computer.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

(b) The CPU contains registers.

(i) State the purpose of a register.

...........................................................................................................................................

..................................................................................................................................... [1]

(ii) Give three registers that are built into the CPU.

1 ........................................................................................................................................

2 ........................................................................................................................................

3 ........................................................................................................................................
[3]

(c) One component in the CPU is the arithmetic logic unit (ALU).

Describe the purpose of the ALU.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [3]

© UCLES 2024 0478/13/M/J/24 [Turn over


10

(d) The student wants to replace the CPU to increase the performance of the computer.

Explain why a different CPU can increase the performance.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [4]

© UCLES 2024 0478/13/M/J/24


11

9 A printer runs out of ink and needs a new ink cartridge. An interrupt is sent and a message is
generated to notify the user that the ink cartridge is empty.

(a) Complete the paragraph about the use of an interrupt in this process.

Use the terms from the list.

Some of the terms in the list will not be used. You should only use a term once.

binary clock computer data error

fetch–decode–execute cycle hexadecimal higher interrupt queue

interrupt service routine (ISR) lower printer priority level

secondary storage sorting transmission

The ...................................................................... sends an interrupt to the

...................................................................... . The interrupt is given a

...................................................................... . The processor completes its current

...................................................................... and checks the

...................................................................... to see if there is an interrupt with

...................................................................... priority than the current task. If there is, it stores

the current task and fetches the interrupt. It then calls the

...................................................................... , which is a sequence of instructions that

handles the interrupt. The interrupt is handled, which generates a message to the user to

notify them that the ink cartridge is empty.


[7]

(b) Handling interrupts is one function of an operating system.

Give two functions of an operating system that relate to memory.

1 ................................................................................................................................................

2 ................................................................................................................................................
[2]

© UCLES 2024 0478/13/M/J/24


12

BLANK PAGE

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.

Cambridge Assessment International Education is part of Cambridge Assessment. Cambridge Assessment is the brand name of the University of Cambridge
Local Examinations Syndicate (UCLES), which is a department of the University of Cambridge.

© UCLES 2024 0478/13/M/J/24


* 0000800000001 *

Cambridge IGCSE™
* 6 0 3 6 4 7 5 5 0 5 *

COMPUTER SCIENCE 0478/11


Paper 1 Computer Systems October/November 2024

1 hour 45 minutes

You must answer on the question paper.

No additional materials are needed.

INSTRUCTIONS
● Answer all questions.
● Use a black or dark blue pen. You may use an HB pencil for any diagrams or graphs.
● Write your name, centre number and candidate number in the boxes at the top of the page.
● Write your answer to each question in the space provided.
● Do not use an erasable pen or correction fluid.
● Do not write on any bar codes.
● Calculators must not be used in this paper.

INFORMATION
● The total mark for this paper is 75.
● The number of marks for each question or part question is shown in brackets [ ].
● No marks will be awarded for using brand names of software packages or hardware.

This document has 12 pages.

DC (SL) 336979/3
© UCLES 2024 [Turn over
* 0000800000002 *

DO NOT WRITE IN THIS MARGIN


2

1 The size of a file can be measured using different units.

(a) Tick (3) one box to show which of these is not a unit of measurement for a file.

A bit

B bot

C nibble

D byte

DO NOT WRITE IN THIS MARGIN


[1]

(b) The size of a file can be reduced by compressing it.

(i) Give two types of compression that can be used to reduce the size of a file.

1 ........................................................................................................................................

2 ........................................................................................................................................
[2]

(ii) Give three benefits of reducing the size of a file for storage and transmission.

DO NOT WRITE IN THIS MARGIN


1 ........................................................................................................................................

...........................................................................................................................................

2 ........................................................................................................................................

...........................................................................................................................................

3 ........................................................................................................................................

...........................................................................................................................................
[3]

DO NOT WRITE IN THIS MARGIN


DO NOT WRITE IN THIS MARGIN

© UCLES 2024 0478/11/O/N/24


* 0000800000003 *
DO NOT WRITE IN THIS MARGIN

2 A student has a smartphone.

(a) Identify two input devices that can be built into the smartphone.

1 ................................................................................................................................................

2 ................................................................................................................................................
[2]

(b) Identify two output devices that can be built into the smartphone.
DO NOT WRITE IN THIS MARGIN

1 ................................................................................................................................................

2 ................................................................................................................................................
[2]

(c) The smartphone contains secondary storage.

(i) Explain the purpose of the secondary storage in the smartphone.

...........................................................................................................................................

...........................................................................................................................................
DO NOT WRITE IN THIS MARGIN

...........................................................................................................................................

..................................................................................................................................... [2]

(ii) Identify the most suitable type of secondary storage for the smartphone.

Explain your choice.

Secondary storage type ....................................................................................................

Explanation .......................................................................................................................
DO NOT WRITE IN THIS MARGIN

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................
[4]
DO NOT WRITE IN THIS MARGIN

© UCLES 2024 0478/11/O/N/24 [Turn over


* 0000800000004 *

DO NOT WRITE IN THIS MARGIN


4

3 A user enters text into a computer system, using a keyboard.

An American standard code for information interchange (ASCII) character set is used to convert
the text to binary.

(a) Identify one other character set that could be used to convert the text to binary.

............................................................................................................................................. [1]

(b) The character ‘A’ is represented by the denary ASCII number 65.

DO NOT WRITE IN THIS MARGIN


The character ‘m’ is represented by the denary ASCII number 109.

(i) Convert the two denary ASCII numbers to binary.

65 ......................................................................................................................................

109 ....................................................................................................................................
[2]

Working space

...........................................................................................................................................

DO NOT WRITE IN THIS MARGIN


...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

(ii) Convert the two denary ASCII numbers to hexadecimal.

65 ......................................................................................................................................

109 ....................................................................................................................................
[2]

DO NOT WRITE IN THIS MARGIN


Working space

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................
DO NOT WRITE IN THIS MARGIN

© UCLES 2024 0478/11/O/N/24


* 0000800000005 *
DO NOT WRITE IN THIS MARGIN

(c) The character ‘y’ is represented by the binary ASCII number 01111001.

(i) Convert the binary ASCII number to denary.

..................................................................................................................................... [1]

Working space

...........................................................................................................................................

...........................................................................................................................................
DO NOT WRITE IN THIS MARGIN

...........................................................................................................................................

...........................................................................................................................................

(ii) Convert the binary ASCII number to hexadecimal.

..................................................................................................................................... [1]

Working space

...........................................................................................................................................
DO NOT WRITE IN THIS MARGIN

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

(iii) A logical right shift of two places is performed on the binary ASCII number 01111001.

Give the binary number after the logical right shift of two places is performed.

..................................................................................................................................... [1]
DO NOT WRITE IN THIS MARGIN

Working space

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................
DO NOT WRITE IN THIS MARGIN

© UCLES 2024 0478/11/O/N/24 [Turn over


* 0000800000006 *

DO NOT WRITE IN THIS MARGIN


6

(d) The character ‘T’ is represented by the binary ASCII number 01010100.

The character ‘t’ is represented by the binary ASCII number 01110100.

Add the two binary numbers using binary addition. Give your answer in binary. Show all your
working.

...................................................................................................................................................

...................................................................................................................................................

DO NOT WRITE IN THIS MARGIN


...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [3]

DO NOT WRITE IN THIS MARGIN


4 A company decides to create a network for its devices.

All the company devices are within a single room.

The employees will need to use their devices to send data to each other and share files.

The company decides to send data across the network using packet switching.

(a) An employee sends an email to another employee. The email is broken down into packets.

Describe the structure of a packet of data for the email.

DO NOT WRITE IN THIS MARGIN


...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
DO NOT WRITE IN THIS MARGIN

...................................................................................................................................................

............................................................................................................................................. [4]

© UCLES 2024 0478/11/O/N/24


* 0000800000007 *
DO NOT WRITE IN THIS MARGIN

(b) The company decides to use parallel full-duplex data transmission to send the data across
the network.

(i) Explain the reasons why the company have chosen this method of data transmission.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................
DO NOT WRITE IN THIS MARGIN

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [4]

(ii) Give two drawbacks of the company using this method of data transmission.
DO NOT WRITE IN THIS MARGIN

1 ........................................................................................................................................

...........................................................................................................................................

2 ........................................................................................................................................

...........................................................................................................................................
[2]

(iii) Give one other method of data transmission the company could have chosen.

..................................................................................................................................... [1]
DO NOT WRITE IN THIS MARGIN
DO NOT WRITE IN THIS MARGIN

© UCLES 2024 0478/11/O/N/24 [Turn over


* 0000800000008 *

DO NOT WRITE IN THIS MARGIN


8

5 A central processing unit (CPU) performs the fetch–decode–execute (FDE) cycle.

(a) Give the name of two registers that are used in the fetch stage of the cycle.

1 ................................................................................................................................................

2 ................................................................................................................................................
[2]

(b) Describe what happens at the decode stage of the cycle.

DO NOT WRITE IN THIS MARGIN


...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [3]

DO NOT WRITE IN THIS MARGIN


(c) Give one register in the CPU that is used in the execute stage of the cycle.

............................................................................................................................................. [1]

(d) Buses are used in the CPU to transmit data through the FDE cycle.

Circle three buses that are used in the CPU.

fetch address register execute

data decode calculation

DO NOT WRITE IN THIS MARGIN


central value binary control
[3]

(e) A user changes their CPU from one with a dual core and a clock speed of 2.4 GHz to one with
a dual core and a clock speed of 3.5 GHz.

Explain the effect this change will have on the performance of the CPU.

...................................................................................................................................................
DO NOT WRITE IN THIS MARGIN

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

© UCLES 2024 0478/11/O/N/24


* 0000800000009 *
DO NOT WRITE IN THIS MARGIN

6 A computer programmer uses assembly language to create a computer program for an embedded
system in a washing machine.

(a) State what is meant by an embedded system.

...................................................................................................................................................

............................................................................................................................................. [1]

(b) Give the name of the translator that will be used for the program.
DO NOT WRITE IN THIS MARGIN

............................................................................................................................................. [1]

(c) The washing machine needs to display error codes on a small screen if there is a problem
with the washing machine.

The error codes are stored as binary. The binary numbers are too long to be displayed on the
washing machine.

State how the error codes could be reduced in length to be displayed on the screen.

............................................................................................................................................. [1]
DO NOT WRITE IN THIS MARGIN

(d) Give one benefit to the programmer of using assembly language to write the program.

...................................................................................................................................................

............................................................................................................................................. [1]
DO NOT WRITE IN THIS MARGIN
DO NOT WRITE IN THIS MARGIN

© UCLES 2024 0478/11/O/N/24 [Turn over


* 0000800000010 *

DO NOT WRITE IN THIS MARGIN


10

(e) The programmer uses an integrated development environment (IDE) to write the program.

A built-in translator to convert the program into machine code is one way that the IDE helps
the computer programmer.

Describe three other ways the IDE can help the programmer.

...................................................................................................................................................

...................................................................................................................................................

DO NOT WRITE IN THIS MARGIN


...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

DO NOT WRITE IN THIS MARGIN


...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [6]

7 A computer has an operating system.

(a) The operating system provides several functions.

DO NOT WRITE IN THIS MARGIN


(i) Tick (3) one box to show which of these is not a function of the operating system.

A managing files

B providing an interface

C handling interrupts

D loading the bootstrap


[1]
DO NOT WRITE IN THIS MARGIN

© UCLES 2024 0478/11/O/N/24


* 0000800000011 *
DO NOT WRITE IN THIS MARGIN

11

(ii) Identify one other function of an operating system.

Describe the purpose of this function.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [2]
DO NOT WRITE IN THIS MARGIN

(b) Give the name of the set of instructions that are provided to the operating system to allow it to
run.

............................................................................................................................................. [1]

8 Draw and annotate a diagram to show how a payment transaction is made using digital currency
and blockchain.
DO NOT WRITE IN THIS MARGIN
DO NOT WRITE IN THIS MARGIN
DO NOT WRITE IN THIS MARGIN

[4]
© UCLES 2024 0478/11/O/N/24 [Turn over
* 0000800000012 *

DO NOT WRITE IN THIS MARGIN


12

9 A doctor’s surgery has an expert system that helps diagnose the illnesses of its patients.

(a) Complete the paragraph about the operation of the expert system.

Use the terms from the list.

Some of the terms in the list will not be used. Some terms may be used more than once.

artificial binary central processing unit (CPU) data

DO NOT WRITE IN THIS MARGIN


inference engine interface knowledge base primary storage

process real read only memory (ROM) rule base

An expert system is a type of ............................................ intelligence. The doctor will type

data about the symptoms of the illness into the ...................................................................... .

The ................................................................ will decide which questions to ask the doctor.

DO NOT WRITE IN THIS MARGIN


It will do this by linking the facts in the ....................................................................... to the

.................................................................... .

The ..................................................................... will decide on a diagnosis and this will be

output on the .................................................................... .


[7]

(b) The expert system has the ability to automatically adapt its own processes and data.

Give the name of this ability.

............................................................................................................................................. [1]

DO NOT WRITE IN THIS MARGIN


DO NOT WRITE IN THIS MARGIN

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.

Cambridge Assessment International Education is part of Cambridge Assessment. Cambridge Assessment is the brand name of the University of Cambridge
Local Examinations Syndicate (UCLES), which is a department of the University of Cambridge.

© UCLES 2024 0478/11/O/N/24


* 0000800000001 *

Cambridge IGCSE™
* 4 5 5 8 2 9 8 0 6 8 *

COMPUTER SCIENCE 0478/12


Paper 1 Computer Systems October/November 2024

1 hour 45 minutes

You must answer on the question paper.

No additional materials are needed.

INSTRUCTIONS
● Answer all questions.
● Use a black or dark blue pen. You may use an HB pencil for any diagrams or graphs.
● Write your name, centre number and candidate number in the boxes at the top of the page.
● Write your answer to each question in the space provided.
● Do not use an erasable pen or correction fluid.
● Do not write on any bar codes.
● Calculators must not be used in this paper.

INFORMATION
● The total mark for this paper is 75.
● The number of marks for each question or part question is shown in brackets [ ].
● No marks will be awarded for using brand names of software packages or hardware.

This document has 12 pages. Any blank pages are indicated.

DC (WW) 336223/3
© UCLES 2024 [Turn over
* 0000800000002 *

DO NOT WRITE IN THIS MARGIN


2

1 Different types of software can be run on a computer.

(a) State what is meant by software.

...................................................................................................................................................

............................................................................................................................................. [1]

(b) Utility software is one type of software that can be run on a computer.

Tick (3) one box to show which software is an example of utility software.

DO NOT WRITE IN THIS MARGIN


A spreadsheet

B anti-virus

C web browser

D database
[1]

(c) Identify the type of software that manages inputs and outputs for the computer.

DO NOT WRITE IN THIS MARGIN


............................................................................................................................................. [1]

2 Data storage can be measured using different units of measurement.

(a) Identify the name of the smallest unit of measurement of data.

............................................................................................................................................. [1]

(b) State how many nibbles there are in 2 bytes.

............................................................................................................................................. [1]

DO NOT WRITE IN THIS MARGIN


(c) A 10 second sound effect is recorded for a movie.

It is recorded with a sample rate of 22,016 Hz and a sample resolution of 8 bits.

Calculate the file size of the sound effect in kibibytes (KiB). Show all your working.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
DO NOT WRITE IN THIS MARGIN

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

Answer ..................................................... KiB


[3]
© UCLES 2024 0478/12/O/N/24
* 0000800000003 *
DO NOT WRITE IN THIS MARGIN

(d) The sound effect file is compressed for storage.

(i) State what is meant by file compression.

...........................................................................................................................................

..................................................................................................................................... [1]

(ii) Give one benefit of compressing the file for storage.

...........................................................................................................................................
DO NOT WRITE IN THIS MARGIN

..................................................................................................................................... [1]

3 A user enters data that is hexadecimal into a computer system. The data is converted to binary to
be processed by the computer.

(a) (i) Give one similarity between hexadecimal and binary.

...........................................................................................................................................

..................................................................................................................................... [1]
DO NOT WRITE IN THIS MARGIN

(ii) Give two differences between hexadecimal and binary.

1 ........................................................................................................................................

...........................................................................................................................................

2 ........................................................................................................................................

...........................................................................................................................................
[2]

(b) Data that is denary can also be converted to binary.


DO NOT WRITE IN THIS MARGIN

Give the binary number for each of the three denary numbers.

15 ..............................................................................................................................................

180 ............................................................................................................................................

235 ............................................................................................................................................
[3]

Working space

...................................................................................................................................................
DO NOT WRITE IN THIS MARGIN

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
© UCLES 2024 0478/12/O/N/24 [Turn over
* 0000800000004 *

DO NOT WRITE IN THIS MARGIN


4

(c) Denary numbers can also be converted to hexadecimal.

Give the hexadecimal number for each of the three denary numbers.

14 ..............................................................................................................................................

100 ............................................................................................................................................

250 ............................................................................................................................................
[3]

DO NOT WRITE IN THIS MARGIN


Working space

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

DO NOT WRITE IN THIS MARGIN


...................................................................................................................................................

(d) A binary integer that is stored in a register in the computer has a logical left shift performed on it.

(i) Describe the process of the logical left shift that is performed on the binary integer.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [2]

DO NOT WRITE IN THIS MARGIN


(ii) State what effect this will have on the binary integer.

...........................................................................................................................................

..................................................................................................................................... [1]

(e) A negative binary integer needs to be stored in a register in the computer.

Give the name of the number system that can be used to represent negative binary integers.

............................................................................................................................................. [1]
DO NOT WRITE IN THIS MARGIN

© UCLES 2024 0478/12/O/N/24


* 0000800000005 *
DO NOT WRITE IN THIS MARGIN

4 A student has a smartwatch.

(a) The smartwatch has built-in input and output devices.

Identify two input devices that can be built into the smartwatch.

1 ................................................................................................................................................

2 ................................................................................................................................................
[2]
DO NOT WRITE IN THIS MARGIN

(b) Identify one output device that can be built into the smartwatch.

............................................................................................................................................. [1]

(c) The smartwatch has read only memory (ROM).

Explain why the smartwatch needs ROM.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
DO NOT WRITE IN THIS MARGIN

............................................................................................................................................. [2]

(d) The smartwatch uses a text message application that receives data from cloud storage.

(i) Describe what is meant by cloud storage.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................
DO NOT WRITE IN THIS MARGIN

..................................................................................................................................... [2]

(ii) Explain two benefits of the application using cloud storage.

1 ........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................
DO NOT WRITE IN THIS MARGIN

2 ........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................
[4]
© UCLES 2024 0478/12/O/N/24 [Turn over
* 0000800000006 *

DO NOT WRITE IN THIS MARGIN


6

(e) The smartwatch only displays the time and text messages.

A student incorrectly describes this smartwatch as a general-purpose computer.

Explain why the student’s description is incorrect.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

DO NOT WRITE IN THIS MARGIN


............................................................................................................................................. [2]

5 A barcode scanning system uses a check digit to check for errors in data on input.

(a) Explain how the barcode scanning system operates to check for errors.

...................................................................................................................................................

...................................................................................................................................................

DO NOT WRITE IN THIS MARGIN


...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [4]

(b) After a barcode is scanned, data is sent to a stock control system to update the stock value

DO NOT WRITE IN THIS MARGIN


stored for that product.

The data is sent to the stock control system using serial simplex data transmission.

(i) Explain how the data is sent using serial simplex data transmission.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................
DO NOT WRITE IN THIS MARGIN

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [3]

© UCLES 2024 0478/12/O/N/24


* 0000800000007 *
DO NOT WRITE IN THIS MARGIN

(ii) Explain why serial simplex is the most appropriate method of data transmission for this
purpose.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................
DO NOT WRITE IN THIS MARGIN

...........................................................................................................................................

..................................................................................................................................... [3]

(iii) The data is checked for errors after it has been transmitted to the stock control system.

Give two error detection methods that could be used for this purpose.

1 ........................................................................................................................................

2 ........................................................................................................................................
[2]
DO NOT WRITE IN THIS MARGIN

6 The table contains names and descriptions of components in a central processing unit (CPU).

Complete the table by giving the missing component names and descriptions.

Component name Description

sends signals to manage the flow of data through the CPU


............................................................

...............................................................................................
DO NOT WRITE IN THIS MARGIN

program counter
...............................................................................................

...............................................................................................
stores the address of the data that is about to be fetched
............................................................ from random access memory (RAM) into the CPU

transmits data between the RAM and the CPU


............................................................

...............................................................................................
accumulator
DO NOT WRITE IN THIS MARGIN

...............................................................................................

...............................................................................................

stores an instruction when it is being decoded


............................................................
[6]

© UCLES 2024 0478/12/O/N/24 [Turn over


* 0000800000008 *

DO NOT WRITE IN THIS MARGIN


8

7 A student enters the uniform resource locator (URL) for a web page into their tablet computer.

(a) State what is meant by a URL.

...................................................................................................................................................

............................................................................................................................................. [1]

(b) Identify two different parts of a URL.

1 ................................................................................................................................................

DO NOT WRITE IN THIS MARGIN


2 ................................................................................................................................................
[2]

(c) The student enters the URL into a piece of software that then displays the web page.

Identify the name of this software.

............................................................................................................................................. [1]

(d) Draw and annotate a diagram to show how the web page is located and retrieved to be
displayed on the student’s tablet computer.

DO NOT WRITE IN THIS MARGIN


DO NOT WRITE IN THIS MARGIN
DO NOT WRITE IN THIS MARGIN

[5]
© UCLES 2024 0478/12/O/N/24
* 0000800000009 *
DO NOT WRITE IN THIS MARGIN

(e) The data for the web page is transmitted using the secure socket layer (SSL) protocol.

Complete the paragraph about the SSL protocol.

Use only terms from the list.

Not all terms need to be used. Some terms may be used more than once.

encrypted file server hypertext markup language (HTML)


DO NOT WRITE IN THIS MARGIN

hypertext transfer protocol (HTTP) operating system search engine

unencrypted URL web browser web server

The .............................................................. asks the ..............................................................

to identify itself. The ................................................................................ sends back its digital

certificate. The .................................................................. authenticates the digital certificate.


DO NOT WRITE IN THIS MARGIN

If it is authentic, ............................................................................... data transmission begins.


[5]

8 A robot vacuum cleaner uses sensors to navigate around obstacles in a room.

(a) Tick (3) one box to show which sensor would be the most suitable for this purpose.

A proximity

B flow
DO NOT WRITE IN THIS MARGIN

C pressure

D level
[1]

(b) An expert system can be used to diagnose an error with a robot vacuum cleaner.

Circle three components that are part of an expert system.

knowledge base operating system firewall


DO NOT WRITE IN THIS MARGIN

server printer actuator inference engine

rule base encryption


[3]

© UCLES 2024 0478/12/O/N/24 [Turn over


* 0000800000010 *

DO NOT WRITE IN THIS MARGIN


10

(c) Explain how the robot vacuum cleaner can make use of machine learning.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

DO NOT WRITE IN THIS MARGIN


.............................................................................................................................................. [3]

DO NOT WRITE IN THIS MARGIN


DO NOT WRITE IN THIS MARGIN
DO NOT WRITE IN THIS MARGIN

© UCLES 2024 0478/12/O/N/24


DO NOT WRITE IN THIS MARGIN DO NOT WRITE IN THIS MARGIN DO NOT WRITE IN THIS MARGIN DO NOT WRITE IN THIS MARGIN DO NOT WRITE IN THIS MARGIN

© UCLES 2024
* 0000800000011 *

11

0478/12/O/N/24
BLANK PAGE
* 0000800000012 *

DO NOT WRITE IN THIS MARGIN


12

BLANK PAGE

DO NOT WRITE IN THIS MARGIN


DO NOT WRITE IN THIS MARGIN
DO NOT WRITE IN THIS MARGIN
DO NOT WRITE IN THIS MARGIN

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.

Cambridge Assessment International Education is part of Cambridge Assessment. Cambridge Assessment is the brand name of the University of Cambridge
Local Examinations Syndicate (UCLES), which is a department of the University of Cambridge.

© UCLES 2024 0478/12/O/N/24


* 0000800000001 *

Cambridge IGCSE™
* 6 2 2 1 7 5 4 0 8 3 *

COMPUTER SCIENCE 0478/13


Paper 1 Computer Systems October/November 2024

1 hour 45 minutes

You must answer on the question paper.

No additional materials are needed.

INSTRUCTIONS
● Answer all questions.
● Use a black or dark blue pen. You may use an HB pencil for any diagrams or graphs.
● Write your name, centre number and candidate number in the boxes at the top of the page.
● Write your answer to each question in the space provided.
● Do not use an erasable pen or correction fluid.
● Do not write on any bar codes.
● Calculators must not be used in this paper.

INFORMATION
● The total mark for this paper is 75.
● The number of marks for each question or part question is shown in brackets [ ].
● No marks will be awarded for using brand names of software packages or hardware.

This document has 12 pages. Any blank pages are indicated.

DC (DE) 336224/3
© UCLES 2024 [Turn over
* 0000800000002 *

DO NOT WRITE IN THIS MARGIN


2

1 Data can be measured using different units of storage.

(a) Tick (✓) one box to show which of the following is the largest unit of data storage.

A tebibyte (TiB)

B pebibyte (PiB)

C mebibyte (MiB)

D gibibyte (GiB)

DO NOT WRITE IN THIS MARGIN


[1]

(b) A computer has primary storage.

Give one example of primary storage.

Explain the purpose of your chosen example.

Example ....................................................................................................................................

Explanation ...............................................................................................................................

DO NOT WRITE IN THIS MARGIN


...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[3]

(c) All data is converted to binary to be processed by a computer.

(i) Calculate the binary number for the denary number 175. Show all your working.

...........................................................................................................................................

DO NOT WRITE IN THIS MARGIN


...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [2]
DO NOT WRITE IN THIS MARGIN

© UCLES 2024 0478/13/O/N/24


* 0000800000003 *
DO NOT WRITE IN THIS MARGIN

(ii) Give the binary number for the given hexadecimal numbers.

15 ......................................................................................................................................

2D ......................................................................................................................................

091 ....................................................................................................................................
[3]

Working space
DO NOT WRITE IN THIS MARGIN

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

(d) Binary integers can be added together.

Add the two binary integers using binary addition. Show all your working. Give your answer
in binary.
DO NOT WRITE IN THIS MARGIN

11100011
+ 11001100

[4]

(e) Calculate the denary number for the two’s complement binary integer 10001110. Show all
DO NOT WRITE IN THIS MARGIN

your working.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]
DO NOT WRITE IN THIS MARGIN

© UCLES 2024 0478/13/O/N/24 [Turn over


* 0000800000004 *

DO NOT WRITE IN THIS MARGIN


4

2 An employee has a report that they need to email to their employer.

The employee compresses the report file before emailing it.

(a) State the effect the compression has on the report file.

...................................................................................................................................................

............................................................................................................................................. [1]

(b) Give two benefits of compressing the report file before emailing it.

DO NOT WRITE IN THIS MARGIN


1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................
[2]

(c) The employee decides to use lossless compression to compress the file.

DO NOT WRITE IN THIS MARGIN


Explain why lossy compression is not suitable.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [3]

DO NOT WRITE IN THIS MARGIN


(d) When the employee enters the email address, the computer uses Unicode to convert the
email address to binary.

(i) State what Unicode is an example of.

..................................................................................................................................... [1]

(ii) Give two advantages of the computer using Unicode instead of American standard code
for information interchange (ASCII).

1 ........................................................................................................................................
DO NOT WRITE IN THIS MARGIN

...........................................................................................................................................

2 ........................................................................................................................................

...........................................................................................................................................
[2]

© UCLES 2024 0478/13/O/N/24


* 0000800000005 *
DO NOT WRITE IN THIS MARGIN

(iii) Give one disadvantage of the computer using Unicode instead of ASCII.

...........................................................................................................................................

..................................................................................................................................... [1]

(e) The report is broken down into packets to be emailed.

(i) Circle three items of data that can be found in the packet header.

trailer originator’s address payload


DO NOT WRITE IN THIS MARGIN

interrupt input operating system

destination address antivirus packet number


[3]

(ii) Each packet is sent along a different path from the employee’s device to the employer’s
device.

Tick (✓) one box to show the name of this method of sending packets.
DO NOT WRITE IN THIS MARGIN

A packet networking

B packet circuiting

C packet switching

D packet transferring
[1]

(iii) A hardware device is used to control the path that each packet takes.

Give the name of this hardware device.


DO NOT WRITE IN THIS MARGIN

..................................................................................................................................... [1]

(f) The email data is checked for errors after it has been transmitted, using an echo check and a
checksum.

(i) Explain how the echo check is used to check for errors in the email data.

...........................................................................................................................................

...........................................................................................................................................
DO NOT WRITE IN THIS MARGIN

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [3]

© UCLES 2024 0478/13/O/N/24 [Turn over


* 0000800000006 *

DO NOT WRITE IN THIS MARGIN


6

(ii) In the checksum error detection method, two values are compared after transmission. If
the values do not match, an error is detected.

Explain why the values not matching would show an error has occurred.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

DO NOT WRITE IN THIS MARGIN


..................................................................................................................................... [2]

(g) The email data is encrypted using asymmetric encryption before it is sent.

(i) Give one reason why the email data is encrypted.

...........................................................................................................................................

..................................................................................................................................... [1]

(ii) Give one similarity between symmetric encryption and asymmetric encryption.

DO NOT WRITE IN THIS MARGIN


...........................................................................................................................................

..................................................................................................................................... [1]

(iii) Give two differences between symmetric encryption and asymmetric encryption.

1 ........................................................................................................................................

...........................................................................................................................................

2 ........................................................................................................................................

...........................................................................................................................................

DO NOT WRITE IN THIS MARGIN


[2]

DO NOT WRITE IN THIS MARGIN

© UCLES 2024 0478/13/O/N/24


* 0000800000007 *
DO NOT WRITE IN THIS MARGIN

3 An instruction is fetched from random access memory (RAM) into the memory data register (MDR)
to be decoded.

(a) Identify two other registers that are used in the fetch stage of the cycle.

1 ................................................................................................................................................

2 ................................................................................................................................................
[2]

(b) Complete and annotate the diagram to show how the data is decoded once it has been
DO NOT WRITE IN THIS MARGIN

fetched into the MDR.

MDR
DO NOT WRITE IN THIS MARGIN

[4]
DO NOT WRITE IN THIS MARGIN
DO NOT WRITE IN THIS MARGIN

© UCLES 2024 0478/13/O/N/24 [Turn over


* 0000800000008 *

DO NOT WRITE IN THIS MARGIN


8

4 Complete the table to give the missing term or description for the internet terms.

Internet term Description

.................................................. the collection of web pages accessed using the internet

DO NOT WRITE IN THIS MARGIN


the address given to a device when it connects to the
..................................................
internet

...........................................................................................
web browser
...........................................................................................

DO NOT WRITE IN THIS MARGIN


...........................................................................................

the hardware that stores a database of matching website


..................................................
and IP addresses

a type of hardware that can be used to prevent a


..................................................
distributed denial of service (DDoS) attack

DO NOT WRITE IN THIS MARGIN


...........................................................................................
hacking
...........................................................................................

...........................................................................................
[6]
DO NOT WRITE IN THIS MARGIN

© UCLES 2024 0478/13/O/N/24


* 0000800000009 *
DO NOT WRITE IN THIS MARGIN

5 A farmer has a plough that is an automated system. The plough is used to dig the ground in a field
to prepare it for planting seeds.

The plough uses sensors and a microprocessor to maintain a straight line when digging the
ground.

(a) State what is meant by an automated system.

...................................................................................................................................................

............................................................................................................................................. [1]
DO NOT WRITE IN THIS MARGIN

(b) Describe the role of the microprocessor in this process.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
DO NOT WRITE IN THIS MARGIN

............................................................................................................................................. [3]

(c) Give two benefits to the farmer of using an automated system for this purpose.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................
[2]
DO NOT WRITE IN THIS MARGIN

(d) The plough uses artificial intelligence (AI) to navigate its way around the field.

Explain how the plough makes use of AI for this purpose.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
DO NOT WRITE IN THIS MARGIN

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [4]
© UCLES 2024 0478/13/O/N/24 [Turn over
* 0000800000010 *

DO NOT WRITE IN THIS MARGIN


10

6 (a) Complete the statements about cookies.

Use only terms from the list.

Not all terms need to be used. Some terms may be used more than once.

binary close denary expire

hexadecimal image malware operating system

DO NOT WRITE IN THIS MARGIN


permanent persistent session sound

temporary web browser

Cookies are small text files that are stored by a ....................................................... .

....................................................... cookies are ....................................................... text files

that are deleted when the ....................................................... is closed.

DO NOT WRITE IN THIS MARGIN


....................................................... cookies are ....................................................... text files

that are stored on a user’s secondary storage device until they are manually deleted or they

....................................................... .
[7]

(b) Give three examples of the use of cookies.

1 ................................................................................................................................................

DO NOT WRITE IN THIS MARGIN


...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................

3 ................................................................................................................................................

...................................................................................................................................................
[3]
DO NOT WRITE IN THIS MARGIN

© UCLES 2024 0478/13/O/N/24


* 0000800000011 *
DO NOT WRITE IN THIS MARGIN

11

7 A computer programmer uses an integrated development environment (IDE) when creating a


computer program.

Explain the purpose of the IDE.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................
DO NOT WRITE IN THIS MARGIN

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

.................................................................................................................................................... [4]
DO NOT WRITE IN THIS MARGIN
DO NOT WRITE IN THIS MARGIN
DO NOT WRITE IN THIS MARGIN

© UCLES 2024 0478/13/O/N/24


* 0000800000012 *

DO NOT WRITE IN THIS MARGIN


12

BLANK PAGE

DO NOT WRITE IN THIS MARGIN


DO NOT WRITE IN THIS MARGIN
DO NOT WRITE IN THIS MARGIN
DO NOT WRITE IN THIS MARGIN

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.

Cambridge Assessment International Education is part of Cambridge Assessment. Cambridge Assessment is the brand name of the University of Cambridge
Local Examinations Syndicate (UCLES), which is a department of the University of Cambridge.

© UCLES 2024 0478/13/O/N/24

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy