Cambridge International Examinations Cambridge International General Certificate of Secondary Education * 3 5 0 7 2 7 6 8 0 5 * 0478/11 COMPUTER SCIENCE Paper 1 Theory May/June 2016 1 hour 45 minutes Candidates answer on the Question Paper. No Additional Materials are required. No calculators allowed. READ THESE INSTRUCTIONS FIRST Write your Centre number, candidate number and name in the spaces at the top of this page. Write in dark blue or black pen. You may use an HB pencil for any diagrams, graphs or rough working. Do not use staples, paper clips, glue or correction fluid. DO NOT WRITE IN ANY BARCODES. Answer all questions. No marks will be awarded for using brand names of software packages or hardware. At the end of the examination, fasten all your work securely together. The number of marks is given in brackets [ ] at the end of each question or part question. The maximum number of marks is 75. The syllabus is approved for use in England, Wales and Northern Ireland as a Cambridge International Level 1/Level 2 Certificate. This document consists of 13 printed pages and 3 blank pages. DC (NF/CGW) 119032/4 © UCLES 2016 [Turn over 2 1 Some software can be described as free, freeware or shareware. Tick (✓) the appropriate boxes in the table below to show which features apply to these three types of software. Software feature Free Freeware Shareware Software source code can be freely accessed and modified as required All the features of the full version of the software are not made available; the full version needs to be purchased first The original software is subject to all copyright laws It is possible to distribute modified versions or copies of the software to friends and family [3] 2 Hexadecimal codes are used in MAC addresses. (a) State what is meant by the term MAC. ...............................................................................................................................................[1] (b) Explain what the hexadecimal code in a MAC address represents. ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ...............................................................................................................................................[3] © UCLES 2016 0478/11/M/J/16 3 3 (a) Five sensors and five applications are shown below. Draw a line to link each sensor to its most appropriate application. Sensor Application Light sensor Monitor the pollution levels in a river Moisture sensor Control the switching off and on of street lights Gas sensor Detect intruders breaking into a building pH sensor Monitor the amount of water left in clothes in a dryer Pressure sensor Monitor acidity levels in the soil in a greenhouse [4] (b) Automatic doors in a building are controlled by the use of infrared sensors and a microprocessor. Describe how the sensors and the microprocessor are used to automatically open a door as a person approaches. ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ...............................................................................................................................................[4] © UCLES 2016 0478/11/M/J/16 [Turn over 4 4 (a) Nikita wishes to print out some documents and connects her printer to the computer using one of the USB ports. (i) Identify what type of data transmission is being used. .......................................................................................................................................[1] (ii) Give three reasons for using a USB port. 1 ....................................................................................................................................... ........................................................................................................................................... 2 ....................................................................................................................................... ........................................................................................................................................... 3 ....................................................................................................................................... ........................................................................................................................................... [3] (iii) The printer runs out of paper while it is printing the documents. A signal is sent to the processor to request that the problem is dealt with. Name this type of signal. .......................................................................................................................................[1] (b) State one suitable application for each printer below. A different application must be given for each printer. Inkjet printer .............................................................................................................................. ................................................................................................................................................... 3D printer .................................................................................................................................. ................................................................................................................................................... [2] © UCLES 2016 0478/11/M/J/16 5 (c) Name another type of printer and describe one way in which it is different from the printers named in part (b). Give an application for this printer. Type of printer ........................................................................................................................... Description ................................................................................................................................ ................................................................................................................................................... ................................................................................................................................................... Application ................................................................................................................................ ................................................................................................................................................... [3] © UCLES 2016 0478/11/M/J/16 [Turn over 6 5 A computer-controlled machine produces plastic sheets. The thickness of each sheet must be within a certain tolerance. The sheets are kept below 50 °C as they move over rollers at 10 metres per second. Three parameters need to be monitored all the time. Parameter D S T Description Binary value Conditions 1 thickness of sheet in tolerance 0 thickness of sheet out of tolerance 1 roller speed = 10 metres/second 0 roller speed <> 10 metres/second 1 temperature < 50 °C 0 temperature >= 50 °C sheet thickness roller speed temperature An alarm, X, will sound if: thickness is in tolerance AND (roller speed <> 10 metres/second OR temperature >= 50 °C) OR roller speed = 10 metres/second AND temperature >= 50 °C (a) Draw a logic circuit to represent the above monitoring system. D S X T [6] © UCLES 2016 0478/11/M/J/16 7 (b) Complete the truth table for the monitoring system. D S T 0 0 0 0 0 1 0 1 0 0 1 1 1 0 0 1 0 1 1 1 0 1 1 1 Working Space X [4] 6 Secure socket layer (SSL) is used in the security of information on Internet websites. (a) State how it is possible for a user to know that a website is secure by looking at the web address. ................................................................................................................................................... ...............................................................................................................................................[1] (b) Describe three of the stages a web browser goes through to detect whether a website is secure. 1 ............................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... 2 ............................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... 3 ............................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... [3] © UCLES 2016 0478/11/M/J/16 [Turn over 8 7 Each seat on a flight is uniquely identified on an LCD above the seat. For example, seat 035C is shown as: The first three characters are digits that represent the row. The fourth character is the seat position in that row. This is a single letter, A to F, that is stored as a hexadecimal value. Each of the four display characters can be stored in a 4-bit register. For example, 0 and C would be represented as: 0: C: 8 4 2 1 0 1 0 1 0 0 0 0 (a) Show how the 4-bit registers would store the remaining two characters, 3 and 5. 3 5 [2] (b) Identify which seat is stored in the following 4-bit registers. 0 0 0 1 1 0 0 1 0 1 0 0 1 1 1 0 [2] © UCLES 2016 0478/11/M/J/16 9 8 A bank offers an online service to its customers. The bank has developed a “SafeToUse” system that asks each customer to enter four randomly chosen characters from their password each time they log in. The customer selects these four characters from drop-down boxes. For example: Please select the 2nd character 5th character 6th character 8th character (a) (i) Explain why it is more secure to use drop-down boxes rather than entering characters using a keyboard. ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... .......................................................................................................................................[2] (ii) Give a reason why the system asks for four characters chosen at random. ........................................................................................................................................... .......................................................................................................................................[1] (b) Biometrics is an additional form of security. Give two examples of biometrics. 1 ............................................................................................................................................... 2 ............................................................................................................................................... [2] © UCLES 2016 0478/11/M/J/16 [Turn over 10 9 Check digits are used to ensure the accuracy of entered data. A 7-digit number has an extra digit on the right, called the check digit. digit position: 1 2 3 4 5 6 7 8 digit: – – – – – – – – check digit The check digit is calculated as follows: • • • • each digit in the number is multiplied by its digit position the seven results are then added together this total is divided by 11 the remainder gives the check digit (if the remainder = 10, the check digit is X) (a) Calculate the check digit for the following number. Show all your working. 4 2 4 1 5 0 8 … ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... Check digit ................................................................................................................................ [2] (b) An operator has just keyed in the following number: 3 2 4 0 0 4 5 X Circle below correct if the check digit is correct OR incorrect if the check digit is incorrect. correct incorrect Explain your answer. ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... [3] © UCLES 2016 0478/11/M/J/16 11 10 Six security issues and six descriptions are shown below. Draw a line to link each security issue to its correct description. Security issue Description Pharming illegal access to a computer system without the owner’s consent or knowledge Phishing software that gathers information by monitoring key presses on a user’s keyboard; the data is sent back to the originator of the software Viruses malicious code installed on the hard drive of a user’s computer or on a web server; this code will re-direct the user to a fake website without the user’s knowledge Hacking creator of code sends out a legitimate-looking email in the hope of gathering personal and financial information from the recipient; it requires the user to click on the link in the email or attachment Spyware a message given to a web browser by a web server; it is stored in a text file; the message is then sent back to the server each time the browser requests a page from the server Cookies program or code that replicates itself; designed to amend, delete or copy data or files on a user’s computer; often causes the computer to crash or run slowly [5] © UCLES 2016 0478/11/M/J/16 [Turn over 12 11 (a) Four examples of optical storage media are: • • • • DVD-RW DVD-RAM CD-ROM Blu-ray disc The table below shows four features of optical storage media. Tick (✓) the appropriate boxes in the table to indicate which of the features apply to each example of optical storage media. Single track Many concentric tracks Blue laser used to read/ write data Red laser used to read/ write data DVD-RW DVD-RAM CD-ROM Blu-ray disc [4] (b) Solid state drives (SSD) are replacing hard disc drives (HDD) in some computers. (i) Give three reasons why this is happening. 1 ....................................................................................................................................... ........................................................................................................................................... 2 ....................................................................................................................................... ........................................................................................................................................... 3 ....................................................................................................................................... ........................................................................................................................................... [3] (ii) Explain why many web servers still use hard disc drive (HDD) technology. ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... .......................................................................................................................................[2] © UCLES 2016 0478/11/M/J/16 13 12 (a) Name the following type of barcode: ...............................................................................................................................................[1] (b) The barcode in part (a) contains the denary value 2640 Convert this value to hexadecimal. ................................................................................................................................................... ................................................................................................................................................... Write the value as a 12-bit binary number. [4] (c) An airport uses the type of barcode shown in part (a) to advertise local places of interest. Describe how a visitor landing at the airport could use these barcodes to help plan their visit. ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ...............................................................................................................................................[3] © UCLES 2016 0478/11/M/J/16 14 BLANK PAGE © UCLES 2016 0478/11/M/J/16 15 BLANK PAGE © UCLES 2016 0478/11/M/J/16 16 BLANK PAGE Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will be pleased to make amends at the earliest possible opportunity. To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after the live examination series. Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge. © UCLES 2016 0478/11/M/J/16 Cambridge International Examinations Cambridge International General Certificate of Secondary Education COMPUTER SCIENCE 0478/11 May/June 2016 Paper 1 MARK SCHEME Maximum Mark: 75 Published This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the details of the discussions that took place at an Examiners’ meeting before marking began, which would have considered the acceptability of alternative answers. Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for Teachers. Cambridge will not enter into discussions about these mark schemes. Cambridge is publishing the mark schemes for the May/June 2016 series for most Cambridge IGCSE®, Cambridge International A and AS Level components and some Cambridge O Level components. ® IGCSE is the registered trademark of Cambridge International Examinations. This syllabus is approved for use in England, Wales and Northern Ireland as a Cambridge International Level 1/Level 2 Certificate. This document consists of 10 printed pages. © UCLES 2016 [Turn over Page 2 1 Mark Scheme Cambridge IGCSE – May/June 2016 Syllabus 0478 Paper 11 1 mark for each correct column Software feature Free Software source code can be freely accessed and modified as required Freeware All the features of the full version of the software are not made available; the full version needs to be purchased first The original software is subject to all of the copyright laws It is possible to distribute modified versions or copies of the software to friends and family Shareware (1 mark) (1 mark) (1 mark) [3] 2 (a) media access control [1] (b) Any three from: – – – – – hardware/physical address unique address/number associated (with network card in) a device/computer usually 48/64 bits (12/16 hex digits) first 6/8 digits = manufacturer code/ID of device (NIC) last 6/8 digits = serial number of device (NIC) © Cambridge International Examinations 2016 [3] Page 3 3 Mark Scheme Cambridge IGCSE – May/June 2016 Syllabus 0478 Paper 11 (a) Light sensor Monitoring the pollution levels in a river Moisture sensor Control the switching off and on of street lighting Gas sensor Detection of intruders breaking into a building pH sensor Monitor the amount of water left in clothes in a drier Pressure sensor Monitor acidity levels in the soil in a greenhouse 4/5 matches – 4 marks 3 matches – 3 marks 2 matches – 2 marks 1 match – 1 mark [4] (b) Any four from: – – – – – – sensor(s) sends signal/data to microprocessor signal/data converted to digital (using an ADC) microprocessor compares signal/data with pre-set/stored value if sensor(s) signal/data indicates the presence of a person / the door needs to be opened / a match is found / door is closed … … microprocessor sends a signal to an actuator … … to operate/drive a motor to open the door [4] © Cambridge International Examinations 2016 Page 4 4 Mark Scheme Cambridge IGCSE – May/June 2016 Syllabus 0478 (a) (i) serial Paper 11 [1] (ii) Any three from: – automatically detects the hardware/installs drivers – plug only goes in one way/can’t connect incorrectly – supports different data transmission speeds/a range of data transmission speeds – has become the industry standard/universally used – backwards compatible (with earlier versions of USB ports) [3] (iii) interrupt [1] (b) 1 mark each use of printer, max 1 mark per printer. inkjet printer – (small quantities of) documents – photographs 3D printer – (physical) prototype (from CAD) – (physical) model (from a blueprint) [2] (c) 1 mark for naming printer + 1 mark for description + 1 mark for application Laser printer – – – – – – – uses toner/powder ink uses (positive and negative) charged drums // rotating drum uses static charge no moving head faster at printing high volume output/high speed producing flyers/leaflets/magazines This is an example, other types of printers can be credited. © Cambridge International Examinations 2016 [3] Page 5 5 Mark Scheme Cambridge IGCSE – May/June 2016 Syllabus 0478 Paper 11 (a) 1 mark for each correct gate, with correct source of input(s) [6] (b) D S T Working Space 0 0 0 0 0 0 1 0 0 1 0 1 0 1 1 0 1 0 0 1 1 0 1 1 1 1 0 1 1 1 1 0 4 marks for 8 correct X bits 3 marks for 6 correct X bits 2 marks for 4 correct X bits 1 mark for 2 correct X bits © Cambridge International Examinations 2016 X [4] Page 6 6 Mark Scheme Cambridge IGCSE – May/June 2016 Syllabus 0478 Paper 11 (a) Any one from: – – protocol ends in “s” use of https [1] (b) Any three from: – – – – – – 7 requests web server to identify itself/view the (SSL) certificate receives a copy of the (SSL) certificate, sent from the webserver checks if SSL certificate is authentic/trustworthy sends signal back to webserver that the certificate is authentic/trustworthy starts to transmit data once connection is established as secure if website is not secure browser will display an open padlock/warning message [3] (a) 1 mark for each correct binary value 3 0 0 1 1 5 0 1 0 1 [2] (b) 0 0 0 1 1 1 0 0 1 9 0 1 0 0 4 1 1 1 0 E 1 mark 1 mark [2] © Cambridge International Examinations 2016 Page 7 8 Mark Scheme Cambridge IGCSE – May/June 2016 Syllabus 0478 Paper 11 (a) (i) Any two from: – – – – – to protect against key logging software/spyware can stop key presses being recorded can stop key presses being relayed drop down boxes cannot be recorded as key presses drop down boxes can be placed in different location on the screen each time (to overcome screen capture issues) [2] (ii) Any one from: – – – – hacker never finds all characters on the first hack makes it more difficult for hackers to find the order of the characters hacker needs to hack the system several times to gain the whole password shoulder surfing will not give person full password [1] (b) Any two from: – – – – 9 fingerprint scanner face recognition software retina scanner/iris scanner voice recognition software [2] (a) 1 mark for correct check digit and 1 mark for showing the calculation (4 × 1) + (2 × 2) + (4 × 3) + (1 × 4) + (5 × 5) + (0 × 6) + (8 × 7) = 4 + 4 + 12 + 4 + 25 + 0 + 56 = 105 1 mark for any correct line of working 105/11 = 9 remainder 6 check digit is: 6 [2] (b) incorrect check digit [1] – – – check digit should be 1 (3*1) + (2*2) + (4*3) + (0*4) + (0*5) + (4*6) + (5*7) // 3 + 4 + 12 + 0 + 0 + 24 + 35 // Total = 78 78/11 gives 7 remainder 1 © Cambridge International Examinations 2016 [2] Page 8 Mark Scheme Cambridge IGCSE – May/June 2016 Syllabus 0478 Paper 11 10 illegal access to a computer system without the owner’s consent or knowledge Pharming software that gathers information by monitoring key presses on a user’s keyboard; the information is relayed back to the originator of the software Phishing Viruses malicious code installed on the hard drive of a user’s computer or on a web server; this code will re-direct the user to a fake website without the user’s knowledge Hacking creator of code sends out a legitimatelooking email in the hope of gathering personal and financial information from the recipient; it requires the user to click on the link in the email or attachment a message given to a web browser by a web server; it is stored in a text file; the message is then sent back to the server each time the browser requests a page from the server Spyware program or code that replicates itself designed to amend, delete or copy data or files on a user’s computer; often causes the computer to crash or run slowly Cookies 5/6 matches – 5 marks 4 matches – 4 marks 3 matches – 3 marks 2 matches – 2 marks 1 match – 1 mark © Cambridge International Examinations 2016 [5] Page 9 Mark Scheme Cambridge IGCSE – May/June 2016 Syllabus 0478 Paper 11 11 (a) 1 mark for each correct row Single track Many concentric tracks Blue laser Red laser used to read/ used to read/ write data write data DVD-RW DVD-RAM CD-ROM Blu-ray disc 1 mark 1 mark 1 mark 1 mark [4] (b) (i) Any three from: – – – – – – – – don’t need to “get up to speed” to work properly/no latency lower/less power consumption/more energy efficient run cooler run quieter data access is faster occupies less physical space/more compact lighter, so more suitable for a portable computer/laptop no moving parts so more reliable/durable in a portable computer/laptop [3] (ii) Any two from: – – – – HDD is cheaper for larger amounts of storage space HDD has greater longevity for read/write functions Expensive to change the technology // HDD are trusted technology No requirement for the increased speed of SSD © Cambridge International Examinations 2016 [2] Page 10 Mark Scheme Cambridge IGCSE – May/June 2016 Syllabus 0478 12 (a) QR (quick response) Code (b) – Paper 11 [1] A 5 0 (1 mark) 1 0 1 1 mark 0 0 1 0 1 0 0 1 mark 0 0 1 mark [4] (c) Any three from: - visitor scans the QR code with (the camera on) the mobile device App is used to read/interpret the QR code links to a website/opens a document … … to access local tourist information can store the QR code to refer to again for the information © Cambridge International Examinations 2016 [3] Cambridge International Examinations Cambridge International General Certificate of Secondary Education COMPUTER SCIENCE 0478/12 May/June 2016 Paper 1 MARK SCHEME Maximum Mark: 75 Published This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the details of the discussions that took place at an Examiners’ meeting before marking began, which would have considered the acceptability of alternative answers. Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for Teachers. Cambridge will not enter into discussions about these mark schemes. Cambridge is publishing the mark schemes for the May/June 2016 series for most Cambridge IGCSE®, Cambridge International A and AS Level components and some Cambridge O Level components. ® IGCSE is the registered trademark of Cambridge International Examinations. This syllabus is approved for use in England, Wales and Northern Ireland as a Cambridge International Level 1/Level 2 Certificate. This document consists of 10 printed pages. © UCLES 2016 [Turn over Page 2 1 Mark Scheme Cambridge IGCSE – May/June 2016 Syllabus 0478 Paper 12 compiler assembler interpreter [3] 2 Application Sensor controlling street lights Light monitoring a river for pollution Gas, pH, temperature, light controlling traffic lights pressure, magnetic field, NOTE: The same sensor cannot be given twice 3 [3] (a) 1 mark for each nibble 0100 1010 1111 (b) (i) 0 1 1 0 1 0 0 1 00011111 00110010 [3] 105 hours 31 minutes 50 seconds 1 mark 1 mark 1 mark (ii) 1F [3] [1] © Cambridge International Examinations 2016 Page 3 4 Mark Scheme Cambridge IGCSE – May/June 2016 Syllabus 0478 Paper 12 (a) Any three from: – The file can be compressed – The compression that is used is lossless (not lossy) – use of a compression algorithm – repeated words can be indexed – repeated word sections (e.g. “OU”) can be replaced by a numerical value – reference to zip files – save file as a pdf/convert to pdf [3] (b) Any four from: – the checksum for the bytes is calculated – this value is then transmitted with the block of data – at the receiving end, the checksum is re-calculated from the block of data received – the calculated value is then compared to the checksum transmitted – if they are the same value, then the data was transmitted without any error – if the values are different, then an error has been found – if the values are different, then a request is sent for the data to be re-transmitted [4] © Cambridge International Examinations 2016 Page 4 Mark Scheme Cambridge IGCSE – May/June 2016 Syllabus 0478 Paper 12 5 Description Device Allows a user to write on a surface using a pen; text and drawings are then captured electronically and stored for later use. Digital Light Projector Converts sound into an electrical signal/voltage. Uses thermal bubble and piezoelectric technology to produce a hard copy. Inkjet printer Interactive whiteboard Uses a bright white light source and micro mirrors (on a chip) to produce an image to be shone onto a wall or screen. Converts a hard copy document into an electronic form to be stored as a file on a computer. Uses negatively charged images on a rotating drum and positively charged toner to output a hard copy. 5/6 matches – 5 marks 4 matches – 4 marks 3 matches – 3 marks 2 matches – 2 marks 1 match – 1 mark © Cambridge International Examinations 2016 Laser printer Microphone Scanner (2D) [5] Page 5 6 Mark Scheme Cambridge IGCSE – May/June 2016 Syllabus 0478 Paper 12 (a) Type Tick () Method simplex serial half-duplex parallel full-duplex Type simplex Tick () Tick () half-duplex Method serial Tick () parallel full-duplex Type Tick () simplex half-duplex Method serial Tick () parallel full-duplex [6] (b) Any two from: – single wire means there is less chance of interference/data corruption – single wire reduces costs – more reliable over greater distances – bits will still be synchronised after transmission © Cambridge International Examinations 2016 [2] Page 6 7 Mark Scheme Cambridge IGCSE – May/June 2016 Syllabus 0478 Paper 12 (a) A B C Working space 0 0 0 0 0 0 1 1 0 1 0 0 0 1 1 1 1 0 0 0 1 0 1 1 1 1 0 1 1 1 1 0 4 marks for 8 correct X bits 3 marks for 6 correct X bits 2 marks for 4 correct X bits 1 mark for 2 correct X bits © Cambridge International Examinations 2016 X [4] Page 7 Mark Scheme Cambridge IGCSE – May/June 2016 Syllabus 0478 Paper 12 (b) 1 mark for each correct gate with correct source of input A X B C [5] (c) Each dotted area is 1 mark A X B C [4] © Cambridge International Examinations 2016 Page 8 8 Mark Scheme Cambridge IGCSE – May/June 2016 Syllabus 0478 Paper 12 (a) 1 mark for correct lines from each type of software NOTE: all statements that are correct must be connected to the correct type of software for the mark to be awarded Statement Type of software Users have the freedom to pass on the software to friends and family as they wish. Free software Users can download this software free of charge, but they cannot modify the source code in any way. Users are allowed to try out the software for a trial period only before being charged. Freeware Users can study the software source code and modify it, where necessary, to meet their own needs, without breaking copyright laws. Shareware Users can obtain a free trial version of the software, but this often does not contain all the features of the full version. [3] © Cambridge International Examinations 2016 Page 9 Mark Scheme Cambridge IGCSE – May/June 2016 Syllabus 0478 Paper 12 (b) Any three from: – That we should follow Copyright laws/intellectual property rights/work should not be stolen/plagiarised – That we should follow Data Protection laws – That we should not create or distribute malware//description of malware – That we should not hack/crack other computers//description of hacking – That we should protect our own computers against malware/hacking – That we should consider privacy issues (when using social networking) – That we consider anonymity issues (when using social networking) – That we should consider environmental impacts when using computers – Loss/creation of jobs from use of computers/robotics – We should follow codes of practice (for creation of code e.g. ACM/IEEE) [3] (c) 2 marks for each term described Viruses: – program/software/file that replicates (copies) itself – intends to delete or corrupt files//fill up hard disk space Pharming: – malicious code stored on a computer/web server – redirects user to fake website to steal user data Spyware: – monitors and relays user activity e.g. key presses//key logging software – user activity/key presses can be analysed to find sensitive data e.g. passwords [6] (d) Any three from: – examines/monitors traffic to and from a user’s computer and a network/Internet – checks whether incoming and outgoing traffic meets a given set of criteria/rules – firewall blocks/filters traffic that doesn’t meet the criteria/rules – logs all incoming and outgoing traffic – can prevent viruses or hackers gaining access – blocks/filters access to specified IP addresses/websites – warns users of attempts by software (in their computer) trying to access external data sources (e.g. updating of software) etc. // warns of attempted unauthorised access to the system [3] © Cambridge International Examinations 2016 Page 10 9 Mark Scheme Cambridge IGCSE – May/June 2016 Syllabus 0478 Paper 12 (a) Binary number A: 1 1 1 0 0 1 0 Binary number B: 1 0 0 1 1 1 0 [2] (b) Parity Bit Binary number A 1 Binary number B 1 [2] 10 1 mark for each correct storage device ROM (not EPROM/PROM) Blu-ray disc RAM DVD/ DVD-R(+R)/ DVD-RW(+RW)/ DVD-ROM (not CD or DVD-RAM) SSD/example of a USB storage device DVD-RAM [6] 11 1 mark for each correct point – Presentation is used to format colour/style – Structure is used to create layout – In a HTML document structure and presentation are often kept separate – By keeping the presentation separate it is easier to update colour/font – Presentation is often stored in a file called a CSS … – … the CSS in then linked to the HTML document to implement the presentation requirements – (Mark-up) tags are used to define the structure of the document … – … presentation and formatting can also be included within the tags [4] © Cambridge International Examinations 2016 Cambridge International Examinations Cambridge International General Certificate of Secondary Education COMPUTER SCIENCE 0478/12 May/June 2016 Paper 1 MARK SCHEME Maximum Mark: 75 Published This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the details of the discussions that took place at an Examiners’ meeting before marking began, which would have considered the acceptability of alternative answers. Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for Teachers. Cambridge will not enter into discussions about these mark schemes. Cambridge is publishing the mark schemes for the May/June 2016 series for most Cambridge IGCSE®, Cambridge International A and AS Level components and some Cambridge O Level components. ® IGCSE is the registered trademark of Cambridge International Examinations. This syllabus is approved for use in England, Wales and Northern Ireland as a Cambridge International Level 1/Level 2 Certificate. This document consists of 10 printed pages. © UCLES 2016 [Turn over Page 2 1 Mark Scheme Cambridge IGCSE – May/June 2016 Syllabus 0478 Paper 12 compiler assembler interpreter [3] 2 Application Sensor controlling street lights Light monitoring a river for pollution Gas, pH, temperature, light controlling traffic lights pressure, magnetic field, NOTE: The same sensor cannot be given twice 3 [3] (a) 1 mark for each nibble 0100 1010 1111 (b) (i) 0 1 1 0 1 0 0 1 00011111 00110010 [3] 105 hours 31 minutes 50 seconds 1 mark 1 mark 1 mark (ii) 1F [3] [1] © Cambridge International Examinations 2016 Page 3 4 Mark Scheme Cambridge IGCSE – May/June 2016 Syllabus 0478 Paper 12 (a) Any three from: – The file can be compressed – The compression that is used is lossless (not lossy) – use of a compression algorithm – repeated words can be indexed – repeated word sections (e.g. “OU”) can be replaced by a numerical value – reference to zip files – save file as a pdf/convert to pdf [3] (b) Any four from: – the checksum for the bytes is calculated – this value is then transmitted with the block of data – at the receiving end, the checksum is re-calculated from the block of data received – the calculated value is then compared to the checksum transmitted – if they are the same value, then the data was transmitted without any error – if the values are different, then an error has been found – if the values are different, then a request is sent for the data to be re-transmitted [4] © Cambridge International Examinations 2016 Page 4 Mark Scheme Cambridge IGCSE – May/June 2016 Syllabus 0478 Paper 12 5 Description Device Allows a user to write on a surface using a pen; text and drawings are then captured electronically and stored for later use. Digital Light Projector Converts sound into an electrical signal/voltage. Uses thermal bubble and piezoelectric technology to produce a hard copy. Inkjet printer Interactive whiteboard Uses a bright white light source and micro mirrors (on a chip) to produce an image to be shone onto a wall or screen. Converts a hard copy document into an electronic form to be stored as a file on a computer. Uses negatively charged images on a rotating drum and positively charged toner to output a hard copy. 5/6 matches – 5 marks 4 matches – 4 marks 3 matches – 3 marks 2 matches – 2 marks 1 match – 1 mark © Cambridge International Examinations 2016 Laser printer Microphone Scanner (2D) [5] Page 5 6 Mark Scheme Cambridge IGCSE – May/June 2016 Syllabus 0478 Paper 12 (a) Type Tick () Method simplex serial half-duplex parallel full-duplex Type simplex Tick () Tick () half-duplex Method serial Tick () parallel full-duplex Type Tick () simplex half-duplex Method serial Tick () parallel full-duplex [6] (b) Any two from: – single wire means there is less chance of interference/data corruption – single wire reduces costs – more reliable over greater distances – bits will still be synchronised after transmission © Cambridge International Examinations 2016 [2] Page 6 7 Mark Scheme Cambridge IGCSE – May/June 2016 Syllabus 0478 Paper 12 (a) A B C Working space 0 0 0 0 0 0 1 1 0 1 0 0 0 1 1 1 1 0 0 0 1 0 1 1 1 1 0 1 1 1 1 0 4 marks for 8 correct X bits 3 marks for 6 correct X bits 2 marks for 4 correct X bits 1 mark for 2 correct X bits © Cambridge International Examinations 2016 X [4] Page 7 Mark Scheme Cambridge IGCSE – May/June 2016 Syllabus 0478 Paper 12 (b) 1 mark for each correct gate with correct source of input A X B C [5] (c) Each dotted area is 1 mark A X B C [4] © Cambridge International Examinations 2016 Page 8 8 Mark Scheme Cambridge IGCSE – May/June 2016 Syllabus 0478 Paper 12 (a) 1 mark for correct lines from each type of software NOTE: all statements that are correct must be connected to the correct type of software for the mark to be awarded Statement Type of software Users have the freedom to pass on the software to friends and family as they wish. Free software Users can download this software free of charge, but they cannot modify the source code in any way. Users are allowed to try out the software for a trial period only before being charged. Freeware Users can study the software source code and modify it, where necessary, to meet their own needs, without breaking copyright laws. Shareware Users can obtain a free trial version of the software, but this often does not contain all the features of the full version. [3] © Cambridge International Examinations 2016 Page 9 Mark Scheme Cambridge IGCSE – May/June 2016 Syllabus 0478 Paper 12 (b) Any three from: – That we should follow Copyright laws/intellectual property rights/work should not be stolen/plagiarised – That we should follow Data Protection laws – That we should not create or distribute malware//description of malware – That we should not hack/crack other computers//description of hacking – That we should protect our own computers against malware/hacking – That we should consider privacy issues (when using social networking) – That we consider anonymity issues (when using social networking) – That we should consider environmental impacts when using computers – Loss/creation of jobs from use of computers/robotics – We should follow codes of practice (for creation of code e.g. ACM/IEEE) [3] (c) 2 marks for each term described Viruses: – program/software/file that replicates (copies) itself – intends to delete or corrupt files//fill up hard disk space Pharming: – malicious code stored on a computer/web server – redirects user to fake website to steal user data Spyware: – monitors and relays user activity e.g. key presses//key logging software – user activity/key presses can be analysed to find sensitive data e.g. passwords [6] (d) Any three from: – examines/monitors traffic to and from a user’s computer and a network/Internet – checks whether incoming and outgoing traffic meets a given set of criteria/rules – firewall blocks/filters traffic that doesn’t meet the criteria/rules – logs all incoming and outgoing traffic – can prevent viruses or hackers gaining access – blocks/filters access to specified IP addresses/websites – warns users of attempts by software (in their computer) trying to access external data sources (e.g. updating of software) etc. // warns of attempted unauthorised access to the system [3] © Cambridge International Examinations 2016 Page 10 9 Mark Scheme Cambridge IGCSE – May/June 2016 Syllabus 0478 Paper 12 (a) Binary number A: 1 1 1 0 0 1 0 Binary number B: 1 0 0 1 1 1 0 [2] (b) Parity Bit Binary number A 1 Binary number B 1 [2] 10 1 mark for each correct storage device ROM (not EPROM/PROM) Blu-ray disc RAM DVD/ DVD-R(+R)/ DVD-RW(+RW)/ DVD-ROM (not CD or DVD-RAM) SSD/example of a USB storage device DVD-RAM [6] 11 1 mark for each correct point – Presentation is used to format colour/style – Structure is used to create layout – In a HTML document structure and presentation are often kept separate – By keeping the presentation separate it is easier to update colour/font – Presentation is often stored in a file called a CSS … – … the CSS in then linked to the HTML document to implement the presentation requirements – (Mark-up) tags are used to define the structure of the document … – … presentation and formatting can also be included within the tags [4] © Cambridge International Examinations 2016 Cambridge International Examinations Cambridge International General Certificate of Secondary Education * 0 7 3 3 6 7 4 3 7 5 * 0478/13 COMPUTER SCIENCE Paper 1 Theory May/June 2016 1 hour 45 minutes Candidates answer on the Question Paper. No Additional Materials are required. No calculators allowed. READ THESE INSTRUCTIONS FIRST Write your Centre number, candidate number and name in the spaces at the top of this page. Write in dark blue or black pen. You may use an HB pencil for any diagrams, graphs or rough working. Do not use staples, paper clips, glue or correction fluid. DO NOT WRITE IN ANY BARCODES. Answer all questions. No marks will be awarded for using brand names of software packages or hardware. At the end of the examination, fasten all your work securely together. The number of marks is given in brackets [ ] at the end of each question or part question. The maximum number of marks is 75. The syllabus is approved for use in England, Wales and Northern Ireland as a Cambridge International Level 1/Level 2 Certificate. This document consists of 13 printed pages and 3 blank pages. DC (ST/CGW) 126906 © UCLES 2016 [Turn over 2 1 Some software can be described as free, freeware or shareware. Tick (✓) the appropriate boxes in the table below to show which features apply to these three types of software. Software feature Free Freeware Shareware Software source code can be freely accessed and modified as required All the features of the full version of the software are not made available; the full version needs to be purchased first The original software is subject to all copyright laws It is possible to distribute modified versions or copies of the software to friends and family [3] 2 Hexadecimal codes are used in MAC addresses. (a) State what is meant by the term MAC. ...............................................................................................................................................[1] (b) Explain what the hexadecimal code in a MAC address represents. ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ...............................................................................................................................................[3] © UCLES 2016 0478/13/M/J/16 3 3 (a) Five sensors and five applications are shown below. Draw a line to link each sensor to its most appropriate application. Sensor Application Light sensor Monitor the pollution levels in a river Moisture sensor Control the switching off and on of street lights Gas sensor Detect intruders breaking into a building pH sensor Monitor the amount of water left in clothes in a dryer Pressure sensor Monitor acidity levels in the soil in a greenhouse [4] (b) Automatic doors in a building are controlled by the use of infrared sensors and a microprocessor. Describe how the sensors and the microprocessor are used to automatically open a door as a person approaches. ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ...............................................................................................................................................[4] © UCLES 2016 0478/13/M/J/16 [Turn over 4 4 (a) Nikita wishes to print out some documents and connects her printer to the computer using one of the USB ports. (i) Identify what type of data transmission is being used. .......................................................................................................................................[1] (ii) Give three reasons for using a USB port. 1 ....................................................................................................................................... ........................................................................................................................................... 2 ....................................................................................................................................... ........................................................................................................................................... 3 ....................................................................................................................................... ........................................................................................................................................... [3] (iii) The printer runs out of paper while it is printing the documents. A signal is sent to the processor to request that the problem is dealt with. Name this type of signal. .......................................................................................................................................[1] (b) State one suitable application for each printer below. A different application must be given for each printer. Inkjet printer .............................................................................................................................. ................................................................................................................................................... 3D printer .................................................................................................................................. ................................................................................................................................................... [2] © UCLES 2016 0478/13/M/J/16 5 (c) Name another type of printer and describe one way in which it is different from the printers named in part (b). Give an application for this printer. Type of printer ........................................................................................................................... Description ................................................................................................................................ ................................................................................................................................................... ................................................................................................................................................... Application ................................................................................................................................ ................................................................................................................................................... [3] © UCLES 2016 0478/13/M/J/16 [Turn over 6 5 A computer-controlled machine produces plastic sheets. The thickness of each sheet must be within a certain tolerance. The sheets are kept below 50 °C as they move over rollers at 10 metres per second. Three parameters need to be monitored all the time. Parameter D S T Description Binary value Conditions 1 thickness of sheet in tolerance 0 thickness of sheet out of tolerance 1 roller speed = 10 metres/second 0 roller speed <> 10 metres/second 1 temperature < 50 °C 0 temperature >= 50 °C sheet thickness roller speed temperature An alarm, X, will sound if: thickness is in tolerance AND (roller speed <> 10 metres/second OR temperature >= 50 °C) OR roller speed = 10 metres/second AND temperature >= 50 °C (a) Draw a logic circuit to represent the above monitoring system. D S X T [6] © UCLES 2016 0478/13/M/J/16 7 (b) Complete the truth table for the monitoring system. D S T 0 0 0 0 0 1 0 1 0 0 1 1 1 0 0 1 0 1 1 1 0 1 1 1 Working Space X [4] 6 Secure socket layer (SSL) is used in the security of information on Internet websites. (a) State how it is possible for a user to know that a website is secure by looking at the web address. ................................................................................................................................................... ...............................................................................................................................................[1] (b) Describe three of the stages a web browser goes through to detect whether a website is secure. 1 ............................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... 2 ............................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... 3 ............................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... [3] © UCLES 2016 0478/13/M/J/16 [Turn over 8 7 Each seat on a flight is uniquely identified on an LCD above the seat. For example, seat 035C is shown as: The first three characters are digits that represent the row. The fourth character is the seat position in that row. This is a single letter, A to F, that is stored as a hexadecimal value. Each of the four display characters can be stored in a 4-bit register. For example, 0 and C would be represented as: 0: C: 8 4 2 1 0 1 0 1 0 0 0 0 (a) Show how the 4-bit registers would store the remaining two characters, 3 and 5. 3 5 [2] (b) Identify which seat is stored in the following 4-bit registers. 0 0 0 1 1 0 0 1 0 1 0 0 1 1 1 0 [2] © UCLES 2016 0478/13/M/J/16 9 8 A bank offers an online service to its customers. The bank has developed a “SafeToUse” system that asks each customer to enter four randomly chosen characters from their password each time they log in. The customer selects these four characters from drop-down boxes. For example: Please select the 2nd character 5th character 6th character 8th character (a) (i) Explain why it is more secure to use drop-down boxes rather than entering characters using a keyboard. ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... .......................................................................................................................................[2] (ii) Give a reason why the system asks for four characters chosen at random. ........................................................................................................................................... .......................................................................................................................................[1] (b) Biometrics is an additional form of security. Give two examples of biometrics. 1 ............................................................................................................................................... 2 ............................................................................................................................................... [2] © UCLES 2016 0478/13/M/J/16 [Turn over 10 9 Check digits are used to ensure the accuracy of entered data. A 7-digit number has an extra digit on the right, called the check digit. digit position: 1 2 3 4 5 6 7 8 digit: – – – – – – – – check digit The check digit is calculated as follows: • • • • each digit in the number is multiplied by its digit position the seven results are then added together this total is divided by 11 the remainder gives the check digit (if the remainder = 10, the check digit is X) (a) Calculate the check digit for the following number. Show all your working. 4 2 4 1 5 0 8 … ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... Check digit ................................................................................................................................ [2] (b) An operator has just keyed in the following number: 3 2 4 0 0 4 5 X Circle below correct if the check digit is correct OR incorrect if the check digit is incorrect. correct incorrect Explain your answer. ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... [3] © UCLES 2016 0478/13/M/J/16 11 10 Six security issues and six descriptions are shown below. Draw a line to link each security issue to its correct description. Security issue Description Pharming illegal access to a computer system without the owner’s consent or knowledge Phishing software that gathers information by monitoring key presses on a user’s keyboard; the data is sent back to the originator of the software Viruses malicious code installed on the hard drive of a user’s computer or on a web server; this code will re-direct the user to a fake website without the user’s knowledge Hacking creator of code sends out a legitimate-looking email in the hope of gathering personal and financial information from the recipient; it requires the user to click on the link in the email or attachment Spyware a message given to a web browser by a web server; it is stored in a text file; the message is then sent back to the server each time the browser requests a page from the server Cookies program or code that replicates itself; designed to amend, delete or copy data or files on a user’s computer; often causes the computer to crash or run slowly [5] © UCLES 2016 0478/13/M/J/16 [Turn over 12 11 (a) Four examples of optical storage media are: • • • • DVD-RW DVD-RAM CD-ROM Blu-ray disc The table below shows four features of optical storage media. Tick (✓) the appropriate boxes in the table to indicate which of the features apply to each example of optical storage media. Single track Many concentric tracks Blue laser used to read/ write data Red laser used to read/ write data DVD-RW DVD-RAM CD-ROM Blu-ray disc [4] (b) Solid state drives (SSD) are replacing hard disc drives (HDD) in some computers. (i) Give three reasons why this is happening. 1 ....................................................................................................................................... ........................................................................................................................................... 2 ....................................................................................................................................... ........................................................................................................................................... 3 ....................................................................................................................................... ........................................................................................................................................... [3] (ii) Explain why many web servers still use hard disc drive (HDD) technology. ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... .......................................................................................................................................[2] © UCLES 2016 0478/13/M/J/16 13 12 (a) Name the following type of barcode: ...............................................................................................................................................[1] (b) The barcode in part (a) contains the denary value 2640 Convert this value to hexadecimal. ................................................................................................................................................... ................................................................................................................................................... Write the value as a 12-bit binary number. [4] (c) An airport uses the type of barcode shown in part (a) to advertise local places of interest. Describe how a visitor landing at the airport could use these barcodes to help plan their visit. ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ...............................................................................................................................................[3] © UCLES 2016 0478/13/M/J/16 14 BLANK PAGE © UCLES 2016 0478/13/M/J/16 15 BLANK PAGE © UCLES 2016 0478/13/M/J/16 16 BLANK PAGE Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will be pleased to make amends at the earliest possible opportunity. To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after the live examination series. Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge. © UCLES 2016 0478/13/M/J/16 Cambridge International Examinations Cambridge International General Certificate of Secondary Education COMPUTER SCIENCE 0478/13 May/June 2016 Paper 1 MARK SCHEME Maximum Mark: 75 Published This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the details of the discussions that took place at an Examiners’ meeting before marking began, which would have considered the acceptability of alternative answers. Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for Teachers. Cambridge will not enter into discussions about these mark schemes. Cambridge is publishing the mark schemes for the May/June 2016 series for most Cambridge IGCSE®, Cambridge International A and AS Level components and some Cambridge O Level components. ® IGCSE is the registered trademark of Cambridge International Examinations. This syllabus is approved for use in England, Wales and Northern Ireland as a Cambridge International Level 1/Level 2 Certificate. This document consists of 10 printed pages. © UCLES 2016 [Turn over Page 2 1 Mark Scheme Cambridge IGCSE – May/June 2016 Syllabus 0478 Paper 13 1 mark for each correct column Software feature Free Software source code can be freely accessed and modified as required Freeware All the features of the full version of the software are not made available; the full version needs to be purchased first The original software is subject to all of the copyright laws It is possible to distribute modified versions or copies of the software to friends and family Shareware (1 mark) (1 mark) (1 mark) [3] 2 (a) media access control [1] (b) Any three from: – – – – – hardware/physical address unique address/number associated (with network card in) a device/computer usually 48/64 bits (12/16 hex digits) first 6/8 digits = manufacturer code/ID of device (NIC) last 6/8 digits = serial number of device (NIC) © Cambridge International Examinations 2016 [3] Page 3 3 Mark Scheme Cambridge IGCSE – May/June 2016 Syllabus 0478 Paper 13 (a) Light sensor Monitoring the pollution levels in a river Moisture sensor Control the switching off and on of street lighting Gas sensor Detection of intruders breaking into a building pH sensor Monitor the amount of water left in clothes in a drier Pressure sensor Monitor acidity levels in the soil in a greenhouse 4/5 matches – 4 marks 3 matches – 3 marks 2 matches – 2 marks 1 match – 1 mark [4] (b) Any four from: – – – – – – sensor(s) sends signal/data to microprocessor signal/data converted to digital (using an ADC) microprocessor compares signal/data with pre-set/stored value if sensor(s) signal/data indicates the presence of a person / the door needs to be opened / a match is found / door is closed … … microprocessor sends a signal to an actuator … … to operate/drive a motor to open the door [4] © Cambridge International Examinations 2016 Page 4 4 Mark Scheme Cambridge IGCSE – May/June 2016 Syllabus 0478 (a) (i) serial Paper 13 [1] (ii) Any three from: – automatically detects the hardware/installs drivers – plug only goes in one way/can’t connect incorrectly – supports different data transmission speeds/a range of data transmission speeds – has become the industry standard/universally used – backwards compatible (with earlier versions of USB ports) [3] (iii) interrupt [1] (b) 1 mark each use of printer, max 1 mark per printer. inkjet printer – (small quantities of) documents – photographs 3D printer – (physical) prototype (from CAD) – (physical) model (from a blueprint) [2] (c) 1 mark for naming printer + 1 mark for description + 1 mark for application Laser printer – – – – – – – uses toner/powder ink uses (positive and negative) charged drums // rotating drum uses static charge no moving head faster at printing high volume output/high speed producing flyers/leaflets/magazines This is an example, other types of printers can be credited. © Cambridge International Examinations 2016 [3] Page 5 5 Mark Scheme Cambridge IGCSE – May/June 2016 Syllabus 0478 Paper 13 (a) 1 mark for each correct gate, with correct source of input(s) [6] (b) D S T Working Space 0 0 0 0 0 0 1 0 0 1 0 1 0 1 1 0 1 0 0 1 1 0 1 1 1 1 0 1 1 1 1 0 4 marks for 8 correct X bits 3 marks for 6 correct X bits 2 marks for 4 correct X bits 1 mark for 2 correct X bits © Cambridge International Examinations 2016 X [4] Page 6 6 Mark Scheme Cambridge IGCSE – May/June 2016 Syllabus 0478 Paper 13 (a) Any one from: – – protocol ends in “s” use of https [1] (b) Any three from: – – – – – – 7 requests web server to identify itself/view the (SSL) certificate receives a copy of the (SSL) certificate, sent from the webserver checks if SSL certificate is authentic/trustworthy sends signal back to webserver that the certificate is authentic/trustworthy starts to transmit data once connection is established as secure if website is not secure browser will display an open padlock/warning message [3] (a) 1 mark for each correct binary value 3 0 0 1 1 5 0 1 0 1 [2] (b) 0 0 0 1 1 1 0 0 1 9 0 1 0 0 4 1 1 1 0 E 1 mark 1 mark [2] © Cambridge International Examinations 2016 Page 7 8 Mark Scheme Cambridge IGCSE – May/June 2016 Syllabus 0478 Paper 13 (a) (i) Any two from: – – – – – to protect against key logging software/spyware can stop key presses being recorded can stop key presses being relayed drop down boxes cannot be recorded as key presses drop down boxes can be placed in different location on the screen each time (to overcome screen capture issues) [2] (ii) Any one from: – – – – hacker never finds all characters on the first hack makes it more difficult for hackers to find the order of the characters hacker needs to hack the system several times to gain the whole password shoulder surfing will not give person full password [1] (b) Any two from: – – – – 9 fingerprint scanner face recognition software retina scanner/iris scanner voice recognition software [2] (a) 1 mark for correct check digit and 1 mark for showing the calculation (4 × 1) + (2 × 2) + (4 × 3) + (1 × 4) + (5 × 5) + (0 × 6) + (8 × 7) = 4 + 4 + 12 + 4 + 25 + 0 + 56 = 105 1 mark for any correct line of working 105/11 = 9 remainder 6 check digit is: 6 [2] (b) incorrect check digit [1] – – – check digit should be 1 (3*1) + (2*2) + (4*3) + (0*4) + (0*5) + (4*6) + (5*7) // 3 + 4 + 12 + 0 + 0 + 24 + 35 // Total = 78 78/11 gives 7 remainder 1 © Cambridge International Examinations 2016 [2] Page 8 Mark Scheme Cambridge IGCSE – May/June 2016 Syllabus 0478 Paper 13 10 illegal access to a computer system without the owner’s consent or knowledge Pharming software that gathers information by monitoring key presses on a user’s keyboard; the information is relayed back to the originator of the software Phishing Viruses malicious code installed on the hard drive of a user’s computer or on a web server; this code will re-direct the user to a fake website without the user’s knowledge Hacking creator of code sends out a legitimatelooking email in the hope of gathering personal and financial information from the recipient; it requires the user to click on the link in the email or attachment a message given to a web browser by a web server; it is stored in a text file; the message is then sent back to the server each time the browser requests a page from the server Spyware program or code that replicates itself designed to amend, delete or copy data or files on a user’s computer; often causes the computer to crash or run slowly Cookies 5/6 matches – 5 marks 4 matches – 4 marks 3 matches – 3 marks 2 matches – 2 marks 1 match – 1 mark © Cambridge International Examinations 2016 [5] Page 9 Mark Scheme Cambridge IGCSE – May/June 2016 Syllabus 0478 Paper 13 11 (a) 1 mark for each correct row Single track Many concentric tracks Blue laser Red laser used to read/ used to read/ write data write data DVD-RW DVD-RAM CD-ROM Blu-ray disc 1 mark 1 mark 1 mark 1 mark [4] (b) (i) Any three from: – – – – – – – – don’t need to “get up to speed” to work properly/no latency lower/less power consumption/more energy efficient run cooler run quieter data access is faster occupies less physical space/more compact lighter, so more suitable for a portable computer/laptop no moving parts so more reliable/durable in a portable computer/laptop [3] (ii) Any two from: – – – – HDD is cheaper for larger amounts of storage space HDD has greater longevity for read/write functions Expensive to change the technology // HDD are trusted technology No requirement for the increased speed of SSD © Cambridge International Examinations 2016 [2] Page 10 Mark Scheme Cambridge IGCSE – May/June 2016 Syllabus 0478 12 (a) QR (quick response) Code (b) – Paper 13 [1] A 5 0 (1 mark) 1 0 1 1 mark 0 0 1 0 1 0 0 1 mark 0 0 1 mark [4] (c) Any three from: - visitor scans the QR code with (the camera on) the mobile device App is used to read/interpret the QR code links to a website/opens a document … … to access local tourist information can store the QR code to refer to again for the information © Cambridge International Examinations 2016 [3] Cambridge International Examinations Cambridge International General Certificate of Secondary Education * 4 1 7 0 3 0 8 1 4 8 * 0478/11 COMPUTER SCIENCE October/November 2016 Paper 1 Theory 1 hour 45 minutes Candidates answer on the Question Paper. No Additional Materials are required. No calculators allowed. READ THESE INSTRUCTIONS FIRST Write your Centre number, candidate number and name in the spaces at the top of this page. Write in dark blue or black pen. You may use an HB pencil for any diagrams, graphs or rough working. Do not use staples, paper clips, glue or correction fluid. DO NOT WRITE IN ANY BARCODES. Answer all questions. No marks will be awarded for using brand names of software packages or hardware. At the end of the examination, fasten all your work securely together. The number of marks is given in brackets [ ] at the end of each question or part question. The maximum number of marks is 75. The syllabus is approved for use in England, Wales and Northern Ireland as a Cambridge International Level 1/Level 2 Certificate. This document consists of 14 printed pages and 2 blank pages. DC (NH/JG) 118885/4 © UCLES 2016 [Turn over 2 1 To process an instruction, a central processing unit (CPU) goes through a cycle that has three main stages. Name each stage in this cycle. Stage 1 ................................................................................ Stage 2 ................................................................................ Stage 3 ................................................................................ 2 [3] Name each of the potential security issues described in the five statements below: Statement Security issue The act of gaining unauthorised access to a computer system .................................................................................. Program code that can replicate itself with the intention of deleting or corrupting files stored in a computer .................................................................................. A small file sent by a web server to a web browser; every time the user visits the website, data about user preferences is collected .................................................................................. The act of illegally changing the source code of a program so that it can be exploited for another use .................................................................................. Malicious code installed on a user’s hard drive or a web server which redirects the user to a fake website without their knowledge .................................................................................. [5] © UCLES 2016 0478/11/O/N/16 3 3 Five computer terms and seven descriptions are shown below. Draw a line to connect each computer term to its correct description. Computer term Serial, simplex data transmission Description Several bits of data sent down several wires, in both directions, but not at the same time Several bits of data sent down several wires, in both directions, at the same time Parallel, half-duplex data transmission Parity check An even or odd number of bits set to 1 in a byte, used to check if the byte has been transmitted correctly One bit sent at a time, over a single wire in one direction only An additional digit placed at the end of a number to check if the number has been entered correctly Automatic repeat request (ARQ) A value transmitted at the end of a block of data; it is calculated using the other elements in the data stream and is used to check for transmission errors Checksum © UCLES 2016 An error detection method that uses response and time out when transmitting data; if a response is not sent back to the sender in an agreed amount of time, then the data is re-sent 0478/11/O/N/16 [5] [Turn over 4 4 The Henslows Diner is a local restaurant. (a) Staff currently use a keyboard to input a customer food order into a computer. The food order is then sent to the kitchen. State two disadvantages of using a keyboard to input a customer food order. 1 ................................................................................................................................................ ................................................................................................................................................... 2 ................................................................................................................................................ ................................................................................................................................................... [2] (b) A concept keyboard has a flat surface that is overlaid with images of food items available from the restaurant menu. Staff can click on an image to add the food item to a customer food order. The Henslows Diner wants to change to a concept keyboard to input customer food orders. Explain two benefits of making this change. 1 ................................................................................................................................................ ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... 2 ................................................................................................................................................ ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... [4] © UCLES 2016 0478/11/O/N/16 5 (c) The Henslows Diner stores personal data on a computer. This computer is connected to the Internet to allow the data to be backed up. There is currently one security method in place to protect the data on the computer from unauthorised access. This is a password. Give two other security methods that could be added to improve the security of the data. Describe how each method will keep the data safe. Security method 1 ..................................................................................................................... Description ................................................................................................................................ ................................................................................................................................................... ................................................................................................................................................... Security method 2 ..................................................................................................................... Description ................................................................................................................................ ................................................................................................................................................... ................................................................................................................................................... [4] © UCLES 2016 0478/11/O/N/16 [Turn over 6 5 Three switches, A, B and C, each send values of 0 or 1 to a logic circuit. Value X is output from the logic circuit. Switch A Switch B Logic circuit Output X Switch C Output X has a value of 1 depending on the following conditions: Switch A sends value 1 AND Switch B sends value 0 OR Switch B sends value 1 AND Switch C sends value 0 (a) Draw a logic circuit to represent the conditions above. A B X C [5] © UCLES 2016 0478/11/O/N/16 7 (b) Complete the truth table for the conditions given at the start of question 5. A B C 0 0 0 0 0 1 0 1 0 0 1 1 1 0 0 1 0 1 1 1 0 1 1 1 Working space X [4] (c) A microprocessor regularly samples the output, X. Each sample value is stored in an 8-bit register as shown below. One bit of this register is reserved as a parity bit. Five consecutive output values of 1 indicate a fault condition. Identify which of the following registers shows a fault condition. Parity bit 1 1 1 1 1 0 0 1 Register Y 0 1 0 1 1 1 1 1 Register Z Register .............................................[1] © UCLES 2016 0478/11/O/N/16 [Turn over 8 (d) When eight bytes of data have been collected, they are transmitted to a computer 100 km away. Parity checks are carried out to identify if the data has been transmitted correctly. The system uses even parity and column 1 is the parity bit. The eight bytes of data are sent together with a ninth parity byte: parity bit column 2 column 3 column 4 column 5 column 6 column 7 column 8 byte 1 1 0 0 0 0 1 0 0 byte 2 1 1 1 1 0 0 1 1 byte 3 0 1 0 0 1 0 0 0 byte 4 0 1 1 1 0 0 0 1 byte 5 1 0 0 0 1 1 1 1 byte 6 0 0 0 0 0 0 0 0 byte 7 1 1 1 0 1 0 0 0 byte 8 1 0 0 0 1 1 1 0 parity byte 1 0 1 1 0 1 1 1 (i) Identify which of the eight bytes contains an error. byte ...............................................................................................................................[1] (ii) Identify which column contains an error. column ...........................................................................................................................[1] (iii) The incorrect bit is indicated where the byte number and column cross. Give the corrected byte. [1] (iv) Calculate the denary value of the corrected byte. ........................................................................................................................................... .......................................................................................................................................[1] (v) Considering the fault condition given in part (c), explain why it is very important that the incorrect bit is located and corrected. ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... .......................................................................................................................................[2] © UCLES 2016 0478/11/O/N/16 9 6 High-level or low-level languages can be used when writing a computer program. State two advantages of using a high-level language and two advantages of using a low-level language. High-level language advantage 1 .................................................................................................... .......................................................................................................................................................... High-level language advantage 2 .................................................................................................... .......................................................................................................................................................... Low-level language advantage 1 ..................................................................................................... .......................................................................................................................................................... Low-level language advantage 2 ..................................................................................................... .......................................................................................................................................................... [4] 7 Modern Liquid Crystal Display (LCD) monitors use Light-Emitting Diode (LED) backlit technology. Give four benefits of using LED technology. 1 ....................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... 2 ....................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... 3 ....................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... 4 ....................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... [4] © UCLES 2016 0478/11/O/N/16 [Turn over 10 8 Four descriptions about compilers and interpreters are shown below. Draw lines to indicate which descriptions refer to a compiler and which descriptions refer to an interpreter. Description It is more difficult to debug the code since one error can produce many other associated errors. The speed of execution of program loops is slower. Compiler It produces fast, executable code that runs directly on the processor. Interpreter It is easier to debug the code since an error is displayed as soon as it is found. [4] © UCLES 2016 0478/11/O/N/16 11 9 A security light is controlled by sensors and a microprocessor. Describe how the sensors and microprocessor interact to switch on the security light when an intruder is detected. .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... ......................................................................................................................................................[6] © UCLES 2016 0478/11/O/N/16 [Turn over 12 10 (a) A manufacturer of aeroplane engines assigns a denary identification number (ID) to each engine. One engine has the ID: (i) 0431 Convert this denary number to a 12-bit binary format. [2] (ii) Show how this number would be represented in hexadecimal. ........................................................................................................................................... ........................................................................................................................................... [3] (b) The current status of the engine is sent to a computer in the aeroplane. Each piece of data collected is 8 bytes in size. Data collection occurs every 30 seconds. Calculate the number of kilobytes that would be needed to store the data collected during a 10-hour flight. Show your working. ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................. kilobytes [3] © UCLES 2016 0478/11/O/N/16 13 (c) At the end of the flight, all of the data are sent to the aeroplane engine manufacturer using the Internet. The computer in the aeroplane has a MAC address and an IP address. State what is meant by these two terms. MAC address ............................................................................................................................ ................................................................................................................................................... ................................................................................................................................................... IP address ................................................................................................................................. ................................................................................................................................................... ................................................................................................................................................... [2] (d) When sending this data, security is very important. Data are sent over the Internet using Transport Layer Security (TLS) protocol. Name the two layers that make up TLS. 1 ................................................................................................................................................ 2 ................................................................................................................................................ [2] © UCLES 2016 0478/11/O/N/16 [Turn over 14 11 Explain why ethics are important when using computers. .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... ......................................................................................................................................................[6] © UCLES 2016 0478/11/O/N/16 15 BLANK PAGE © UCLES 2016 0478/11/O/N/16 16 BLANK PAGE Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will be pleased to make amends at the earliest possible opportunity. To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after the live examination series. Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge. © UCLES 2016 0478/11/O/N/16 Cambridge International Examinations Cambridge International General Certificate of Secondary Education COMPUTER SCIENCE 0478/11 Paper 1 October/November 2016 MARK SCHEME Maximum Mark: 75 Published This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the details of the discussions that took place at an Examiners’ meeting before marking began, which would have considered the acceptability of alternative answers. Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for Teachers. Cambridge will not enter into discussions about these mark schemes. Cambridge is publishing the mark schemes for the October/November 2016 series for most Cambridge IGCSE®, Cambridge International A and AS Level components and some Cambridge O Level components. ® IGCSE is the registered trademark of Cambridge International Examinations. This syllabus is approved for use in England, Wales and Northern Ireland as a Cambridge International Level 1/Level 2 Certificate. This document consists of 9 printed pages. © UCLES 2016 [Turn over Page 2 1 2 Mark Scheme Cambridge IGCSE – October/November 2016 Syllabus 0478 Paper 11 In any order: – Fetch – Decode – Execute [3] – – – – – [5] Hacking Virus Cookies Cracking Pharming © UCLES 2016 Page 3 Mark Scheme Cambridge IGCSE – October/November 2016 Syllabus 0478 Paper 11 3 [5] © UCLES 2016 Page 4 4 Mark Scheme Cambridge IGCSE – October/November 2016 Syllabus 0478 Paper 11 (a) Any two from: – – – Easy to make a mistake Can be slow if not trained Dirt/food can get into keys [2] (b) Any two with identification and explanation from: – – – – – – – – Fewer typing errors may be made … … because one button is pressed to order an item Speed up the time to enter an order … … because fewer buttons are pressed to complete the order May require less training … … because it is easier to identify an order item from its image rather than typing it Can stop dirt/food damage … … normally has a protective layer // because there are no keys for dirt/food to get into [4] (c) 1 mark for security measure, 1 mark for description. Any two from: – – Encryption If the data is accessed or stolen it will be meaningless – – Biometric device Can help prevents unauthorised access to the system (only award once) – – – – Firewall Can alert to show unauthorised access attempt on the system Can help prevent unauthorised access to the system (only award once) Can help protect against viruses and malware entering the system – – Anti-spyware Can stop the keys being logged that, when analysed, would reveal the password to the data © UCLES 2016 [4] Page 5 5 Mark Scheme Cambridge IGCSE – October/November 2016 Syllabus 0478 Paper 11 (a) 1 mark per correct section. A X B C [5] (b) 4 marks for 8 correct values 3 marks for 6 correct values 2 marks for 4 correct values 1 mark for 2 correct values Working space A B C X 0 0 0 0 0 0 1 0 0 1 0 1 0 1 1 0 1 0 0 1 1 0 1 1 1 1 0 1 1 1 1 0 [4] © UCLES 2016 Page 6 Mark Scheme Cambridge IGCSE – October/November 2016 Syllabus 0478 Paper 11 (c) Register Z [1] (d) (i) (byte) 5 [1] (ii) (column) 4 [1] (iii) corrected byte is: 1 0 0 1 1 1 1 1 [1] (iv) that gives the value: 1 5 9 (follow through applies) [1] (v) Any two from: – – 6 The byte would be transmitted without having 5 consecutive 1’s The fault condition would not be recognised [2] Any two from: High level language – – – – easier/faster to write code as uses English-like statements easier to modify as uses English-like statements easier to debug as uses English-like statements portable language code Any two from: Low level language – – – 7 can work directly on memory locations can be executed faster translated program requires less memory [4] Any four from: – – – – – – reaches maximum brightness quickly colours are vivid good colour definition/contrast can be achieved screens can be thinner/thin more reliable as LED’s are long lasting consume very little/less energy © UCLES 2016 [4] Page 7 Mark Scheme Cambridge IGCSE – October/November 2016 Syllabus 0478 Paper 11 8 It is more difficult to debug the code since one error can produce many other associated errors The speed of execution of program loops is slower. Compiler It produces fast, executable code that runs directly on the processor Interpreter It is easier to debug the code since an error is displayed as soon as it is found. [4] © UCLES 2016 Page 8 9 Mark Scheme Cambridge IGCSE – October/November 2016 Syllabus 0478 Paper 11 Any six from: – – – – – – – – – – – – infrared / motion / pressure (sensor) // sensor detects movement/pressure signals/data sent (continuously) to microprocessor converted from analogue to digital (using ADC) microprocessor compares value with those stored in memory if sensor value does not match the stored value(s) … … signal sent to switch on the light … signal sent to keep the light on … light remains on for a period of time (30 seconds) if sensor value matches the stored value(s) … … light will remain off … will turn off after period of time (30 seconds) works in a continues loop [6] 10 (a) (i) 2 marks for 3 correct binary conversions, 1 mark for 2 correct binary conversions 0 0 0 1 1 0 1 0 1 1 1 [2] 1 (ii) 1 mark for each correct hex value converted 1AF [3] (b) 2 marks for working + 1 mark for correct answer Working – 1200 × 8 = 9600 (bytes) – 9600/1024 or 9600/1000 Answer – 9.4 or 9.6 kilobytes [3] (c) Any one from: MAC address – – – – Media Access Control (address) unique number that identifies a device (connected to the Internet) address is made up of manufacturer id + serial number of device address is allocated by the manufacturer Any one from: IP address – – – – – Internet Protocol (address) location/address of a device on the Internet address is unique for given Internet session address is supplied when a device connects to the Internet address is allocated by the network © UCLES 2016 [2] Page 9 (d) – – Mark Scheme Cambridge IGCSE – October/November 2016 Syllabus 0478 record (layer) handshake (layer) Paper 11 [2] 11 Any six from: – Help stop the misuse of computers – The use of computers needs to be governed – Help keep users safer when using computers – Provides rules for using computers – Help stop intellectual property theft – Helps prevent the misuse of personal information – Reference to laws (relevant example) – Reference to security issues (relevant example) NOTE: Answer must refer to the importance of ethics and be more than a description of ethics. © UCLES 2016 [6] Cambridge International Examinations Cambridge International General Certificate of Secondary Education * 0 7 2 0 8 2 9 7 4 7 * 0478/12 COMPUTER SCIENCE October/November 2016 Paper 1 Theory 1 hour 45 minutes Candidates answer on the Question Paper. No Additional Materials are required. No calculators allowed. READ THESE INSTRUCTIONS FIRST Write your Centre number, candidate number and name in the spaces at the top of this page. Write in dark blue or black pen. You may use an HB pencil for any diagrams, graphs or rough working. Do not use staples, paper clips, glue or correction fluid. DO NOT WRITE IN ANY BARCODES. Answer all questions. No marks will be awarded for using brand names of software packages or hardware. At the end of the examination, fasten all your work securely together. The number of marks is given in brackets [ ] at the end of each question or part question. The maximum number of marks is 75. The syllabus is approved for use in England, Wales and Northern Ireland as a Cambridge International Level 1/Level 2 Certificate. This document consists of 12 printed pages. DC (NH/SW) 122184/3 © UCLES 2016 [Turn over 2 1 (a) Give two reasons why a programmer would choose to write code in a low-level language. 1 ................................................................................................................................................ ................................................................................................................................................... ................................................................................................................................................... 2 ................................................................................................................................................ ................................................................................................................................................... ................................................................................................................................................... [2] (b) High-level languages require either an interpreter or a compiler to translate the program. The table below lists a number of statements about language translators. Tick (3) to show which statements refer to interpreters and which refer to compilers. Statements Interpreter (3) Compiler (3) Translates the source code into machine code all at once Produces an executable file in machine code Executes a high-level language program one instruction at a time Once translated, the translator does not need to be present for the program to run An executable file is produced [5] 2 State four functions of an operating system. 1 ....................................................................................................................................................... 2 ....................................................................................................................................................... 3 ....................................................................................................................................................... 4 ....................................................................................................................................................... [4] © UCLES 2016 0478/12/O/N/16 3 3 (a) Explain what is meant by: (i) Serial data transmission ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... .......................................................................................................................................[2] (ii) Parallel data transmission ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... .......................................................................................................................................[2] (b) A computer in a factory is connected to a printer. The printer is located in an office 1 km away from the factory. Identify which data transmission method would be most suitable for this connection. ................................................................................................................................................... Give two reasons for your choice. 1 ................................................................................................................................................ ................................................................................................................................................... ................................................................................................................................................... 2 ................................................................................................................................................ ................................................................................................................................................... ................................................................................................................................................... [3] © UCLES 2016 0478/12/O/N/16 [Turn over 4 4 Nine bytes of data are transmitted from one computer to another. Even parity is used. An additional parity byte is also sent. The ten bytes arrive at the destination computer as follows: parity bit bit 2 bit 3 bit 4 bit 5 bit 6 bit 7 bit 8 byte 1 1 1 1 0 1 1 1 0 byte 2 0 0 0 0 0 1 0 1 byte 3 0 1 1 1 1 0 0 0 byte 4 1 1 0 0 0 0 0 0 byte 5 1 0 1 1 1 1 1 0 byte 6 0 1 0 1 1 0 0 1 byte 7 0 1 1 1 0 0 1 1 byte 8 0 0 1 1 0 1 1 0 byte 9 1 1 0 0 0 0 1 1 parity byte 0 0 1 0 0 0 1 0 One of the bits was corrupted during the data transmission. (a) Circle the corrupt bit in the corrupt byte in the table above. [1] (b) Explain how the corrupted bit was found. ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ...............................................................................................................................................[2] © UCLES 2016 0478/12/O/N/16 5 5 A computer uses an 8-bit register. The 8-bit register contains binary integers. (a) Write the denary (base 10) value represented by: 128 64 32 16 8 4 2 1 0 1 1 1 0 0 0 0 ...............................................................................................................................................[1] (b) All the bits in the register are shifted one place to the right as shown below. 0 1 1 1 0 0 0 0 0 0 1 1 1 0 0 0 Write the denary number that is represented after this shift. ...............................................................................................................................................[1] (c) State the effect the shift to the right had on the original denary number from part (a). ...............................................................................................................................................[1] (d) The original number in part (a) is shifted three places to the right. (i) Show the new binary number: [1] (ii) Write the equivalent denary number. .......................................................................................................................................[1] © UCLES 2016 0478/12/O/N/16 [Turn over 6 (e) Describe the problems that could be caused if the original binary number in part (a) is shifted five places to the right. ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ...............................................................................................................................................[2] 6 Four computer terms and eight descriptions are shown below. Draw lines to connect each computer term to the correct description(s). Computer term Description Data can be read but not altered Arithmetic and logic unit (ALU) Carries out operations such as addition and multiplication Stores bootstrap loader and BIOS Control unit Fetches each instruction in turn Carries out operations such as AND, OR, NOT Random access memory (RAM) Stores part of the operating system currently in use Read only memory (ROM) Stores data currently in use Manages execution of each instruction [4] © UCLES 2016 0478/12/O/N/16 7 7 (a) Complete the truth tables and name the single logic gate that could replace each logic circuit: (i) A B X A B 0 0 0 1 1 0 1 1 Working space X Single logic gate ............................................................................................................[3] (ii) A X B A B 0 0 0 1 1 0 1 1 Working space X Single logic gate ............................................................................................................[3] © UCLES 2016 0478/12/O/N/16 [Turn over 8 (b) (i) Draw a logic circuit to represent the following logic statement: X = 1 if (A = 1 AND B = 1) OR ( (B = NOT 1) AND C = 1) A B X C [4] (ii) Complete the truth table for the logic statement in part (b)(i). A B C 0 0 0 0 0 1 0 1 0 0 1 1 1 0 0 1 0 1 1 1 0 1 1 1 Working space X [4] © UCLES 2016 0478/12/O/N/16 9 8 Identify whether the four statements about file compression are correct by writing TRUE or FALSE in the following table. Statement TRUE or FALSE MIDI files store the actual music notes in a compressed format JPEG files are examples of lossless file compression MP3 files are, on average, 90% smaller than the music files stored on a CD MP4 files are examples of lossy file compression [4] 9 (a) Explain what is meant by a denial of service attack. ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ...............................................................................................................................................[2] (b) Name and describe two other potential security threats when using the Internet. Security threat 1 ....................................................................................................................... Description ................................................................................................................................ ................................................................................................................................................... ................................................................................................................................................... Security threat 2 ....................................................................................................................... Description ................................................................................................................................ ................................................................................................................................................... ................................................................................................................................................... [4] © UCLES 2016 0478/12/O/N/16 [Turn over 10 10 (a) Describe what is meant by HTML. ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ...............................................................................................................................................[3] (b) The following URL is typed in: http://www.cie.org.uk/ComputerSciencePapers This URL is composed of three parts. State the part of this URL that is the: File name .................................................................................................................................. Protocol .................................................................................................................................... Web server name ..................................................................................................................... [3] © UCLES 2016 0478/12/O/N/16 11 11 A security system is installed in a house. A hexadecimal number is entered to activate or deactivate the alarm. (a) The alarm code is set to hexadecimal number 2 A F Show how this number would be stored in a 12-bit binary register. [3] (b) Identify two sensors that the security system could use to detect intruders. Describe how each sensor could be used in the security system. Sensor 1 ................................................................................................................................... Description ................................................................................................................................ ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... Sensor 2 ................................................................................................................................... Description ................................................................................................................................ ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... [6] © UCLES 2016 0478/12/O/N/16 [Turn over 12 12 Explain the differences between freeware and free software. .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... ......................................................................................................................................................[4] Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will be pleased to make amends at the earliest possible opportunity. To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after the live examination series. Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge. © UCLES 2016 0478/12/O/N/16 Cambridge International Examinations Cambridge International General Certificate of Secondary Education COMPUTER SCIENCE 0478/12 Paper 1 October/November 2016 MARK SCHEME Maximum Mark: 75 Published This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the details of the discussions that took place at an Examiners’ meeting before marking began, which would have considered the acceptability of alternative answers. Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for Teachers. Cambridge will not enter into discussions about these mark schemes. Cambridge is publishing the mark schemes for the October/November 2016 series for most Cambridge IGCSE®, Cambridge International A and AS Level components and some Cambridge O Level components. ® IGCSE is the registered trademark of Cambridge International Examinations. This document consists of 10 printed pages. © UCLES 2016 [Turn over Page 2 1 Mark Scheme Cambridge IGCSE – October/November 2016 Syllabus 0478 Paper 12 (a) Any two from: – – – direct access to computer processor / special hardware // machine dependent instructions uses up less memory can increase the speed of processing a program // executes instructions faster [2] (b) Interpreter (9) Statements Compiler (9) Translates the source code into machine code all at once 9 Produces an executable file in machine code 9 Executes a high-level language program one instruction at a time 9 Once translated, the translator does not need to be present for the program to run 9 An executable file is produced 9 [5] 2 Any four from: – – – – – – – – – – – – Provides a user interface Handles interrupts / errors Memory management File management Manages peripherals (inputs/outputs) Provides security methods Allows multitasking Manages multiprogramming Enables batch processing Manages software installation / removal Allows creation of multiple accounts Levels of access [4] © UCLES 2016 Page 3 3 Mark Scheme Cambridge IGCSE – October/November 2016 Syllabus 0478 Paper 12 (a) (i) Any two from: serial – – – one bit sent at a time // bits sent sequentially over a single wire synchronous or asynchronous [2] (ii) Any two from: parallel – – – several bits / a byte sent at a time using many / multiple wires synchronous [2] (b) – serial Any two from: – – – – – serial data transmission more reliable over long distances less likely for the data to be skewed/out of synchronisation less interference as only a single wire it is a cheaper connection as only single wire needed // cheaper to set up a fast connection is not required as a printer is limited by its printing speed [3] 4 (a) Intersection of Row 7 and column 4 circled (b) – – [1] Row (byte number) 7 has an odd number of 1s (five 1s) Column (bit number) 4 has an odd number of 1s (five 1s) [2] © UCLES 2016 Page 4 5 Mark Scheme Cambridge IGCSE – October/November 2016 Syllabus 0478 Paper 12 (a) 112 [1] (b) 56 [1] (c) divided by 2 // value 112 was halved // multiplied by 0.5 [1] (d) (i) 0 0 0 0 1 1 1 0 [1] (ii) 14 [1] (e) Any two from: – – – – run out of places to the right of register / at the end of register right-most 1 would be lost number would become 3 instead of 3.5 loss of precision [2] © UCLES 2016 Page 5 6 Mark Scheme Cambridge IGCSE – October/November 2016 Syllabus 0478 Paper 12 1 mark for both correct lines from each computer term. [4] © UCLES 2016 Page 6 7 Mark Scheme Cambridge IGCSE – October/November 2016 Syllabus 0478 Paper 12 (a) (i) 2 marks for 4 correct outputs, 1 mark for 2 correct outputs 1 mark for correct gate A B Working space X 0 0 0 0 1 0 1 0 0 1 1 1 AND gate [3] (ii) 2 marks for 4 correct outputs 1 mark for 2 correct outputs 1 mark for correct gate A B Working space X 0 0 0 0 1 1 1 0 1 1 1 1 OR gate [3] © UCLES 2016 Page 7 Mark Scheme Cambridge IGCSE – October/November 2016 Syllabus 0478 Paper 12 (b)(i) 1 mark per correct section. 1 mark 1 mark 1 mark 1 mark [4] (ii) 4 marks for 8 correct outputs 3 marks for 6 correct outputs 2 marks for 4 correct outputs 1 mark for 2 correct outputs A B C Working space X 0 0 0 0 0 0 1 1 0 1 0 0 0 1 1 0 1 0 0 0 1 0 1 1 1 1 0 1 1 1 1 1 [4] © UCLES 2016 Page 8 Mark Scheme Cambridge IGCSE – October/November 2016 Syllabus 0478 Paper 12 8 Statement TRUE or FALSE MIDI stores the actual music notes in a compressed format FALSE JPEG files are examples of lossless file compression FALSE MP3 files are, on average, 90% smaller than the music files stored on a CD TRUE MP4 files are examples of lossy file compression TRUE [4] 9 (a) Any two from: – – – – a large number of requests are sent to the network/server all at once designed to flood a network/server with useless traffic/requests the network/server will come to a halt/stop trying to deal with all the traffic/requests prevents users from gaining access to a website/server [2] (b) 1 mark for each security threat and 1 mark for matching description Security threat Description Viruses – software that replicates – causes loss/corruption of data // computer may “crash”/run slow Hacking/cracking – illegal/ unauthorised access to a system/data Phishing – a link/attachment sends user to fake website (where personal data may be obtained) Pharming – malicious code installed on user’s hard drive / computer – user is redirected to a fake website (where personal data may be obtained) Spyware/key logger – send/relay key strokes to a third party [4] © UCLES 2016 Page 9 Mark Scheme Cambridge IGCSE – October/November 2016 Syllabus 0478 Paper 12 10 (a) Any three from: – – – – hyper text mark-up language uses both structure and presentation web-authoring language/software // used to create websites/webpages uses tags to define e.g. colour / font / graphics / layout [3] (b) File name: ComputerSciencePapers Protocol: http(://) Web server name: www.cie.org.uk [3] 11 (a) 1 mark per nibble 0010 1010 1111 [3] (b) 1 mark for identification of each sensor, max 2 for each description Infrared/motion sensor – – – – – Receives infrared rays/heat Sends data to microprocessor Receives microwaves Placed in the corner of a room, across a doorway Used to detect the heat of an intruder // used to detect if an infrared beam has been broken by an intruder Pressure sensor – – – – Receives current if circuit created // stops receiving current if circuit is broken Sends data to microprocessor Placed on a window/door, at the entrance Used to detect a change in pressure [6] © UCLES 2016 Page 10 Mark Scheme Cambridge IGCSE – October/November 2016 Syllabus 0478 Paper 12 12 Any four from: – – – – – Freeware needs owner’s permission to share/copy/amend whereas free software can be shared/copied/amended without permission Freeware the owner retains copyright / is subject to copyright whereas free software the owner releases copyright/ is not subject to copyright Freeware is normally provided without a fee whereas free software a fee may be charged Freeware is distributed without the source code whereas free software is distributed with the source code Freeware can be restricted in use e.g. non-commercial whereas free software can be used without restriction NOTE: The question asks candidates to explain the differences, so each mark needs to have a comparison. [4] © UCLES 2016 Cambridge International Examinations Cambridge International General Certificate of Secondary Education * 0 0 5 8 7 0 8 2 2 7 * 0478/13 COMPUTER SCIENCE October/November 2016 Paper 1 Theory 1 hour 45 minutes Candidates answer on the Question Paper. No Additional Materials are required. No calculators allowed. READ THESE INSTRUCTIONS FIRST Write your Centre number, candidate number and name in the spaces at the top of this page. Write in dark blue or black pen. You may use an HB pencil for any diagrams, graphs or rough working. Do not use staples, paper clips, glue or correction fluid. DO NOT WRITE IN ANY BARCODES. Answer all questions. No marks will be awarded for using brand names of software packages or hardware. At the end of the examination, fasten all your work securely together. The number of marks is given in brackets [ ] at the end of each question or part question. The maximum number of marks is 75. The syllabus is approved for use in England, Wales and Northern Ireland as a Cambridge International Level 1/Level 2 Certificate. This document consists of 14 printed pages and 2 blank pages. DC (SLM) 135990 © UCLES 2016 [Turn over 2 1 To process an instruction, a central processing unit (CPU) goes through a cycle that has three main stages. Name each stage in this cycle. Stage 1 ................................................................................ Stage 2 ................................................................................ Stage 3 ................................................................................ 2 [3] Name each of the potential security issues described in the five statements below: Statement Security issue The act of gaining unauthorised access to a computer system .................................................................................. Program code that can replicate itself with the intention of deleting or corrupting files stored in a computer .................................................................................. A small file sent by a web server to a web browser; every time the user visits the website, data about user preferences is collected .................................................................................. The act of illegally changing the source code of a program so that it can be exploited for another use .................................................................................. Malicious code installed on a user’s hard drive or a web server which redirects the user to a fake website without their knowledge .................................................................................. [5] © UCLES 2016 0478/13/O/N/16 3 3 Five computer terms and seven descriptions are shown below. Draw a line to connect each computer term to its correct description. Computer term Serial, simplex data transmission Description Several bits of data sent down several wires, in both directions, but not at the same time Several bits of data sent down several wires, in both directions, at the same time Parallel, half-duplex data transmission Parity check An even or odd number of bits set to 1 in a byte, used to check if the byte has been transmitted correctly One bit sent at a time, over a single wire in one direction only An additional digit placed at the end of a number to check if the number has been entered correctly Automatic repeat request (ARQ) A value transmitted at the end of a block of data; it is calculated using the other elements in the data stream and is used to check for transmission errors Checksum © UCLES 2016 An error detection method that uses response and time out when transmitting data; if a response is not sent back to the sender in an agreed amount of time, then the data is re-sent 0478/13/O/N/16 [5] [Turn over 4 4 The Henslows Diner is a local restaurant. (a) Staff currently use a keyboard to input a customer food order into a computer. The food order is then sent to the kitchen. State two disadvantages of using a keyboard to input a customer food order. 1 ................................................................................................................................................ ................................................................................................................................................... 2 ................................................................................................................................................ ................................................................................................................................................... [2] (b) A concept keyboard has a flat surface that is overlaid with images of food items available from the restaurant menu. Staff can click on an image to add the food item to a customer food order. The Henslows Diner wants to change to a concept keyboard to input customer food orders. Explain two benefits of making this change. 1 ................................................................................................................................................ ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... 2 ................................................................................................................................................ ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... [4] © UCLES 2016 0478/13/O/N/16 5 (c) The Henslows Diner stores personal data on a computer. This computer is connected to the Internet to allow the data to be backed up. There is currently one security method in place to protect the data on the computer from unauthorised access. This is a password. Give two other security methods that could be added to improve the security of the data. Describe how each method will keep the data safe. Security method 1 ..................................................................................................................... Description ................................................................................................................................ ................................................................................................................................................... ................................................................................................................................................... Security method 2 ..................................................................................................................... Description ................................................................................................................................ ................................................................................................................................................... ................................................................................................................................................... [4] © UCLES 2016 0478/13/O/N/16 [Turn over 6 5 Three switches, A, B and C, each send values of 0 or 1 to a logic circuit. Value X is output from the logic circuit. Switch A Switch B Logic circuit Output X Switch C Output X has a value of 1 depending on the following conditions: Switch A sends value 1 AND Switch B sends value 0 OR Switch B sends value 1 AND Switch C sends value 0 (a) Draw a logic circuit to represent the conditions above. A B X C [5] © UCLES 2016 0478/13/O/N/16 7 (b) Complete the truth table for the conditions given at the start of question 5. A B C 0 0 0 0 0 1 0 1 0 0 1 1 1 0 0 1 0 1 1 1 0 1 1 1 Working space X [4] (c) A microprocessor regularly samples the output, X. Each sample value is stored in an 8-bit register as shown below. One bit of this register is reserved as a parity bit. Five consecutive output values of 1 indicate a fault condition. Identify which of the following registers shows a fault condition. Parity bit 1 1 1 1 1 0 0 1 Register Y 0 1 0 1 1 1 1 1 Register Z Register .............................................[1] © UCLES 2016 0478/13/O/N/16 [Turn over 8 (d) When eight bytes of data have been collected, they are transmitted to a computer 100 km away. Parity checks are carried out to identify if the data has been transmitted correctly. The system uses even parity and column 1 is the parity bit. The eight bytes of data are sent together with a ninth parity byte: parity bit column 2 column 3 column 4 column 5 column 6 column 7 column 8 byte 1 1 0 0 0 0 1 0 0 byte 2 1 1 1 1 0 0 1 1 byte 3 0 1 0 0 1 0 0 0 byte 4 0 1 1 1 0 0 0 1 byte 5 1 0 0 0 1 1 1 1 byte 6 0 0 0 0 0 0 0 0 byte 7 1 1 1 0 1 0 0 0 byte 8 1 0 0 0 1 1 1 0 parity byte 1 0 1 1 0 1 1 1 (i) Identify which of the eight bytes contains an error. byte ...............................................................................................................................[1] (ii) Identify which column contains an error. column ...........................................................................................................................[1] (iii) The incorrect bit is indicated where the byte number and column cross. Give the corrected byte. [1] (iv) Calculate the denary value of the corrected byte. ........................................................................................................................................... .......................................................................................................................................[1] (v) Considering the fault condition given in part (c), explain why it is very important that the incorrect bit is located and corrected. ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... .......................................................................................................................................[2] © UCLES 2016 0478/13/O/N/16 9 6 High-level or low-level languages can be used when writing a computer program. State two advantages of using a high-level language and two advantages of using a low-level language. High-level language advantage 1 .................................................................................................... .......................................................................................................................................................... High-level language advantage 2 .................................................................................................... .......................................................................................................................................................... Low-level language advantage 1 ..................................................................................................... .......................................................................................................................................................... Low-level language advantage 2 ..................................................................................................... .......................................................................................................................................................... [4] 7 Modern Liquid Crystal Display (LCD) monitors use Light-Emitting Diode (LED) backlit technology. Give four benefits of using LED technology. 1 ....................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... 2 ....................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... 3 ....................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... 4 ....................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... [4] © UCLES 2016 0478/13/O/N/16 [Turn over 10 8 Four descriptions about compilers and interpreters are shown below. Draw lines to indicate which descriptions refer to a compiler and which descriptions refer to an interpreter. Description It is more difficult to debug the code since one error can produce many other associated errors. The speed of execution of program loops is slower. Compiler It produces fast, executable code that runs directly on the processor. Interpreter It is easier to debug the code since an error is displayed as soon as it is found. [4] © UCLES 2016 0478/13/O/N/16 11 9 A security light is controlled by sensors and a microprocessor. Describe how the sensors and microprocessor interact to switch on the security light when an intruder is detected. .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... ......................................................................................................................................................[6] © UCLES 2016 0478/13/O/N/16 [Turn over 12 10 (a) A manufacturer of aeroplane engines assigns a denary identification number (ID) to each engine. One engine has the ID: (i) 0431 Convert this denary number to a 12-bit binary format. [2] (ii) Show how this number would be represented in hexadecimal. ........................................................................................................................................... ........................................................................................................................................... [3] (b) The current status of the engine is sent to a computer in the aeroplane. Each piece of data collected is 8 bytes in size. Data collection occurs every 30 seconds. Calculate the number of kilobytes that would be needed to store the data collected during a 10-hour flight. Show your working. ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................. kilobytes [3] © UCLES 2016 0478/13/O/N/16 13 (c) At the end of the flight, all of the data are sent to the aeroplane engine manufacturer using the Internet. The computer in the aeroplane has a MAC address and an IP address. State what is meant by these two terms. MAC address ............................................................................................................................ ................................................................................................................................................... ................................................................................................................................................... IP address ................................................................................................................................. ................................................................................................................................................... ................................................................................................................................................... [2] (d) When sending this data, security is very important. Data are sent over the Internet using Transport Layer Security (TLS) protocol. Name the two layers that make up TLS. 1 ................................................................................................................................................ 2 ................................................................................................................................................ [2] © UCLES 2016 0478/13/O/N/16 [Turn over 14 11 Explain why ethics are important when using computers. .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... ......................................................................................................................................................[6] © UCLES 2016 0478/13/O/N/16 15 BLANK PAGE © UCLES 2016 0478/13/O/N/16 16 BLANK PAGE Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will be pleased to make amends at the earliest possible opportunity. To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after the live examination series. Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge. © UCLES 2016 0478/13/O/N/16 Cambridge International Examinations Cambridge International General Certificate of Secondary Education COMPUTER SCIENCE 0478/13 Paper 1 October/November 2016 MARK SCHEME Maximum Mark: 75 Published This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the details of the discussions that took place at an Examiners’ meeting before marking began, which would have considered the acceptability of alternative answers. Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for Teachers. Cambridge will not enter into discussions about these mark schemes. Cambridge is publishing the mark schemes for the October/November 2016 series for most Cambridge IGCSE®, Cambridge International A and AS Level components and some Cambridge O Level components. ® IGCSE is the registered trademark of Cambridge International Examinations. This syllabus is approved for use in England, Wales and Northern Ireland as a Cambridge International Level 1/Level 2 Certificate. This document consists of 9 printed pages. © UCLES 2016 [Turn over Page 2 1 2 Mark Scheme Cambridge IGCSE – October/November 2016 Syllabus 0478 Paper 13 In any order: – Fetch – Decode – Execute [3] – – – – – [5] Hacking Virus Cookies Cracking Pharming © UCLES 2016 Page 3 Mark Scheme Cambridge IGCSE – October/November 2016 Syllabus 0478 Paper 13 3 [5] © UCLES 2016 Page 4 4 Mark Scheme Cambridge IGCSE – October/November 2016 Syllabus 0478 Paper 13 (a) Any two from: – – – Easy to make a mistake Can be slow if not trained Dirt/food can get into keys [2] (b) Any two with identification and explanation from: – – – – – – – – Fewer typing errors may be made … … because one button is pressed to order an item Speed up the time to enter an order … … because fewer buttons are pressed to complete the order May require less training … … because it is easier to identify an order item from its image rather than typing it Can stop dirt/food damage … … normally has a protective layer // because there are no keys for dirt/food to get into [4] (c) 1 mark for security measure, 1 mark for description. Any two from: – – Encryption If the data is accessed or stolen it will be meaningless – – Biometric device Can help prevents unauthorised access to the system (only award once) – – – – Firewall Can alert to show unauthorised access attempt on the system Can help prevent unauthorised access to the system (only award once) Can help protect against viruses and malware entering the system – – Anti-spyware Can stop the keys being logged that, when analysed, would reveal the password to the data © UCLES 2016 [4] Page 5 5 Mark Scheme Cambridge IGCSE – October/November 2016 Syllabus 0478 Paper 13 (a) 1 mark per correct section. A X B C [5] (b) 4 marks for 8 correct values 3 marks for 6 correct values 2 marks for 4 correct values 1 mark for 2 correct values Working space A B C X 0 0 0 0 0 0 1 0 0 1 0 1 0 1 1 0 1 0 0 1 1 0 1 1 1 1 0 1 1 1 1 0 [4] © UCLES 2016 Page 6 Mark Scheme Cambridge IGCSE – October/November 2016 Syllabus 0478 Paper 13 (c) Register Z [1] (d) (i) (byte) 5 [1] (ii) (column) 4 [1] (iii) corrected byte is: 1 0 0 1 1 1 1 1 [1] (iv) that gives the value: 1 5 9 (follow through applies) [1] (v) Any two from: – – 6 The byte would be transmitted without having 5 consecutive 1’s The fault condition would not be recognised [2] Any two from: High level language – – – – easier/faster to write code as uses English-like statements easier to modify as uses English-like statements easier to debug as uses English-like statements portable language code Any two from: Low level language – – – 7 can work directly on memory locations can be executed faster translated program requires less memory [4] Any four from: – – – – – – reaches maximum brightness quickly colours are vivid good colour definition/contrast can be achieved screens can be thinner/thin more reliable as LED’s are long lasting consume very little/less energy © UCLES 2016 [4] Page 7 Mark Scheme Cambridge IGCSE – October/November 2016 Syllabus 0478 Paper 13 8 It is more difficult to debug the code since one error can produce many other associated errors The speed of execution of program loops is slower. Compiler It produces fast, executable code that runs directly on the processor Interpreter It is easier to debug the code since an error is displayed as soon as it is found. [4] © UCLES 2016 Page 8 9 Mark Scheme Cambridge IGCSE – October/November 2016 Syllabus 0478 Paper 13 Any six from: – – – – – – – – – – – – infrared / motion / pressure (sensor) // sensor detects movement/pressure signals/data sent (continuously) to microprocessor converted from analogue to digital (using ADC) microprocessor compares value with those stored in memory if sensor value does not match the stored value(s) … … signal sent to switch on the light … signal sent to keep the light on … light remains on for a period of time (30 seconds) if sensor value matches the stored value(s) … … light will remain off … will turn off after period of time (30 seconds) works in a continues loop [6] 10 (a) (i) 2 marks for 3 correct binary conversions, 1 mark for 2 correct binary conversions 0 0 0 1 1 0 1 0 1 1 1 [2] 1 (ii) 1 mark for each correct hex value converted 1AF [3] (b) 2 marks for working + 1 mark for correct answer Working – 1200 × 8 = 9600 (bytes) – 9600/1024 or 9600/1000 Answer – 9.4 or 9.6 kilobytes [3] (c) Any one from: MAC address – – – – Media Access Control (address) unique number that identifies a device (connected to the Internet) address is made up of manufacturer id + serial number of device address is allocated by the manufacturer Any one from: IP address – – – – – Internet Protocol (address) location/address of a device on the Internet address is unique for given Internet session address is supplied when a device connects to the Internet address is allocated by the network © UCLES 2016 [2] Page 9 (d) – – Mark Scheme Cambridge IGCSE – October/November 2016 Syllabus 0478 record (layer) handshake (layer) Paper 13 [2] 11 Any six from: – Help stop the misuse of computers – The use of computers needs to be governed – Help keep users safer when using computers – Provides rules for using computers – Help stop intellectual property theft – Helps prevent the misuse of personal information – Reference to laws (relevant example) – Reference to security issues (relevant example) NOTE: Answer must refer to the importance of ethics and be more than a description of ethics. © UCLES 2016 [6] Cambridge International Examinations Cambridge International General Certificate of Secondary Education * 3 7 7 1 2 0 0 4 7 9 * 0478/11 COMPUTER SCIENCE May/June 2017 Paper 1 Theory 1 hour 45 minutes Candidates answer on the Question Paper. No Additional Materials are required. No calculators allowed. READ THESE INSTRUCTIONS FIRST Write your Centre number, candidate number and name in the spaces at the top of this page. Write in dark blue or black pen. You may use an HB pencil for any diagrams, graphs or rough working. Do not use staples, paper clips, glue or correction fluid. DO NOT WRITE IN ANY BARCODES. Answer all questions. No marks will be awarded for using brand names of software packages or hardware. At the end of the examination, fasten all your work securely together. The number of marks is given in brackets [ ] at the end of each question or part question. The maximum number of marks is 75. The syllabus is approved for use in England, Wales and Northern Ireland as a Cambridge International Level 1/Level 2 Certificate. This document consists of 12 printed pages. DC (LK/SG) 125857/3 © UCLES 2017 [Turn over 2 1 The memory of a computer contains data and instructions in binary. The following instruction is stored in a location of the memory. 0 0 1 0 1 0 0 1 1 1 1 1 1 1 0 0 (a) Convert the instruction into hexadecimal. ................................................................................................................................................... ................................................................................................................................................... ............................................................................................................................................... [2] (b) Explain why a programmer might prefer to read the instruction in hexadecimal rather than in binary. ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ............................................................................................................................................... [2] (c) Give two other uses of hexadecimal. Use 1 ........................................................................................................................................ ................................................................................................................................................... Use 2 ........................................................................................................................................ ................................................................................................................................................... [2] 2 Programmers can use a high-level language to write a computer program. (a) Explain what is meant by the term ‘high-level language’. ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ............................................................................................................................................... [2] © UCLES 2017 0478/11/M/J/17 3 (b) A program written in a high-level language is translated into machine code. This is so that it can be processed by a computer. Name one type of translator that can be used. .............................................................................................................................................. [1] (c) Describe how your answer to part (b) translates this program. ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... .............................................................................................................................................. [3] 3 Steffi has a number of files of different sizes that contain her work. Tick (3) to show whether each statement is true or false. true (3) Statement false (3) 47KB is larger than 10MB. 250bytes is smaller than 0.5MB. 50GB is larger than 100MB. 1TB is smaller than 4GB. [4] © UCLES 2017 0478/11/M/J/17 [Turn over 4 4 Five statements about serial half-duplex data transmission are shown in the table below. Tick (3) to show whether each statement is true or false. Statement true (3) false (3) Data is transmitted in one direction only, one bit at a time. Data is transmitted in both directions, multiple bits at a time. Data is transmitted in one direction only, multiple bits at a time. Data is transmitted in both directions, but only one direction at a time. Data is transmitted one bit at a time. Data is transmitted in both directions, but only one direction at a time. Data is transmitted multiple bits at a time. © UCLES 2017 0478/11/M/J/17 [5] 5 5 (a) Parity checks are often used to detect errors that may occur during data transmission. The received bytes in the table below were transmitted using odd parity. Tick (3) to show whether each byte has been corrupted during transmission or not corrupted during transmission. Received byte corrupted during transmission (3) not corrupted during transmission (3) 10110100 01101101 10000001 [3] (b) Another method of error detection is Automatic Repeat reQuest (ARQ). Explain how ARQ is used in error detection. ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... .............................................................................................................................................. [4] © UCLES 2017 0478/11/M/J/17 [Turn over 6 6 Signals are sent to and from the components of a processor using buses. Identify and describe the purpose of two different buses. Bus 1 .................................................................... Purpose ............................................................................................................................................ .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... Bus 2 .................................................................... Purpose ............................................................................................................................................ .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... [6] © UCLES 2017 0478/11/M/J/17 7 7 Six security terms and six statements are listed below. Draw a line to match the security term with the most appropriate statement. Security term Statement Encryption Provides a secure connection between web browsers and websites allowing secure transmission of private data. Secure Socket Layer (SSL) Computer that acts as an intermediary between a web browser and the Internet. Pharming Legitimate-looking email is sent in the hope of gathering personal information; it requires the user to click on a link in the email. Phishing Uses rules and criteria, set by the user, to help protect a network or system from unauthorised access. Firewall Malicious code installed on the hard drive of a user’s computer; this code will redirect the user to a fake website without the user’s knowledge. Proxy server Scrambles data for secure transmission. [5] © UCLES 2017 0478/11/M/J/17 [Turn over 8 8 Complete the paragraph by choosing six correct terms from the list. • • • • • • • • • Optical On-line RAM HDD Primary SSD Secondary ROM Off-line A computer has two different types of memory. .................................... memory is not directly accessed by the CPU, but it allows a user to store data that can easily be accessed by applications. Two examples of this type of memory are .................................... and .................................... . The second type of memory is .................................... memory. This memory is directly accessed by the CPU. It allows the processor to access data and instructions that are stored in this memory. Two examples of this memory are .................................... and .................................... . © UCLES 2017 0478/11/M/J/17 [6] 9 9 A supermarket has a system that allows customers to check out their own shopping. Identify and describe the purpose of two input devices and one output device used in this system. Input device 1 ................................................................................................................................... Purpose ............................................................................................................................................ .......................................................................................................................................................... .......................................................................................................................................................... Input device 2 ................................................................................................................................... Purpose ............................................................................................................................................ .......................................................................................................................................................... .......................................................................................................................................................... Output device 1 ................................................................................................................................ Purpose ............................................................................................................................................ .......................................................................................................................................................... .......................................................................................................................................................... [6] 10 (a) Complete the truth table for the NOR gate. A X B A B 0 0 0 1 1 0 1 1 Output (X) [1] © UCLES 2017 0478/11/M/J/17 [Turn over 10 (b) Write a logic statement that corresponds with the following logic circuit. A B X C X = ..................................................................................................................................... [3] 11 State three functions provided by an operating system. Function 1 ........................................................................................................................................ .......................................................................................................................................................... .......................................................................................................................................................... Function 2 ........................................................................................................................................ .......................................................................................................................................................... .......................................................................................................................................................... Function 3 ........................................................................................................................................ .......................................................................................................................................................... .......................................................................................................................................................... [3] © UCLES 2017 0478/11/M/J/17 11 12 The processes in a chemical factory are monitored by sensors connected to a microprocessor. (a) Identify two different sensors used in this application. Give an example of how each sensor could be used in the chemical factory. Sensor 1 ................................................................................................................................... Use ........................................................................................................................................... ................................................................................................................................................... Sensor 2 ................................................................................................................................... Use ........................................................................................................................................... ................................................................................................................................................... [4] (b) Describe how the sensors and a microprocessor are used to monitor a process. ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... .............................................................................................................................................. [5] © UCLES 2017 0478/11/M/J/17 [Turn over 12 13 (a) Gurdeep wants to send a large file to Jennifer over the Internet. State two benefits of compressing the file to send it. Benefit 1 ................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... Benefit 2 ................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... [2] (b) Two types of compression are lossy and lossless. Choose the most suitable type of compression for the following and explain your choice. (i) Downloading the code for a computer program: Type of compression ......................................................................................................... Explanation ....................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... [3] (ii) Streaming a video file: Type of compression ......................................................................................................... Explanation ....................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... [3] Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will be pleased to make amends at the earliest possible opportunity. To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after the live examination series. Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge. © UCLES 2017 0478/11/M/J/17 Cambridge International Examinations Cambridge International General Certificate of Secondary Education COMPUTER SCIENCE 0478/11 Paper 1 May/June 2017 MARK SCHEME Maximum Mark: 75 Published This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the details of the discussions that took place at an Examiners’ meeting before marking began, which would have considered the acceptability of alternative answers. Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for Teachers. Cambridge will not enter into discussions about these mark schemes. Cambridge is publishing the mark schemes for the May/June 2017 series for most Cambridge IGCSE®, Cambridge International A and AS Level and Cambridge Pre-U components, and some Cambridge O Level components. ® IGCSE is a registered trademark. This syllabus is approved for use in England, Wales and Northern Ireland as a Cambridge International Level 1/Level 2 Certificate. This document consists of 8 printed pages. © UCLES 2017 [Turn over 0478/11 Cambridge IGCSE – Mark Scheme PUBLISHED Question May/June 2017 Answer Marks 1(a) 1 mark for any two correct values, 2 marks for all 4 correct values. 29FC 2 1(b) Two from: • Easier/quicker to understand/read • Easier to debug/identify errors • Fewer digits are used / shorter // takes up less space on screen // more can be shown on screen / page 2 1(c) Two from: • Notations for colour in HTML // HTML colour (codes) • Error messages • MAC address // IP address • Locations in memory • Memory dump 2 Question Answer 2(a) Two from: • Closer to human language // closer to English • Independent of a particular type of computer/device/platform // portable language • A language such as Python, Java, Pascal, etc. (any suitable example) 2 2(b) One from: • Compiler • Interpreter 1 2(c) Must relate to answer given in 2b. No follow through for incorrect answer in part 2b. 3 Compiler – Three from: • Translates the whole program as a complete unit / at once • Creates an executable file / object code • A report / list of errors in the code is created • Optimises the source code (to run efficiently) Interpreter – Three from: • Translates a program one line of code at a time • Machine code is directly executed // The interpreter is used each time the program / code is executed • Will identify an error as soon as it finds one in a line of code © UCLES 2017 Page 2 of 8 Marks 0478/11 Question 3 May/June 2017 Cambridge IGCSE – Mark Scheme PUBLISHED Answer Marks 1 mark per correct tick 4 Statement true (9) false (9) 9 47KB is larger than 10MB. 250bytes is smaller than 0.5MB. 9 50GB is larger than 100MB. 9 9 1TB is smaller than 4GB. Question 4 Answer 1 mark per correct tick 5 Statement True False Data is transmitted in one direction only, one bit at a time. 9 Data is transmitted in both directions, multiple bits at a time. 9 Data is transmitted in one direction only, multiple bits at a time. 9 Data is transmitted in both directions, but only one direction at a time. Data is transmitted one bit at a time. Data is transmitted in both directions, but only one direction at a time. Data is transmitted multiple bits at a time. © UCLES 2017 Marks Page 3 of 8 9 9 0478/11 Question 5(a) May/June 2017 Cambridge IGCSE – Mark Scheme PUBLISHED Answer Marks 1 mark per correct tick Received byte 3 corrupted during transmission (9) not corrupted during transmission (9) 9 10110100 9 01101101 9 10000001 5(b) Four from: • Uses acknowledgement and time out • Check performed on received data // error is detected by e.g. parity check, check sum • If error detected, request sent to resend data // negative acknowledgment is used • If no acknowledgement is sent that data is received // positive acknowledgement is used • Data is resent / Resend request repeated, till data is resent correctly « • « or request times out // limit is reached Question Answer 6 1 mark for correct bus name and up to 2 further marks for appropriate purpose. Address (bus) Two from: • Carries / transports an address / location « • « of the next item to be fetched • Data travels one way (unidirectional) Data (bus) Two from: • Carries / transports data / example of data ... • « that is currently being processed // that will be / has been processed • Data can travel in both directions (bidirectional) Control (bus) Two from: • Carries / transports signals • Control / directs the actions of the CPU / processor • Can be either Unidirectional or Bidirectional © UCLES 2017 Page 4 of 8 4 Marks 6 0478/11 Cambridge IGCSE – Mark Scheme PUBLISHED Question Answer 7 May/June 2017 Marks 5 1 mark for correct line till 5 marks given. Question 8 © UCLES 2017 Answer • • • • • • Marks 6 Secondary HDD/SSD SSD/HDD Primary ROM/RAM RAM/ROM Page 5 of 8 0478/11 Cambridge IGCSE – Mark Scheme PUBLISHED Question 9 Answer May/June 2017 Marks 1 mark for appropriate device name and 1 further mark for appropriate purpose. 6 Input devices Two from: • Keypad / Keyboard « • « e.g. to allow customer to input the quantity of an item • Touchscreen « • « e.g. to allow a customer to select a payment method • Barcode scanner / Barcode reader « • « e.g. to allow a customer to scan in their shopping • Card reader // Cash deposit / intake « • « e.g. to allow a customer to pay for their shopping • Weighing scales « • « e.g. to allow a customer to weigh fresh produce Output devices One from: • Display / Touchscreen « • « e.g. to allow a customer to see the running total of their shopping • Speaker « • « e.g. to give audio instructions to a customer about how to use the self-checkout • Printer « • « e.g. to print a receipt for the customer Question 10(a) 10(b) Answer 1 mark for four correct outputs only 1 A B Output 0 0 1 0 1 0 1 0 0 1 1 0 1 mark for each correct section of the statement • • • © UCLES 2017 Marks (A AND B) AND (C OR NOT B) Page 6 of 8 3 0478/11 Question 11 Question 12(a) Cambridge IGCSE – Mark Scheme PUBLISHED May/June 2017 Answer Three from e.g. : • (Provides an) interface • Loads / opens / installs / closes software • Manages the hardware // manages peripherals // spooling • Manages the transfer of programs into and out of memory • Divides processing time // processor management • Manages file handling • Manages error handling // manages interrupts • Manages security software • Manages utility software • Manages user accounts • Multitasking • Multiprogramming // time slicing • Batch processing Answer 1 mark for appropriate sensor and 1 further mark for appropriate use. Marks 3 Marks 4 Two from: • Gas (sensor) « • « e.g. to measure the levels of oxygen/carbon dioxide / nitrogen in the factory to make sure they are not too high / low • Temperature (sensor) « • « e.g. to measure the temperature of the chemicals to make sure it is not too high/low • Motion / Infra-red (sensor) « • « e.g. to detect any persons in an unauthorised area of the factory • Pressure (sensor) « • « e.g. to measure the pressure of chemicals flowing through pipes to check that level are not too high / low • pH (sensor) « • « to measure the pH to make sure the acidity / alkalinity of the chemicals is correct • Light (sensor) « • « to measure the level of light to make sure it remains at a constant level for the chemical process 12(b) © UCLES 2017 Five from: • Sensors send signals to microprocessor • Analogue signals are converted to digital (using ADC) • Microprocessor compares value to stored value « • « If out of range / matches stored values « • « signal sent to alert workers (e.g. sound alarm) • « microprocessor send signal to cause an action to occur e.g. cool a process down, heat a process up, add a chemical • « no action taken • Output/record readings • Monitoring is continuous Page 7 of 8 5 0478/11 Cambridge IGCSE – Mark Scheme PUBLISHED Question 13(a) 13(b)(i) Answer 2 • • Lossless (compression) « « It is important the code must be (exactly) the same as the original file « If it does not match the original file it will not work 3 Lossy (compression) « « It would make the file smaller than lossless compression / the file would stream faster than lossless compression « The quality of the video can be reduced but it can still be viewed 3 • • • © UCLES 2017 Marks Two from: • Smaller file to transmit • The file is transmitted quicker • Uses / requires less bandwidth • 13(b)(ii) May/June 2017 Page 8 of 8 Cambridge International Examinations Cambridge International General Certificate of Secondary Education * 4 5 7 2 4 7 7 1 5 8 * 0478/12 COMPUTER SCIENCE May/June 2017 Paper 1 Theory 1 hour 45 minutes Candidates answer on the Question Paper. No Additional Materials are required. No calculators allowed. READ THESE INSTRUCTIONS FIRST Write your Centre number, candidate number and name in the spaces at the top of this page. Write in dark blue or black pen. You may use an HB pencil for any diagrams, graphs or rough working. Do not use staples, paper clips, glue or correction fluid. DO NOT WRITE IN ANY BARCODES. Answer all questions. No marks will be awarded for using brand names of software packages or hardware. At the end of the examination, fasten all your work securely together. The number of marks is given in brackets [ ] at the end of each question or part question. The maximum number of marks is 75. The syllabus is approved for use in England, Wales and Northern Ireland as a Cambridge International Level 1/Level 2 Certificate. This document consists of 12 printed pages. DC (CW/JG) 134134/3 © UCLES 2017 [Turn over 2 1 Name three different buses that are used in the fetch-execute cycle. Bus 1 ������������������������������������������������������������������������������������������������������������������������������������������������ Bus 2 ������������������������������������������������������������������������������������������������������������������������������������������������ Bus 3 ������������������������������������������������������������������������������������������������������������������������������������������������ [3] 2 Give two examples of primary, secondary and off-line storage. Primary Example 1 ���������������������������������������������������������������������������������������������������������������������������������������� Example 2 ���������������������������������������������������������������������������������������������������������������������������������������� Secondary Example 1 ���������������������������������������������������������������������������������������������������������������������������������������� Example 2 ���������������������������������������������������������������������������������������������������������������������������������������� Off-line Example 1 ���������������������������������������������������������������������������������������������������������������������������������������� Example 2 ���������������������������������������������������������������������������������������������������������������������������������������� [6] © UCLES 2017 0478/12/M/J/17 3 3 The diagram shows five output devices and five descriptions. Draw a line between each output device and its description. Output Device Description Inkjet printer Flat panel display that uses the light modulating properties of liquid crystals. LCD screen Flat panel display that uses an array of light‑emitting diodes as pixels. 2D cutter Droplets of ink are propelled onto paper. LED screen Electrically charged powdered ink is transferred onto paper. Laser printer High powered laser that uses the x-y plane. [4] © UCLES 2017 0478/12/M/J/17 [Turn over 4 4 There are various methods used to detect errors that can occur during data transmission and storage. Describe each of the following error detection methods. Parity check ������������������������������������������������������������������������������������������������������������������������������������� ���������������������������������������������������������������������������������������������������������������������������������������������������������� ���������������������������������������������������������������������������������������������������������������������������������������������������������� ���������������������������������������������������������������������������������������������������������������������������������������������������������� Check digit ��������������������������������������������������������������������������������������������������������������������������������������� ���������������������������������������������������������������������������������������������������������������������������������������������������������� ���������������������������������������������������������������������������������������������������������������������������������������������������������� ���������������������������������������������������������������������������������������������������������������������������������������������������������� Checksum ���������������������������������������������������������������������������������������������������������������������������������������� ���������������������������������������������������������������������������������������������������������������������������������������������������������� ���������������������������������������������������������������������������������������������������������������������������������������������������������� ���������������������������������������������������������������������������������������������������������������������������������������������������������� Automatic Repeat request (ARQ) ���������������������������������������������������������������������������������������������������� ���������������������������������������������������������������������������������������������������������������������������������������������������������� ���������������������������������������������������������������������������������������������������������������������������������������������������������� ���������������������������������������������������������������������������������������������������������������������������������������������������������� [8] © UCLES 2017 0478/12/M/J/17 5 5 (a) The denary number 57 is to be stored in two different computer registers. Convert 57 from denary to binary and show your working. ��������������������������������������������������������������������������������������������������������������������������������������������������� ��������������������������������������������������������������������������������������������������������������������������������������������������� ��������������������������������������������������������������������������������������������������������������������������������������������������� �����������������������������������������������������������������������������������������������������������������������������������������������[2] (b) Show the binary number from part (a) as it would be stored in the following registers. Register 1 Register 2 [2] (c) A binary number stored in a register can have many different uses, for example an address in main memory. Give two other uses for a binary number stored in a register. Use 1 ���������������������������������������������������������������������������������������������������������������������������������������� Use 2 ���������������������������������������������������������������������������������������������������������������������������������������� [2] (d) A register in a computer contains binary digits. 0 0 1 1 1 0 1 0 The contents of the register represent a binary integer. Convert the binary integer to hexadecimal. .................................................................................................................................................... ................................................................................................................................................[1] © UCLES 2017 0478/12/M/J/17 [Turn over 6 6 Airline boarding passes can be read from a smartphone instead of a printout. Back Boarding Pass A TSA Pre Passenger Webb / Alan B 15 Boarding Boarding Position Group Flight 683 JFK – LAX Date Thursday, November 10, 2016 Departs 8.15 pm Gate C4 Time, gate and terminals may change - check monitors Fly Rewards Fly Rewards# 12345678 Conf# BC123D Identify what type of barcode A is an example of. Explain how the data stored in this type of barcode is read. ���������������������������������������������������������������������������������������������������������������������������������������������������������� ���������������������������������������������������������������������������������������������������������������������������������������������������������� ���������������������������������������������������������������������������������������������������������������������������������������������������������� ���������������������������������������������������������������������������������������������������������������������������������������������������������� ���������������������������������������������������������������������������������������������������������������������������������������������������������� ���������������������������������������������������������������������������������������������������������������������������������������������������������� ���������������������������������������������������������������������������������������������������������������������������������������������������������� ������������������������������������������������������������������������������������������������������������������������������������������������������[4] © UCLES 2017 0478/12/M/J/17 7 7 Computer A is communicating with computer B. (a) Draw an arrow or arrows to show simplex, duplex and half-duplex data transmission. The direction of the data transmission must be fully labelled. Simplex data transmission Computer A Computer B Duplex data transmission Computer A Computer B Half-duplex data transmission Computer A Computer B [6] (b) State a use for the following data transmission methods. The use must be different for each data transmission method. Simplex ������������������������������������������������������������������������������������������������������������������������������������� ��������������������������������������������������������������������������������������������������������������������������������������������������� Duplex �������������������������������������������������������������������������������������������������������������������������������������� ��������������������������������������������������������������������������������������������������������������������������������������������������� [2] © UCLES 2017 0478/12/M/J/17 [Turn over 8 (c) A computer includes an Integrated Circuit (IC) and a Universal Serial Bus (USB) for data transmission. Describe how the computer uses these for data transmission, including the type of data transmission used. IC ���������������������������������������������������������������������������������������������������������������������������������������������� ��������������������������������������������������������������������������������������������������������������������������������������������������� ��������������������������������������������������������������������������������������������������������������������������������������������������� ��������������������������������������������������������������������������������������������������������������������������������������������������� USB ������������������������������������������������������������������������������������������������������������������������������������������ ��������������������������������������������������������������������������������������������������������������������������������������������������� ��������������������������������������������������������������������������������������������������������������������������������������������������� ��������������������������������������������������������������������������������������������������������������������������������������������������� [4] © UCLES 2017 0478/12/M/J/17 9 8 A company has a number of offices around the world. (a) Data is transmitted between the offices over the Internet. In order to keep the data safe the company is using Secure Socket Layer (SSL) protocol and a firewall at each office. Explain how SSL protocol and a firewall will keep the company’s data safe. SSL protocol ����������������������������������������������������������������������������������������������������������������������������� ��������������������������������������������������������������������������������������������������������������������������������������������������� ��������������������������������������������������������������������������������������������������������������������������������������������������� Firewall ������������������������������������������������������������������������������������������������������������������������������������� ��������������������������������������������������������������������������������������������������������������������������������������������������� ��������������������������������������������������������������������������������������������������������������������������������������������������� [4] (b) A company stores personal details of its customers on a computer system behind a firewall. Explain, with reasons, what else the company should do to keep this data safe. ��������������������������������������������������������������������������������������������������������������������������������������������������� ��������������������������������������������������������������������������������������������������������������������������������������������������� ��������������������������������������������������������������������������������������������������������������������������������������������������� ��������������������������������������������������������������������������������������������������������������������������������������������������� ��������������������������������������������������������������������������������������������������������������������������������������������������� ��������������������������������������������������������������������������������������������������������������������������������������������������� ��������������������������������������������������������������������������������������������������������������������������������������������������� ��������������������������������������������������������������������������������������������������������������������������������������������������� ��������������������������������������������������������������������������������������������������������������������������������������������������� ��������������������������������������������������������������������������������������������������������������������������������������������������� �����������������������������������������������������������������������������������������������������������������������������������������������[6] © UCLES 2017 0478/12/M/J/17 [Turn over 10 9 A cold store is kept at a constant low temperature using a sensor, a microprocessor and a cooling unit. Explain how the sensor and microprocessor will maintain a constant low temperature. ���������������������������������������������������������������������������������������������������������������������������������������������������������� ���������������������������������������������������������������������������������������������������������������������������������������������������������� ���������������������������������������������������������������������������������������������������������������������������������������������������������� ���������������������������������������������������������������������������������������������������������������������������������������������������������� ���������������������������������������������������������������������������������������������������������������������������������������������������������� ���������������������������������������������������������������������������������������������������������������������������������������������������������� ���������������������������������������������������������������������������������������������������������������������������������������������������������� ���������������������������������������������������������������������������������������������������������������������������������������������������������� ���������������������������������������������������������������������������������������������������������������������������������������������������������� ���������������������������������������������������������������������������������������������������������������������������������������������������������� ���������������������������������������������������������������������������������������������������������������������������������������������������������� ������������������������������������������������������������������������������������������������������������������������������������������������������[6] © UCLES 2017 0478/12/M/J/17 11 10 For this logic statement: X = 1 if (( A is 1 AND B is 1 ) OR ( B is 1 AND C is NOT 1 )) (a) Draw the logic circuit. A B X C [4] (b) Complete the truth table for the given logic statement. A B C 0 0 0 0 0 1 0 1 0 0 1 1 1 0 0 1 0 1 1 1 0 1 1 1 Working space X [4] © UCLES 2017 0478/12/M/J/17 [Turn over 12 11 A company sells smartphones over the Internet. Explain how the information stored on the company’s website is requested by the customer, sent to the customer’s computer and displayed on the screen. ���������������������������������������������������������������������������������������������������������������������������������������������������������� ���������������������������������������������������������������������������������������������������������������������������������������������������������� ���������������������������������������������������������������������������������������������������������������������������������������������������������� ���������������������������������������������������������������������������������������������������������������������������������������������������������� ���������������������������������������������������������������������������������������������������������������������������������������������������������� ���������������������������������������������������������������������������������������������������������������������������������������������������������� ���������������������������������������������������������������������������������������������������������������������������������������������������������� ���������������������������������������������������������������������������������������������������������������������������������������������������������� ���������������������������������������������������������������������������������������������������������������������������������������������������������� ���������������������������������������������������������������������������������������������������������������������������������������������������������� ���������������������������������������������������������������������������������������������������������������������������������������������������������� ���������������������������������������������������������������������������������������������������������������������������������������������������������� ���������������������������������������������������������������������������������������������������������������������������������������������������������� ������������������������������������������������������������������������������������������������������������������������������������������������������[7] Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will be pleased to make amends at the earliest possible opportunity. To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after the live examination series. Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge. © UCLES 2017 0478/12/M/J/17 Cambridge International Examinations Cambridge International General Certificate of Secondary Education COMPUTER SCIENCE 0478/12 Paper 1 May/June 2017 MARK SCHEME Maximum Mark: 75 Published This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the details of the discussions that took place at an Examiners’ meeting before marking began, which would have considered the acceptability of alternative answers. Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for Teachers. Cambridge will not enter into discussions about these mark schemes. Cambridge is publishing the mark schemes for the May/June 2017 series for most Cambridge IGCSE®, Cambridge International A and AS Level and Cambridge Pre-U components, and some Cambridge O Level components. ® IGCSE is a registered trademark. This syllabus is approved for use in England, Wales and Northern Ireland as a Cambridge International Level 1/Level 2 Certificate. This document consists of 9 printed pages. © UCLES 2017 [Turn over 0478/12 Cambridge IGCSE – Mark Scheme PUBLISHED Question 1 Answer • • • 2 Marks 3 address (bus) control (bus) data (bus) Question May/June 2017 Answer 2 marks for each type of storage Marks 6 Primary storage • RAM • ROM Secondary storage • hard disk drive (HDD) • solid state drive (SSD) Off-line storage e.g. • CD • DVD • Blu-ray • Flash memory // USB storage • removable / external / portable hard disk drive (HDD/SSD) • SD card Question Answer 3 4 1 mark for each correct line to a max of 4 marks. © UCLES 2017 Marks Page 2 of 9 0478/12 Question 4 Cambridge IGCSE – Mark Scheme PUBLISHED May/June 2017 Answer Two marks for each correct description Parity Check • Checks a byte of data • Check is performed when data is received • A parity bit is added (to the parity byte) • Counts / checks number of 1’s // counts / checks to see if 1’s are even // counts / checks to see if 1’s are odd • Can be even or odd • If parity is incorrect, error is detected Check digit • A digit that is calculated from the data // uses modulo to calculate digit // valid description of modulo • It is appended / added to the data • Digit is recalculated when data is entered • Digits are compared to check for error Checksum • A value is calculated from the data // Valid description of calculation • It is transmitted with the data • Value is recalculated after transmission • Values are compared after transmission to check for error Automatic Repeat reQuest • Uses acknowledgement / request and time-out • Error control protocol • Check performed on receiving data // error is detected by e.g. parity check, check sum • If error detected, request is sent to resend data // negative acknowledgement is used • Resend request is repeated till data is sent correctly / requests time out / limit is reached • Send acknowledgement that data is received // positive acknowledgement is used • If acknowledgement not received in set time data is resent © UCLES 2017 Page 3 of 9 Marks 8 0478/12 Question 5(a) May/June 2017 Cambridge IGCSE – Mark Scheme PUBLISHED Answer Marks 1 mark for correct method, 1 mark for correct answer 2 32 + 16 + 8 + 1 (00)111001 5(b) registers must have leading zeros, allow follow through from 5(a) for an incorrect value 1 mark for each correct register. 0 0 0 5(c) 0 0 0 1 0 0 0 0 0 0 1 0 1 1 1 0 0 data ASCII value / Unicode value / character number part of image / small image a sound / sound sample / small sound track instruction 1 Answer 1 mark for correct name of code, up to a further 3 marks for appropriate explanation • Quick response (QR) Code Three from: • Barcode is captured / scanned / imaged, by a camera / scanner / barcode reader / QR code reader • Read using a laser • Processed by an app • Light is reflected back • Black squares reflect less light than white squares • Modules are used for orientation / alignment • Squares / data are decoded © UCLES 2017 1 2 3A Question 6 0 1 Two from: • • • • • • 5(d) 1 2 Page 4 of 9 Marks 4 0478/12 Cambridge IGCSE – Mark Scheme PUBLISHED Question 7(a) May/June 2017 Answer 1 mark for correct arrow(s), one mark for correct description OR (Direction of data is) one way only // unidirectional # (Direction of data is both ways) at same time / simultaneously / concurrently AND (Direction of data is both ways) but at different times / not at the same time / not simultaneously / not concurrently © UCLES 2017 Page 5 of 9 Marks 6 0478/12 Cambridge IGCSE – Mark Scheme PUBLISHED Question 7(b) May/June 2017 Answer 1 mark each use, must be different. Marks 2 Simplex e.g.: Microphone to computer Sensor to computer Computer to printer Computer to speaker Computer to monitor Webcam to computer Sending data to a device // sending data from a device Duplex e.g.: Telephone call Voice over IP Computer to printer (only award once) Instant messaging Broadband connections Video conferencing Sending data to and from devices e.g wireless technology Computer to modem 7(c) 2 marks for IC, 2 marks for USB IC • • USB • • Question 8(a) 4 parallel transmission // description of parallel for sending data internally serial transmission // description of serial for sending data externally (to and from peripherals / between devices) Answer 2 marks for SSL, 2 marks for Firewall SSL protocol Two from: • uses encryption • encryption is asymmetric / symmetric / both • makes use of (public and private) keys • data is meaningless (without decryption key / if intercepted) Firewall Two from: • helps prevent unauthorised access // helps prevent hacking • checks that data meets criteria // identifies when data does not meet criteria • acts as a filter for (incoming and outgoing) data // blocks any unacceptable data //allows acceptable data through © UCLES 2017 Page 6 of 9 Marks 4 0478/12 Cambridge IGCSE – Mark Scheme PUBLISHED Question 8(b) May/June 2017 Answer Six from: Marks 6 Encrypt the data « « so it cannot be understood by those not entitled to view it Password protected / biometrics « « to help prevent unauthorised access Virus checking software « « helps prevent data corruption or deletion « identifies / removes a virus in the system « scans a system for viruses Spyware checking software « « helps prevent data being stolen/copied/logged « scans a system for spyware Drop-down input methods / selectable features « « to reduce risk of spyware / keylogging Physical method e.g. locked doors / CCTV timeout / auto log off « to help prevent unauthorised access Network / company policies // training employees « to educate users how to be vigilant Access rights « « allows users access to data that they have permission to view « prevents users from accessing data that they do not have permission to view Question 9 Answer Six from: • • • • • • • • • • © UCLES 2017 Marks 6 temperature sensor analogue data / temperature is converted to digital data (with an ADC) sensor sends signal to the microprocessor microprocessor compares input values with stored values/pre-set values « « if the temperature value input is too high/low « « a signal is sent from the microprocessor to turn on / off / up / down the cooling unit « if temperature matches the stored values « « no action is taken an actuator is used to turn the cooling unit on / off / up / down the process is a continuous loop Page 7 of 9 0478/12 Cambridge IGCSE – Mark Scheme PUBLISHED Question 10(a) Answer Marks 1 mark for each correct gate, with the correct input(s) 10(b) 4 4 A B C X 0 0 0 0 0 0 1 0 0 1 0 1 0 1 1 0 1 0 0 0 1 0 1 0 1 1 0 1 1 1 1 1 4 marks for 8 correct outputs 3 marks for 6 or 7 correct outputs 2 marks for 4 or 5 correct outputs 1 mark for 2 or 3 correct outputs © UCLES 2017 May/June 2017 Page 8 of 9 0478/12 Cambridge IGCSE – Mark Scheme PUBLISHED Question 11 May/June 2017 Answer Seven from: 7 Requested • a web browser is used • user enters the URL / web address (into the address bar) // clicks a link containing the web address // clicks an element of the webpage • the URL / web address specifies the protocol • protocols used are Hyper Text Transfer Protocol (HTTP) / Hyper Text Transfer Protocol Secure (HTTPS) Sent • • • • • the URL / web address contains the domain name the Internet Service Provider (ISP) looks up the IP address of the company the domain name is used to look up the IP address of the company the domain name server (DNS) stores an index of domain names and IP addresses web browser sends a request to the web server / IP address Received • Data for the website is stored on the company’s web server • webserver sends the data for the website back to the web browser • web server uses the customer’s IP address to return the data • the data is transferred into Hyper Text Mark-up Language (HTML) • HTML is interpreted by the web browser (to display the website) © UCLES 2017 Marks Page 9 of 9 Cambridge International Examinations Cambridge International General Certificate of Secondary Education * 2 4 9 9 6 2 0 5 5 8 * 0478/13 COMPUTER SCIENCE May/June 2017 Paper 1 Theory 1 hour 45 minutes Candidates answer on the Question Paper. No Additional Materials are required. No calculators allowed. READ THESE INSTRUCTIONS FIRST Write your Centre number, candidate number and name in the spaces at the top of this page. Write in dark blue or black pen. You may use an HB pencil for any diagrams, graphs or rough working. Do not use staples, paper clips, glue or correction fluid. DO NOT WRITE IN ANY BARCODES. Answer all questions. No marks will be awarded for using brand names of software packages or hardware. At the end of the examination, fasten all your work securely together. The number of marks is given in brackets [ ] at the end of each question or part question. The maximum number of marks is 75. The syllabus is approved for use in England, Wales and Northern Ireland as a Cambridge International Level 1/Level 2 Certificate. This document consists of 12 printed pages. DC (KN/SG) 144781 © UCLES 2017 [Turn over 2 1 The memory of a computer contains data and instructions in binary. The following instruction is stored in a location of the memory. 0 0 1 0 1 0 0 1 1 1 1 1 1 1 0 0 (a) Convert the instruction into hexadecimal. ................................................................................................................................................... ................................................................................................................................................... ............................................................................................................................................... [2] (b) Explain why a programmer might prefer to read the instruction in hexadecimal rather than in binary. ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ............................................................................................................................................... [2] (c) Give two other uses of hexadecimal. Use 1 ........................................................................................................................................ ................................................................................................................................................... Use 2 ........................................................................................................................................ ................................................................................................................................................... [2] 2 Programmers can use a high-level language to write a computer program. (a) Explain what is meant by the term ‘high-level language’. ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ............................................................................................................................................... [2] © UCLES 2017 0478/13/M/J/17 3 (b) A program written in a high-level language is translated into machine code. This is so that it can be processed by a computer. Name one type of translator that can be used. .............................................................................................................................................. [1] (c) Describe how your answer to part (b) translates this program. ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... .............................................................................................................................................. [3] 3 Steffi has a number of files of different sizes that contain her work. Tick (3) to show whether each statement is true or false. true (3) Statement false (3) 47KB is larger than 10MB. 250bytes is smaller than 0.5MB. 50GB is larger than 100MB. 1TB is smaller than 4GB. [4] © UCLES 2017 0478/13/M/J/17 [Turn over 4 4 Five statements about serial half-duplex data transmission are shown in the table below. Tick (3) to show whether each statement is true or false. Statement true (3) false (3) Data is transmitted in one direction only, one bit at a time. Data is transmitted in both directions, multiple bits at a time. Data is transmitted in one direction only, multiple bits at a time. Data is transmitted in both directions, but only one direction at a time. Data is transmitted one bit at a time. Data is transmitted in both directions, but only one direction at a time. Data is transmitted multiple bits at a time. © UCLES 2017 0478/13/M/J/17 [5] 5 5 (a) Parity checks are often used to detect errors that may occur during data transmission. The received bytes in the table below were transmitted using odd parity. Tick (3) to show whether each byte has been corrupted during transmission or not corrupted during transmission. Received byte corrupted during transmission (3) not corrupted during transmission (3) 10110100 01101101 10000001 [3] (b) Another method of error detection is Automatic Repeat reQuest (ARQ). Explain how ARQ is used in error detection. ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... .............................................................................................................................................. [4] © UCLES 2017 0478/13/M/J/17 [Turn over 6 6 Signals are sent to and from the components of a processor using buses. Identify and describe the purpose of two different buses. Bus 1 .................................................................... Purpose ............................................................................................................................................ .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... Bus 2 .................................................................... Purpose ............................................................................................................................................ .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... [6] © UCLES 2017 0478/13/M/J/17 7 7 Six security terms and six statements are listed below. Draw a line to match the security term with the most appropriate statement. Security term Statement Encryption Provides a secure connection between web browsers and websites allowing secure transmission of private data. Secure Socket Layer (SSL) Computer that acts as an intermediary between a web browser and the Internet. Pharming Legitimate-looking email is sent in the hope of gathering personal information; it requires the user to click on a link in the email. Phishing Uses rules and criteria, set by the user, to help protect a network or system from unauthorised access. Firewall Malicious code installed on the hard drive of a user’s computer; this code will redirect the user to a fake website without the user’s knowledge. Proxy server Scrambles data for secure transmission. [5] © UCLES 2017 0478/13/M/J/17 [Turn over 8 8 Complete the paragraph by choosing six correct terms from the list. • • • • • • • • • Optical On-line RAM HDD Primary SSD Secondary ROM Off-line A computer has two different types of memory. .................................... memory is not directly accessed by the CPU, but it allows a user to store data that can easily be accessed by applications. Two examples of this type of memory are .................................... and .................................... . The second type of memory is .................................... memory. This memory is directly accessed by the CPU. It allows the processor to access data and instructions that are stored in this memory. Two examples of this memory are .................................... and .................................... . © UCLES 2017 0478/13/M/J/17 [6] 9 9 A supermarket has a system that allows customers to check out their own shopping. Identify and describe the purpose of two input devices and one output device used in this system. Input device 1 ................................................................................................................................... Purpose ............................................................................................................................................ .......................................................................................................................................................... .......................................................................................................................................................... Input device 2 ................................................................................................................................... Purpose ............................................................................................................................................ .......................................................................................................................................................... .......................................................................................................................................................... Output device 1 ................................................................................................................................ Purpose ............................................................................................................................................ .......................................................................................................................................................... .......................................................................................................................................................... [6] 10 (a) Complete the truth table for the NOR gate. A X B A B 0 0 0 1 1 0 1 1 Output (X) [1] © UCLES 2017 0478/13/M/J/17 [Turn over 10 (b) Write a logic statement that corresponds with the following logic circuit. A B X C X = ..................................................................................................................................... [3] 11 State three functions provided by an operating system. Function 1 ........................................................................................................................................ .......................................................................................................................................................... .......................................................................................................................................................... Function 2 ........................................................................................................................................ .......................................................................................................................................................... .......................................................................................................................................................... Function 3 ........................................................................................................................................ .......................................................................................................................................................... .......................................................................................................................................................... [3] © UCLES 2017 0478/13/M/J/17 11 12 The processes in a chemical factory are monitored by sensors connected to a microprocessor. (a) Identify two different sensors used in this application. Give an example of how each sensor could be used in the chemical factory. Sensor 1 ................................................................................................................................... Use ........................................................................................................................................... ................................................................................................................................................... Sensor 2 ................................................................................................................................... Use ........................................................................................................................................... ................................................................................................................................................... [4] (b) Describe how the sensors and a microprocessor are used to monitor a process. ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... .............................................................................................................................................. [5] © UCLES 2017 0478/13/M/J/17 [Turn over 12 13 (a) Gurdeep wants to send a large file to Jennifer over the Internet. State two benefits of compressing the file to send it. Benefit 1 ................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... Benefit 2 ................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... [2] (b) Two types of compression are lossy and lossless. Choose the most suitable type of compression for the following and explain your choice. (i) Downloading the code for a computer program: Type of compression ......................................................................................................... Explanation ....................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... [3] (ii) Streaming a video file: Type of compression ......................................................................................................... Explanation ....................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... [3] Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will be pleased to make amends at the earliest possible opportunity. To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after the live examination series. Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge. © UCLES 2017 0478/13/M/J/17 Cambridge International Examinations Cambridge International General Certificate of Secondary Education COMPUTER SCIENCE 0478/13 Paper 1 May/June 2017 MARK SCHEME Maximum Mark: 75 Published This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the details of the discussions that took place at an Examiners’ meeting before marking began, which would have considered the acceptability of alternative answers. Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for Teachers. Cambridge will not enter into discussions about these mark schemes. Cambridge is publishing the mark schemes for the May/June 2017 series for most Cambridge IGCSE®, Cambridge International A and AS Level and Cambridge Pre-U components, and some Cambridge O Level components. ® IGCSE is a registered trademark. This syllabus is approved for use in England, Wales and Northern Ireland as a Cambridge International Level 1/Level 2 Certificate. This document consists of 8 printed pages. © UCLES 2017 [Turn over 0478/13 Cambridge IGCSE – Mark Scheme PUBLISHED Question May/June 2017 Answer Marks 1(a) 1 mark for any two correct values, 2 marks for all 4 correct values. 29FC 2 1(b) Two from: • Easier/quicker to understand/read • Easier to debug/identify errors • Fewer digits are used / shorter // takes up less space on screen // more can be shown on screen / page 2 1(c) Two from: • Notations for colour in HTML // HTML colour (codes) • Error messages • MAC address // IP address • Locations in memory • Memory dump 2 Question Answer 2(a) Two from: • Closer to human language // closer to English • Independent of a particular type of computer/device/platform // portable language • A language such as Python, Java, Pascal, etc. (any suitable example) 2 2(b) One from: • Compiler • Interpreter 1 2(c) Must relate to answer given in 2b. No follow through for incorrect answer in part 2b. 3 Compiler – Three from: • Translates the whole program as a complete unit / at once • Creates an executable file / object code • A report / list of errors in the code is created • Optimises the source code (to run efficiently) Interpreter – Three from: • Translates a program one line of code at a time • Machine code is directly executed // The interpreter is used each time the program / code is executed • Will identify an error as soon as it finds one in a line of code © UCLES 2017 Page 2 of 8 Marks 0478/13 Question 3 May/June 2017 Cambridge IGCSE – Mark Scheme PUBLISHED Answer Marks 1 mark per correct tick 4 Statement true (9) false (9) 9 47KB is larger than 10MB. 250bytes is smaller than 0.5MB. 9 50GB is larger than 100MB. 9 9 1TB is smaller than 4GB. Question 4 Answer 1 mark per correct tick 5 Statement True False Data is transmitted in one direction only, one bit at a time. 9 Data is transmitted in both directions, multiple bits at a time. 9 Data is transmitted in one direction only, multiple bits at a time. 9 Data is transmitted in both directions, but only one direction at a time. Data is transmitted one bit at a time. Data is transmitted in both directions, but only one direction at a time. Data is transmitted multiple bits at a time. © UCLES 2017 Marks Page 3 of 8 9 9 0478/13 Question 5(a) May/June 2017 Cambridge IGCSE – Mark Scheme PUBLISHED Answer Marks 1 mark per correct tick Received byte 3 corrupted during transmission (9) not corrupted during transmission (9) 9 10110100 9 01101101 9 10000001 5(b) Four from: • Uses acknowledgement and time out • Check performed on received data // error is detected by e.g. parity check, check sum • If error detected, request sent to resend data // negative acknowledgment is used • If no acknowledgement is sent that data is received // positive acknowledgement is used • Data is resent / Resend request repeated, till data is resent correctly « • « or request times out // limit is reached Question Answer 6 1 mark for correct bus name and up to 2 further marks for appropriate purpose. Address (bus) Two from: • Carries / transports an address / location « • « of the next item to be fetched • Data travels one way (unidirectional) Data (bus) Two from: • Carries / transports data / example of data ... • « that is currently being processed // that will be / has been processed • Data can travel in both directions (bidirectional) Control (bus) Two from: • Carries / transports signals • Control / directs the actions of the CPU / processor • Can be either Unidirectional or Bidirectional © UCLES 2017 Page 4 of 8 4 Marks 6 0478/13 Cambridge IGCSE – Mark Scheme PUBLISHED Question Answer 7 May/June 2017 Marks 5 1 mark for correct line till 5 marks given. Question 8 © UCLES 2017 Answer • • • • • • Marks 6 Secondary HDD/SSD SSD/HDD Primary ROM/RAM RAM/ROM Page 5 of 8 0478/13 Cambridge IGCSE – Mark Scheme PUBLISHED Question 9 Answer May/June 2017 Marks 1 mark for appropriate device name and 1 further mark for appropriate purpose. 6 Input devices Two from: • Keypad / Keyboard « • « e.g. to allow customer to input the quantity of an item • Touchscreen « • « e.g. to allow a customer to select a payment method • Barcode scanner / Barcode reader « • « e.g. to allow a customer to scan in their shopping • Card reader // Cash deposit / intake « • « e.g. to allow a customer to pay for their shopping • Weighing scales « • « e.g. to allow a customer to weigh fresh produce Output devices One from: • Display / Touchscreen « • « e.g. to allow a customer to see the running total of their shopping • Speaker « • « e.g. to give audio instructions to a customer about how to use the self-checkout • Printer « • « e.g. to print a receipt for the customer Question 10(a) 10(b) Answer 1 mark for four correct outputs only 1 A B Output 0 0 1 0 1 0 1 0 0 1 1 0 1 mark for each correct section of the statement • • • © UCLES 2017 Marks (A AND B) AND (C OR NOT B) Page 6 of 8 3 0478/13 Question 11 Question 12(a) Cambridge IGCSE – Mark Scheme PUBLISHED May/June 2017 Answer Three from e.g. : • (Provides an) interface • Loads / opens / installs / closes software • Manages the hardware // manages peripherals // spooling • Manages the transfer of programs into and out of memory • Divides processing time // processor management • Manages file handling • Manages error handling // manages interrupts • Manages security software • Manages utility software • Manages user accounts • Multitasking • Multiprogramming // time slicing • Batch processing Answer 1 mark for appropriate sensor and 1 further mark for appropriate use. Marks 3 Marks 4 Two from: • Gas (sensor) « • « e.g. to measure the levels of oxygen/carbon dioxide / nitrogen in the factory to make sure they are not too high / low • Temperature (sensor) « • « e.g. to measure the temperature of the chemicals to make sure it is not too high/low • Motion / Infra-red (sensor) « • « e.g. to detect any persons in an unauthorised area of the factory • Pressure (sensor) « • « e.g. to measure the pressure of chemicals flowing through pipes to check that level are not too high / low • pH (sensor) « • « to measure the pH to make sure the acidity / alkalinity of the chemicals is correct • Light (sensor) « • « to measure the level of light to make sure it remains at a constant level for the chemical process 12(b) © UCLES 2017 Five from: • Sensors send signals to microprocessor • Analogue signals are converted to digital (using ADC) • Microprocessor compares value to stored value « • « If out of range / matches stored values « • « signal sent to alert workers (e.g. sound alarm) • « microprocessor send signal to cause an action to occur e.g. cool a process down, heat a process up, add a chemical • « no action taken • Output/record readings • Monitoring is continuous Page 7 of 8 5 0478/13 Cambridge IGCSE – Mark Scheme PUBLISHED Question 13(a) 13(b)(i) Answer 2 • • Lossless (compression) « « It is important the code must be (exactly) the same as the original file « If it does not match the original file it will not work 3 Lossy (compression) « « It would make the file smaller than lossless compression / the file would stream faster than lossless compression « The quality of the video can be reduced but it can still be viewed 3 • • • © UCLES 2017 Marks Two from: • Smaller file to transmit • The file is transmitted quicker • Uses / requires less bandwidth • 13(b)(ii) May/June 2017 Page 8 of 8 Cambridge International Examinations Cambridge International General Certificate of Secondary Education * 1 3 2 0 9 6 4 5 0 9 * 0478/11 COMPUTER SCIENCE October/November 2017 Paper 1 Theory 1 hour 45 minutes Candidates answer on the Question Paper. No Additional Materials are required. No calculators allowed. READ THESE INSTRUCTIONS FIRST Write your Centre number, candidate number and name in the spaces at the top of this page. Write in dark blue or black pen. You may use an HB pencil for any diagrams, graphs or rough working. Do not use staples, paper clips, glue or correction fluid. DO NOT WRITE IN ANY BARCODES. Answer all questions. No marks will be awarded for using brand names of software packages or hardware. At the end of the examination, fasten all your work securely together. The number of marks is given in brackets [ ] at the end of each question or part question. The maximum number of marks is 75. The syllabus is approved for use in England, Wales and Northern Ireland as a Cambridge International Level 1/Level 2 Certificate. This document consists of 11 printed pages and 1 blank page. DC (NH/SW) 134256/4 © UCLES 2017 [Turn over 2 1 A washing machine has a small display screen built into it. One use of the display screen is to show an error code when a problem has occurred with a washing cycle. (a) State whether the display screen is an input, output or storage device. ...............................................................................................................................................[1] (b) The display screen shows a hexadecimal error code: E04 This error code means that the water will not empty out of the washing machine. Convert this error code to binary. [3] (c) State why hexadecimal is used to display the error code. ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ...............................................................................................................................................[1] (d) Identify three sensors that could be used in the washing machine. State what each sensor could be used for. Sensor 1 ................................................................................................................................... Use ........................................................................................................................................... ................................................................................................................................................... Sensor 2 ................................................................................................................................... Use ........................................................................................................................................... ................................................................................................................................................... Sensor 3 ................................................................................................................................... Use ........................................................................................................................................... ................................................................................................................................................... [6] © UCLES 2017 0478/11/O/N/17 3 2 Data files are stored in different file formats. Complete the table by providing a suitable file format for each file type. The first one has been done for you. File type Pictures File format .JPEG Text Sound Video [3] 3 (a) An example of a Uniform Resource Locator (URL) is: http://www.cie.org.uk/index.htm Part 1 Part 2 Part 3 Identify the three parts that make up this URL. Part 1 ........................................................................................................................................ Part 2 ........................................................................................................................................ Part 3 ........................................................................................................................................ [3] (b) Describe what is meant by an Internet Protocol (IP) address. ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ...............................................................................................................................................[4] © UCLES 2017 0478/11/O/N/17 [Turn over 4 4 Six components of a computer system and six descriptions are shown. Draw a line to match each component with the most suitable description. Component Description Arithmetic Logic Unit (ALU) Used to connect together the internal components of the CPU. Buses Used to carry out calculations on data. Control Unit (CU) Used to temporarily hold data and instructions during processing. Immediate Access Store (IAS) Used to allow interaction with the computer. Input/Output Used to hold data and instructions before they are processed. Registers Used to manage the flow of data through the CPU. [5] © UCLES 2017 0478/11/O/N/17 5 5 (a) Draw a logic circuit for the logic statement: X = 1 if ((A is 1 AND B is 1) OR (A is NOT 1 AND C is 1)) A X B C [4] © UCLES 2017 0478/11/O/N/17 [Turn over 6 (b) Draw the symbol for an XOR gate and explain the function of this logic gate. Explanation ............................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ...............................................................................................................................................[5] 6 Describe the operation of a 2D scanner and a 3D scanner. 2D ..................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... 3D ..................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... [6] © UCLES 2017 0478/11/O/N/17 7 7 Six statements about firewalls are shown. Tick (3) to show whether each statement is true or false. Statement true (3) false (3) Firewalls can monitor incoming and outgoing traffic. Firewalls operate by checking traffic against a set of rules. Firewalls cannot block access to a certain website. Firewalls can be software and hardware. Firewalls can act as intermediary servers. Firewalls can block unauthorised traffic. [6] © UCLES 2017 0478/11/O/N/17 [Turn over 8 8 (a) Data is valuable. It needs to be kept secure and it can easily be damaged. Give three different ways that data can be accidentally damaged. 1 ................................................................................................................................................ ................................................................................................................................................... 2 ................................................................................................................................................ ................................................................................................................................................... 3 ................................................................................................................................................ ................................................................................................................................................... [3] (b) The Secure Socket Layer (SSL) protocol can be used to securely transmit data in online banking. State three other different applications that use SSL. Application 1 ............................................................................................................................. Application 2 ............................................................................................................................. Application 3 ............................................................................................................................. [3] © UCLES 2017 0478/11/O/N/17 9 (c) Online banking is increasing in popularity. Online banking can be a risk as it can raise a number of security issues. SSL can be used as a security method to make online banking safer. Identify and describe three other security methods that could be used to make online banking safer. Security method 1 ..................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... Security method 2 ..................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... Security method 3 ..................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... [6] © UCLES 2017 0478/11/O/N/17 [Turn over 10 9 (a) Optical storage media can be used to store data. Describe how the data is read from a Compact Disc (CD). ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ...............................................................................................................................................[4] (b) Kamil wants to store a 16-bit colour image file. The image size is 1000 pixels. Calculate the size of the file. Give your answer in bytes. Show your working. Working ..................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... Answer ............................... bytes [2] (c) Describe the differences between primary and secondary storage. ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ...............................................................................................................................................[4] © UCLES 2017 0478/11/O/N/17 11 10 Six statements about assembly language are shown. Tick (3) whether the statement is true or false. Statement true (3) false (3) Assembly language uses mnemonic codes. Assembly language programs do not need a translator to be executed. Assembly language is a low-level programming language. Assembly language is specific to the computer hardware. Assembly language is machine code. Assembly language is often used to create drivers for hardware. [6] © UCLES 2017 0478/11/O/N/17 12 BLANK PAGE Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will be pleased to make amends at the earliest possible opportunity. To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after the live examination series. Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge. © UCLES 2017 0478/11/O/N/17 Cambridge Assessment International Education Cambridge International General Certificate of Secondary Education COMPUTER SCIENCE 0478/11 Paper 1 October/November 2017 MARK SCHEME Maximum Mark: 75 Published This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the details of the discussions that took place at an Examiners’ meeting before marking began, which would have considered the acceptability of alternative answers. Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for Teachers. Cambridge International will not enter into discussions about these mark schemes. Cambridge International is publishing the mark schemes for the October/November 2017 series for most Cambridge IGCSE®, Cambridge International A and AS Level components and some Cambridge O Level components. ® IGCSE is a registered trademark. This syllabus is approved for use in England, Wales and Northern Ireland as a Cambridge International Level 1/Level 2 Certificate. This document consists of 10 printed pages. © UCLES 2017 [Turn over 0478/11 Cambridge IGCSE – Mark Scheme PUBLISHED Question Answer October/November 2017 Marks 1(a) Output 1 1(b) 1 mark for each correct conversion 3 E 1 1 0 1 0 0 0 4 0 0 0 1 0 0 1(c) Any one from: – Hexadecimal codes can fit in a smaller display rather than a full text based message – Smaller amount of memory needed to store the hex error messages than text based 1 1(d) 1 mark for correct sensor, 1 mark for corresponding use Possible examples could include: 6 © UCLES 2017 – – Temperature (sensor) To monitor the temperature of the water – – Pressure (sensor) To monitor the level of water in the washing machine – – Motion (sensor) To monitor whether the drum is still in motion – – pH (sensor) To monitor the level of water hardness/detergent present in the water Page 2 of 10 0478/11 Cambridge IGCSE – Mark Scheme PUBLISHED Question 2 Answer 1 mark for each correct file format e.g. 3(a) 3(b) © UCLES 2017 File format Pictures .JPEG Text .doc, .txt, .rtf, .docx, .odt .pdf Sound .mp3, .wav, .aif, .flac, .mid Video .mp4, .flv, .wmv Answer – – – Part 1 Part 2 Part 3 Marks 3 File type Question October/November 2017 (access) protocol domain (name) filename Marks 3 Four from: – IP address is used to identify a device (on the Internet / network) – IP address is allocated by the network/ ISP – Can be used in place of URL – IP addresses can be IPv4 or IPv6 – IP address can be static « – ... meaning it doesn’t change each time it is connected to the Internet – IP address can be dynamic «. – « meaning that it can change each time a device is connected to the Internet – Any valid example (e.g. xxx.xxx.xxx.xxx or xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx) Page 3 of 10 4 0478/11 Cambridge IGCSE – Mark Scheme PUBLISHED Question 4 © UCLES 2017 Answer 1 mark for each correct line up to a total of 5 marks October/November 2017 Marks 5 Page 4 of 10 0478/11 Cambridge IGCSE – Mark Scheme PUBLISHED Question 5(a) © UCLES 2017 Answer 1 mark for each correct logic gate October/November 2017 Marks 4 Page 5 of 10 0478/11 Cambridge IGCSE – Mark Scheme PUBLISHED Question 5(b) Answer 1 mark for correct logic gate symbol: October/November 2017 Marks 5 Any four from: – similar to an OR gate – It has (at least) two inputs – Output will be high/1 if both inputs are different – Output will be high/1 if either input is high – Output will be low/0 if both inputs are high – Output will be low/0 if both inputs are low Question 6 © UCLES 2017 Answer Any six from: Marks 6 – – – – – 2D (Scanner) shines a light onto the surface of a document // Light moves across document Reflected light is captured Uses mirrors and lenses Captured image is converted into a digital file Produces a 2D digital image – – – – 3D Scanners shines a laser (or light) over the surface of a 3D object Records measurements of the geometry/dimensions of the object Measurements are converted to digital file Produces a 3D digital model Page 6 of 10 0478/11 Cambridge IGCSE – Mark Scheme PUBLISHED Question 7 October/November 2017 Answer Marks 1 mark for each correct tick 6 true (9) Statement Firewalls can monitor incoming and outgoing traffic. 9 Firewalls operate by checking traffic against a set of rules. 9 9 Firewalls cannot block access to a certain website. 9 Firewalls can be software and hardware. 9 Firewalls can act as intermediary servers. 9 Firewalls can block unauthorised traffic. Question false (9) Answer Marks 8(a) Any three from: – Human error (e.g. deleting/overwriting data) – Physical damage – Power failure/surge – Hardware failure – Software crashing 3 8(b) Any three from: – Online shopping // Online payment systems // Online booking – Email – Cloud based storage – Intranet/extranet – VPN – VoIP // video conferencing – Instant messaging (IM) // social networking // online gaming 3 © UCLES 2017 Page 7 of 10 0478/11 Cambridge IGCSE – Mark Scheme PUBLISHED Question 8(c) © UCLES 2017 Answer 1 mark for identifying, 1 mark for description October/November 2017 Marks 6 – – Strong password To make it difficult to hack an account – – Biometric device To use data that is difficult to fake as a password – – – – TLS // Encryption To make data meaningless if intercepted To encrypt data that is exchanged (TLS only) More secure than SSL (TLS only) – – – Anti-spyware (software) To find and remove any spyware that is installed on a computer To help stop key loggers recording key presses – – – Firewall To help prevent unauthorised access to an account Blocks any requests that do not meet/match the criteria – – Authentication (card reader at home)/mobile security code app/two-step verification To add another level of identification of the user – – Use of drop-down boxes (or equivalent) So key loggers cannot record the key presses – – Proxy server To divert an attack away from the main system Page 8 of 10 0478/11 Cambridge IGCSE – Mark Scheme PUBLISHED Question Answer October/November 2017 Marks 9(a) Any four from: – (Red) laser is used – (Laser beams) shines onto surface of the disk – It is rotated (at a constant speed) to be read – Surface is covered in a track (that spirals from the centre) – Data is represented on the surface using pits and lands – Pits and lands represent binary values – Pits reflect light back differently (to the area in between/land) – Optical device can determine the binary value from the light reflection 4 9(b) 1 mark for calculation, 1 mark for correct answer: 2 9(c) © UCLES 2017 – – 1000 × 16 16000/8 – Answer is 2000 bytes Four from: (Max 2 for either primary or secondary) 4 – – Primary RAM and ROM Secondary HDD and SSD – – Primary is directly accessible by CPU Secondary is not directly accessible by CPU – – Primary is internal to computer Secondary can be internal or external to the computer – – Primary stores boot up instructions and can hold data whilst being processed Secondary stores files/software – – Primary has faster access speed Secondary has a slower access speed – – Primary has both volatile and non-volatile Secondary is non-volatile Page 9 of 10 0478/11 Cambridge IGCSE – Mark Scheme PUBLISHED Question 10 October/November 2017 Answer Marks 1 mark for each correct tick 6 true (9) Statement 9 Assembly language uses mnemonic codes. 9 Assembly language programs do not need a translator to be executed. Assembly language is a low-level programming language. 9 Assembly language is specific to the computer hardware. 9 9 Assembly language is machine code. Assembly language is often used to create drivers for hardware. © UCLES 2017 false (9) Page 10 of 10 9 Cambridge International Examinations Cambridge International General Certificate of Secondary Education * 0 0 4 9 7 9 6 5 7 1 * 0478/12 COMPUTER SCIENCE October/November 2017 Paper 1 Theory 1 hour 45 minutes Candidates answer on the Question Paper. No Additional Materials are required. No calculators allowed. READ THESE INSTRUCTIONS FIRST Write your Centre number, candidate number and name on all the work you hand in. Write in dark blue or black pen. You may use an HB pencil for any diagrams, graphs or rough working. Do not use staples, paper clips, glue or correction fluid. DO NOT WRITE IN ANY BARCODES. Answer all questions. No marks will be awarded for using brand names of software packages or hardware. At the end of the examination, fasten all your work securely together. The number of marks is given in brackets [ ] at the end of each question or part question. The maximum number of marks is 75. The syllabus is approved for use in England, Wales and Northern Ireland as a Cambridge International Level 1/Level 2 Certificate. This document consists of 12 printed pages. DC (NH/SW) 138025/2 © UCLES 2017 [Turn over 2 1 A robot arm in a factory is programmed to move products. The binary instructions to operate the robot arm are: Operation Binary Instruction UP 1 1 1 1 DOWN 0 0 0 1 LEFT 1 0 0 1 RIGHT 0 1 1 0 OPEN 1 1 0 0 CLOSE 0 0 1 1 The instructions are entered as hexadecimal values. An operator enters the values: 9 1 C 3 F Convert the values and write down the operation (e.g. RIGHT) carried out by the robot arm. 9 ............................................................................. 1 ............................................................................. C ............................................................................. 3 ............................................................................. F ............................................................................. © UCLES 2017 0478/12/O/N/17 [5] 3 2 Storage devices and storage media can be categorised as primary, secondary or off-line. Write primary, secondary or off-line next to each storage device or medium to indicate its most suitable category. 3 HDD .................................................................................................................................... RAM .................................................................................................................................... ROM .................................................................................................................................... CD-ROM .................................................................................................................................... SSD .................................................................................................................................... DVD-RAM .................................................................................................................................... [6] (a) Explain the differences between the binary number system and the denary number system. ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ...............................................................................................................................................[4] (b) Explain the process of converting the binary number 1010 into a denary number. ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ...............................................................................................................................................[5] © UCLES 2017 0478/12/O/N/17 [Turn over 4 4 A file server is used as a central data store for a network of computers. Rory sends data from his computer to a file server that is approximately 100 metres away. It is important that the data is transmitted accurately. Rory needs to be able to read data from and write data to the file server at the same time. (a) (i) Use ticks (3) to identify the most suitable data transmission methods for this application. Method 1 Tick (3) Method 2 Serial Simplex Parallel Half-duplex Tick (3) Duplex [2] (ii) Explain why your answer to part (a)(i) is the most suitable data transmission. ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... .......................................................................................................................................[4] © UCLES 2017 0478/12/O/N/17 5 (b) Identify and describe two methods of error checking that can be used to make sure that the data stored after transmission is accurate. Method 1 ................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... Method 2 ................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... [6] © UCLES 2017 0478/12/O/N/17 [Turn over 6 5 Raj is using the Internet to do some online shopping. He visits a website that tells him that it uses cookies. (a) Explain what is meant by the term cookies. ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ...............................................................................................................................................[4] (b) Give two examples of the use of cookies. Example 1 ................................................................................................................................. ................................................................................................................................................... ................................................................................................................................................... Example 2 ................................................................................................................................. ................................................................................................................................................... ................................................................................................................................................... [2] © UCLES 2017 0478/12/O/N/17 7 6 Selma writes the following four answers in her Computer Science examination. State which computer terms she is describing. “It is a signal. When the signal is received it tells the operating system that an event has occurred.” Selma is describing .......................................................................................................................... “It takes source code written in a high level language and translates it into machine code. It translates the whole of the source code at once.” Selma is describing .......................................................................................................................... “The part of the central processing unit (CPU) that carries out calculations.” Selma is describing .......................................................................................................................... “When data is transmitted, if an error is detected in the data received a signal is sent to ask for the data to be retransmitted. This continues until the data received is correct.” Selma is describing .......................................................................................................................... [4] © UCLES 2017 0478/12/O/N/17 [Turn over 8 7 Draw a logic circuit to represent the logic statement: X = 1 if (A is NOT 1 AND B is 1) AND (A is NOT 1 AND C is NOT 1) OR (B is 1 AND C is 1) A X B C [7] © UCLES 2017 0478/12/O/N/17 9 8 (a) A computer has 2048 MB of RAM. How many GB of RAM does the computer have? Show your working. ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ..............................GB [2] (b) Describe one item that is stored in RAM. ................................................................................................................................................... ................................................................................................................................................... ...............................................................................................................................................[2] (c) Explain three ways that RAM is different to ROM. 1 ................................................................................................................................................ ................................................................................................................................................... ................................................................................................................................................... 2 ................................................................................................................................................ ................................................................................................................................................... ................................................................................................................................................... 3 ................................................................................................................................................ ................................................................................................................................................... ................................................................................................................................................... [3] © UCLES 2017 0478/12/O/N/17 [Turn over 10 9 Anna has a farm that grows fruit. She has a system that monitors the conditions for growing the fruit. Sensors are used in this system. (a) Explain what is meant by the term sensor. ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ...............................................................................................................................................[2] (b) State two sensors that could be used in this system and describe how they could be used. Sensor 1 ................................................................................................................................... Use ........................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... Sensor 2 ................................................................................................................................... Use ........................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... [6] © UCLES 2017 0478/12/O/N/17 11 10 (a) Describe what is meant by Transport Layer Security (TLS). ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ...............................................................................................................................................[3] (b) Name three different applications of TLS. 1 ................................................................................................................................................ 2 ................................................................................................................................................ 3 ................................................................................................................................................ [3] © UCLES 2017 0478/12/O/N/17 [Turn over 12 11 Complete the paragraphs choosing the correct five terms from the list. Each term can only be used once: • Ethics • Freeware • Free Software • Hacking • Malware • Plagiarism • Shareware • Virus Taking another person’s work from the Internet and claiming it as your own is called ............................................. . It is possible to protect your work online with copyright. One product that people may want to protect is software. ............................................. does allow a person to share, copy and change software freely, but ............................................. does not allow a person to do this legally. Software that has a licence allowing free use for a trial period is called ............................................ . The name given to this area of Computer Science is ............................................. . [5] Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will be pleased to make amends at the earliest possible opportunity. To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after the live examination series. Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge. © UCLES 2017 0478/12/O/N/17 Cambridge Assessment International Education Cambridge International General Certificate of Secondary Education COMPUTER SCIENCE 0478/12 Paper 1 October/November 2017 MARK SCHEME Maximum Mark: 75 Published This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the details of the discussions that took place at an Examiners’ meeting before marking began, which would have considered the acceptability of alternative answers. Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for Teachers. Cambridge International will not enter into discussions about these mark schemes. Cambridge International is publishing the mark schemes for the October/November 2017 series for most Cambridge IGCSE®, Cambridge International A and AS Level components and some Cambridge O Level components. ® IGCSE is a registered trademark. This syllabus is approved for use in England, Wales and Northern Ireland as a Cambridge International Level 1/Level 2 Certificate. This document consists of 9 printed pages. © UCLES 2017 [Turn over 0478/12 Cambridge IGCSE – Mark Scheme PUBLISHED Question 1 Answer 1 mark per correct instruction: October/November 2017 Marks 5 9 – LEFT 1 – DOWN C – OPEN 3 – CLOSE F – UP Question 2 Answer 1 mark for each correct category: Marks 6 HDD – Secondary RAM – Primary ROM – Primary CD-ROM – Off-line SSD – Secondary DVD-RAM – Off-line Question 3(a) © UCLES 2017 Answer Any four from (Max 2 per number system) : Marks 4 • • A binary number system is a base-2 system A denary number system is a base-10 system • • A binary number system uses 0 and 1 values A denary number system uses 0 to 9 values • • A binary number system has units/ placeholders/column headings that increase by the power of 2 A denary number system has units/ placeholders/column headings that increase by the power of 10 • Binary has more digit for the same value// Denary has less digits for the same value Page 2 of 9 0478/12 Cambridge IGCSE – Mark Scheme PUBLISHED Question 3(b) Answer Five from: • Correct column headings / place holders by example • Correctly place a 1 or a 0 for each column • Identify the columns to be added • Add together the (denary) values identified « • « this will give a total which is the denary number/answer • Answer is 10 Question Answer 4(a)(i) Method 1 Serial Parallel Tick (9) 9 Method 2 © UCLES 2017 5 Marks 2 Tick (9) Half-duplex 9 Any four from (Max 3 for serial): • Serial has less/lower interference • Serial is (more) reliable/accurate over distances • In serial the bits won’t be skewed • In serial it is easier to collate the bits together again after transmission • • Marks Simplex Duplex 4(a)(ii) October/November 2017 Duplex transmits data in both directions at the same time simplex/half-duplex/remaining methods won’t allow read and write at same time Page 3 of 9 4 0478/12 Cambridge IGCSE – Mark Scheme PUBLISHED Question 4(b) October/November 2017 Answer 1 mark for error checking method, 2 marks for description: Checksum • A value is calculated from the data // Description of calculation • Value is transmitted with data • Value is recalculated after transmission • If the values match the data is (more likely to be) accurate Parity check • A parity bit is transmitted with each byte of data • Odd or even (parity can be used) • Counts / checks number of 1’s // counts / checks to see if 1’s are even // counts / checks to see if 1’s are odd • (Each byte is) checked after transmission to see if it matches the odd/even parity used Automatic Repeat Request (ARQ) • Uses acknowledgement and timeout • When a device detects an error in data transmission it asks for the packet to be resent / no error detected, positive acknowledgment sent • The sending device resends the packet after the request to resend/ timeout received • This process is continuous until the packet received is correct/until the ARQ limit is reached Echo (check) • Copy of data is sent back to sender • Data is compared to see if it matches • If it does not match error detected © UCLES 2017 Page 4 of 9 Marks 6 0478/12 Cambridge IGCSE – Mark Scheme PUBLISHED Question Answer October/November 2017 Marks 5(a) Any four from: • Data / files • Stored in a text file • Downloaded to a user’s computer when a website is visited // webserver sends to web browser • Stored on a user’s computer • Stored by a browser • Detected by the website when it is visited again 4 5(b) Any two from: e.g. • To store personal information/data • To store login details • To save items in an online shopping basket • To track/save internet surfing habits // to track website traffic • To carry out targeted advertising • To store payment details • To customise a webpage // to store user preferences • Store progress in online games/quizzes 2 Question 6 © UCLES 2017 Answer 1 mark for each correct term, in this order: • Interrupt • Compiler • ALU/Arithmetic and Logic Unit • ARQ/Automatic repeat request Marks 4 Page 5 of 9 0478/12 Cambridge IGCSE – Mark Scheme PUBLISHED Question 7 © UCLES 2017 Answer 1 mark for each correct logic gate with the correct input(s) Page 6 of 9 October/November 2017 Marks 7 0478/12 Cambridge IGCSE – Mark Scheme PUBLISHED Question 8(a) 8(b) 8(c) © UCLES 2017 October/November 2017 Answer 1 mark for correct calculation method, 1 mark for correct answer: • • 2048/1024 (or 1024 × 2) 2 GB • • Instructions/programs/data « currently in use Marks 2 2 Any three from: • RAM is volatile, ROM is non-volatile • RAM is temporary, ROM is (semi) permanent • RAM normally has a larger capacity than ROM • RAM can be edited ROM cannot be edited // Data can be read from and written to RAM, ROM can only be read from. Page 7 of 9 3 0478/12 Cambridge IGCSE – Mark Scheme PUBLISHED Question 9(a) 9(b) Answer • • It is an input device It measures/takes (physical) readings of the surrounding environment / environment by example / physical properties 1 mark for each sensor, 2 marks for each description: Marks 2 6 Moisture (sensor) • To measure the water content of the soil • To alert when the soil is too dry or too wet/needs watering pH (sensor) • To measure how acidic/alkaline the soil is • To alert when there may be something polluting the soil Light (sensor) • To measure the brightness of the environment • To alert when the fruit has too little/too much light Temperature (sensor) • To measure the temperature of the environment • To alert when it is too hot/too cold for the fruit to grow Gas (sensor) • To measure the amount of CO2/oxygen present • To alert when too much CO2/oxygen present Humidity (sensor) • To measure the water content in the air • To alert when the air is too dry Infra-red / motion (sensor) • To measure level of infra-red/microwaves deflected • To alert to any intruders e.g. animals stealing the fruit © UCLES 2017 October/November 2017 Page 8 of 9 0478/12 Cambridge IGCSE – Mark Scheme PUBLISHED Question Answer October/November 2017 Marks 10(a) Any three from: • It is a (security) protocol • It encrypts data (sent over the web/network) • It is the updated version of SSL • It has two layers • It has a handshake layer • It has a record layer 3 10(b) 1 mark for each correct application, examples could include: • Online banking • Online shopping // Online payment systems • Email • Cloud based storage • Intranet/extranet • VPN • VoIP • Instant messaging (IM) // social networking 3 Question 11 Answer 1 mark for each correct missing word, in the correct order: • • • • • © UCLES 2017 Plagiarism Free software Freeware Shareware Ethics Page 9 of 9 Marks 5 Cambridge International Examinations Cambridge International General Certificate of Secondary Education * 3 0 0 2 9 8 4 7 2 8 * 0478/13 COMPUTER SCIENCE October/November 2017 Paper 1 Theory 1 hour 45 minutes Candidates answer on the Question Paper. No Additional Materials are required. No calculators allowed. READ THESE INSTRUCTIONS FIRST Write your Centre number, candidate number and name in the spaces at the top of this page. Write in dark blue or black pen. You may use an HB pencil for any diagrams, graphs or rough working. Do not use staples, paper clips, glue or correction fluid. DO NOT WRITE IN ANY BARCODES. Answer all questions. No marks will be awarded for using brand names of software packages or hardware. At the end of the examination, fasten all your work securely together. The number of marks is given in brackets [ ] at the end of each question or part question. The maximum number of marks is 75. The syllabus is approved for use in England, Wales and Northern Ireland as a Cambridge International Level 1/Level 2 Certificate. This document consists of 11 printed pages and 1 blank page. DC (CE/SW) 152857 © UCLES 2017 [Turn over 2 1 A washing machine has a small display screen built into it. One use of the display screen is to show an error code when a problem has occurred with a washing cycle. (a) State whether the display screen is an input, output or storage device. ...............................................................................................................................................[1] (b) The display screen shows a hexadecimal error code: E04 This error code means that the water will not empty out of the washing machine. Convert this error code to binary. [3] (c) State why hexadecimal is used to display the error code. ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ...............................................................................................................................................[1] (d) Identify three sensors that could be used in the washing machine. State what each sensor could be used for. Sensor 1 ................................................................................................................................... Use ........................................................................................................................................... ................................................................................................................................................... Sensor 2 ................................................................................................................................... Use ........................................................................................................................................... ................................................................................................................................................... Sensor 3 ................................................................................................................................... Use ........................................................................................................................................... ................................................................................................................................................... [6] © UCLES 2017 0478/13/O/N/17 3 2 Data files are stored in different file formats. Complete the table by providing a suitable file format for each file type. The first one has been done for you. File type Pictures File format .JPEG Text Sound Video [3] 3 (a) An example of a Uniform Resource Locator (URL) is: http://www.cie.org.uk/index.htm Part 1 Part 2 Part 3 Identify the three parts that make up this URL. Part 1 ........................................................................................................................................ Part 2 ........................................................................................................................................ Part 3 ........................................................................................................................................ [3] (b) Describe what is meant by an Internet Protocol (IP) address. ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ...............................................................................................................................................[4] © UCLES 2017 0478/13/O/N/17 [Turn over 4 4 Six components of a computer system and six descriptions are shown. Draw a line to match each component with the most suitable description. Component Description Arithmetic Logic Unit (ALU) Used to connect together the internal components of the CPU. Buses Used to carry out calculations on data. Control Unit (CU) Used to temporarily hold data and instructions during processing. Immediate Access Store (IAS) Used to allow interaction with the computer. Input/Output Used to hold data and instructions before they are processed. Registers Used to manage the flow of data through the CPU. [5] © UCLES 2017 0478/13/O/N/17 5 5 (a) Draw a logic circuit for the logic statement: X = 1 if ((A is 1 AND B is 1) OR (A is NOT 1 AND C is 1)) A X B C [4] © UCLES 2017 0478/13/O/N/17 [Turn over 6 (b) Draw the symbol for an XOR gate and explain the function of this logic gate. Explanation ............................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ...............................................................................................................................................[5] 6 Describe the operation of a 2D scanner and a 3D scanner. 2D ..................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... 3D ..................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... [6] © UCLES 2017 0478/13/O/N/17 7 7 Six statements about firewalls are shown. Tick (3) to show whether each statement is true or false. Statement true (3) false (3) Firewalls can monitor incoming and outgoing traffic. Firewalls operate by checking traffic against a set of rules. Firewalls cannot block access to a certain website. Firewalls can be software and hardware. Firewalls can act as intermediary servers. Firewalls can block unauthorised traffic. [6] © UCLES 2017 0478/13/O/N/17 [Turn over 8 8 (a) Data is valuable. It needs to be kept secure and it can easily be damaged. Give three different ways that data can be accidentally damaged. 1 ................................................................................................................................................ ................................................................................................................................................... 2 ................................................................................................................................................ ................................................................................................................................................... 3 ................................................................................................................................................ ................................................................................................................................................... [3] (b) The Secure Socket Layer (SSL) protocol can be used to securely transmit data in online banking. State three other different applications that use SSL. Application 1 ............................................................................................................................. Application 2 ............................................................................................................................. Application 3 ............................................................................................................................. [3] © UCLES 2017 0478/13/O/N/17 9 (c) Online banking is increasing in popularity. Online banking can be a risk as it can raise a number of security issues. SSL can be used as a security method to make online banking safer. Identify and describe three other security methods that could be used to make online banking safer. Security method 1 ..................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... Security method 2 ..................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... Security method 3 ..................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... [6] © UCLES 2017 0478/13/O/N/17 [Turn over 10 9 (a) Optical storage media can be used to store data. Describe how the data is read from a Compact Disc (CD). ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ...............................................................................................................................................[4] (b) Kamil wants to store a 16-bit colour image file. The image size is 1000 pixels. Calculate the size of the file. Give your answer in bytes. Show your working. Working ..................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... Answer ............................... bytes [2] (c) Describe the differences between primary and secondary storage. ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ...............................................................................................................................................[4] © UCLES 2017 0478/13/O/N/17 11 10 Six statements about assembly language are shown. Tick (3) whether the statement is true or false. Statement true (3) false (3) Assembly language uses mnemonic codes. Assembly language programs do not need a translator to be executed. Assembly language is a low-level programming language. Assembly language is specific to the computer hardware. Assembly language is machine code. Assembly language is often used to create drivers for hardware. [6] © UCLES 2017 0478/13/O/N/17 12 BLANK PAGE Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will be pleased to make amends at the earliest possible opportunity. To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after the live examination series. Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge. © UCLES 2017 0478/13/O/N/17 Cambridge Assessment International Education Cambridge International General Certificate of Secondary Education COMPUTER SCIENCE 0478/13 Paper 1 October/November 2017 MARK SCHEME Maximum Mark: 75 Published This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the details of the discussions that took place at an Examiners’ meeting before marking began, which would have considered the acceptability of alternative answers. Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for Teachers. Cambridge International will not enter into discussions about these mark schemes. Cambridge International is publishing the mark schemes for the October/November 2017 series for most Cambridge IGCSE®, Cambridge International A and AS Level components and some Cambridge O Level components. ® IGCSE is a registered trademark. This syllabus is approved for use in England, Wales and Northern Ireland as a Cambridge International Level 1/Level 2 Certificate. This document consists of 10 printed pages. © UCLES 2017 [Turn over 0478/13 Cambridge IGCSE – Mark Scheme PUBLISHED Question Answer October/November 2017 Marks 1(a) Output 1 1(b) 1 mark for each correct conversion 3 E 1 1 0 1 0 0 0 4 0 0 0 1 0 0 1(c) Any one from: – Hexadecimal codes can fit in a smaller display rather than a full text based message – Smaller amount of memory needed to store the hex error messages than text based 1 1(d) 1 mark for correct sensor, 1 mark for corresponding use Possible examples could include: 6 © UCLES 2017 – – Temperature (sensor) To monitor the temperature of the water – – Pressure (sensor) To monitor the level of water in the washing machine – – Motion (sensor) To monitor whether the drum is still in motion – – pH (sensor) To monitor the level of water hardness/detergent present in the water Page 2 of 10 0478/13 Cambridge IGCSE – Mark Scheme PUBLISHED Question 2 Answer 1 mark for each correct file format e.g. 3(a) 3(b) © UCLES 2017 File format Pictures .JPEG Text .doc, .txt, .rtf, .docx, .odt .pdf Sound .mp3, .wav, .aif, .flac, .mid Video .mp4, .flv, .wmv Answer – – – Part 1 Part 2 Part 3 Marks 3 File type Question October/November 2017 (access) protocol domain (name) filename Marks 3 Four from: – IP address is used to identify a device (on the Internet / network) – IP address is allocated by the network/ ISP – Can be used in place of URL – IP addresses can be IPv4 or IPv6 – IP address can be static « – ... meaning it doesn’t change each time it is connected to the Internet – IP address can be dynamic «. – « meaning that it can change each time a device is connected to the Internet – Any valid example (e.g. xxx.xxx.xxx.xxx or xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx) Page 3 of 10 4 0478/13 Cambridge IGCSE – Mark Scheme PUBLISHED Question 4 © UCLES 2017 Answer 1 mark for each correct line up to a total of 5 marks October/November 2017 Marks 5 Page 4 of 10 0478/13 Cambridge IGCSE – Mark Scheme PUBLISHED Question 5(a) © UCLES 2017 Answer 1 mark for each correct logic gate October/November 2017 Marks 4 Page 5 of 10 0478/13 Cambridge IGCSE – Mark Scheme PUBLISHED Question 5(b) Answer 1 mark for correct logic gate symbol: October/November 2017 Marks 5 Any four from: – similar to an OR gate – It has (at least) two inputs – Output will be high/1 if both inputs are different – Output will be high/1 if either input is high – Output will be low/0 if both inputs are high – Output will be low/0 if both inputs are low Question 6 © UCLES 2017 Answer Any six from: Marks 6 – – – – – 2D (Scanner) shines a light onto the surface of a document // Light moves across document Reflected light is captured Uses mirrors and lenses Captured image is converted into a digital file Produces a 2D digital image – – – – 3D Scanners shines a laser (or light) over the surface of a 3D object Records measurements of the geometry/dimensions of the object Measurements are converted to digital file Produces a 3D digital model Page 6 of 10 0478/13 Cambridge IGCSE – Mark Scheme PUBLISHED Question 7 October/November 2017 Answer Marks 1 mark for each correct tick 6 true (9) Statement Firewalls can monitor incoming and outgoing traffic. 9 Firewalls operate by checking traffic against a set of rules. 9 9 Firewalls cannot block access to a certain website. 9 Firewalls can be software and hardware. 9 Firewalls can act as intermediary servers. 9 Firewalls can block unauthorised traffic. Question false (9) Answer Marks 8(a) Any three from: – Human error (e.g. deleting/overwriting data) – Physical damage – Power failure/surge – Hardware failure – Software crashing 3 8(b) Any three from: – Online shopping // Online payment systems // Online booking – Email – Cloud based storage – Intranet/extranet – VPN – VoIP // video conferencing – Instant messaging (IM) // social networking // online gaming 3 © UCLES 2017 Page 7 of 10 0478/13 Cambridge IGCSE – Mark Scheme PUBLISHED Question 8(c) © UCLES 2017 Answer 1 mark for identifying, 1 mark for description October/November 2017 Marks 6 – – Strong password To make it difficult to hack an account – – Biometric device To use data that is difficult to fake as a password – – – – TLS // Encryption To make data meaningless if intercepted To encrypt data that is exchanged (TLS only) More secure than SSL (TLS only) – – – Anti-spyware (software) To find and remove any spyware that is installed on a computer To help stop key loggers recording key presses – – – Firewall To help prevent unauthorised access to an account Blocks any requests that do not meet/match the criteria – – Authentication (card reader at home)/mobile security code app/two-step verification To add another level of identification of the user – – Use of drop-down boxes (or equivalent) So key loggers cannot record the key presses – – Proxy server To divert an attack away from the main system Page 8 of 10 0478/13 Cambridge IGCSE – Mark Scheme PUBLISHED Question Answer October/November 2017 Marks 9(a) Any four from: – (Red) laser is used – (Laser beams) shines onto surface of the disk – It is rotated (at a constant speed) to be read – Surface is covered in a track (that spirals from the centre) – Data is represented on the surface using pits and lands – Pits and lands represent binary values – Pits reflect light back differently (to the area in between/land) – Optical device can determine the binary value from the light reflection 4 9(b) 1 mark for calculation, 1 mark for correct answer: 2 9(c) © UCLES 2017 – – 1000 × 16 16000/8 – Answer is 2000 bytes Four from: (Max 2 for either primary or secondary) 4 – – Primary RAM and ROM Secondary HDD and SSD – – Primary is directly accessible by CPU Secondary is not directly accessible by CPU – – Primary is internal to computer Secondary can be internal or external to the computer – – Primary stores boot up instructions and can hold data whilst being processed Secondary stores files/software – – Primary has faster access speed Secondary has a slower access speed – – Primary has both volatile and non-volatile Secondary is non-volatile Page 9 of 10 0478/13 Cambridge IGCSE – Mark Scheme PUBLISHED Question 10 October/November 2017 Answer Marks 1 mark for each correct tick 6 true (9) Statement 9 Assembly language uses mnemonic codes. 9 Assembly language programs do not need a translator to be executed. Assembly language is a low-level programming language. 9 Assembly language is specific to the computer hardware. 9 9 Assembly language is machine code. Assembly language is often used to create drivers for hardware. © UCLES 2017 false (9) Page 10 of 10 9 Cambridge International Examinations Cambridge International General Certificate of Secondary Education * 2 7 7 2 1 0 6 8 2 5 * 0478/11 COMPUTER SCIENCE May/June 2018 Paper 1 Theory 1 hour 45 minutes Candidates answer on the Question Paper. No Additional Materials are required. No calculators allowed. READ THESE INSTRUCTIONS FIRST Write your Centre number, candidate number and name in the spaces at the top of this page. Write in dark blue or black pen. You may use an HB pencil for any diagrams, graphs or rough working. Do not use staples, paper clips, glue or correction fluid. DO NOT WRITE IN ANY BARCODES. Answer all questions. No marks will be awarded for using brand names of software packages or hardware. Any businesses described in this paper are entirely fictitious. At the end of the examination, fasten all your work securely together. The number of marks is given in brackets [ ] at the end of each question or part question. The maximum number of marks is 75. This syllabus is approved for use in England, Wales and Northern Ireland as a Cambridge International Level 1/Level 2 Certificate. This document consists of 11 printed pages and 1 blank page. DC (SR/SW) 163639/3 R © UCLES 2018 [Turn over 2 1 Jane answers an examination question about computers and data correctly. Six different words or numbers have been removed from her answer. Complete the sentences in Jane’s answer, using the list given. Not all items in the list need to be used. • • • • • • • • 2 10 16 analogue binary denary digital hexadecimal As humans, we process …………………………………… data, but a computer cannot process this type of data. For a computer to be able to process data it needs to be converted to …………………………………… data. As humans, we mostly use a …………………………………… number system; this is a base …………………………………… number system. Computers use a …………………………………… number system; this is a base …………………………………… number system. 2 [6] Dheeraj identifies three hexadecimal numbers. Write the denary number for each of the three hexadecimal numbers: 2A .................................................................................................... 101 ................................................................................................... 21E .................................................................................................. [3] Working Space .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... © UCLES 2018 0478/11/M/J/18 3 3 The three binary numbers in the registers A, B and C have been transmitted from one computer to another. Parity bit Register A 1 0 0 1 1 0 0 0 Register B 0 1 1 0 0 1 1 1 Register C 1 0 0 1 1 0 0 1 One binary number has been transmitted incorrectly. This is identified through the use of a parity bit. Identify which register contains the binary number that has been transmitted incorrectly. Explain the reason for your choice. The binary number that has been transmitted incorrectly is in Register .......................................... Explanation ...................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... [4] © UCLES 2018 0478/11/M/J/18 [Turn over 4 4 Michele wants to email a file to Elsa. The file is too large so it must be compressed. (a) Name two types of compression that Michele could use. Compression type 1 .................................................................................................................. Compression type 2 .................................................................................................................. [2] (b) The file Michele is sending contains the source code for a large computer program. Identify which type of compression would be most suitable for Michele to use. Explain your choice. Compression type ...................................................................................................................... Explanation ................................................................................................................................ ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... [4] © UCLES 2018 0478/11/M/J/18 5 5 Six components of the Von Neumann model for a computer system and six descriptions are given. Draw a line to match each component to the most suitable description. Component Description Immediate access store (IAS) Holds data and instructions when they are loaded from main memory and are waiting to be processed. Register Holds data temporarily that is currently being used in a calculation. Control unit (CU) Holds data or instructions temporarily when they are being processed. Accumulator (ACC) Manages the flow of data and interaction between the components of the processor. Arithmetic logic unit (ALU) Carries out the calculations on data. Bus Pathway for transmitting data and instructions. [5] © UCLES 2018 0478/11/M/J/18 [Turn over 6 6 Consider the logic statement: X = 1 if ((A is NOT 1 OR B is 1) NOR C is 1) NAND ((A is 1 AND C is 1) NOR B is 1) (a) Draw a logic circuit to represent the given logic statement. A B X C [6] (b) Complete the truth table for the given logic statement. A B C 0 0 0 0 0 1 0 1 0 0 1 1 1 0 0 1 0 1 1 1 0 1 1 1 Working space X [4] © UCLES 2018 0478/11/M/J/18 7 7 Translators, such as a compiler and an interpreter, are used when writing and running computer programs. Describe how a compiler and an interpreter translates a computer program. Compiler ........................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... Interpreter ......................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... [6] © UCLES 2018 0478/11/M/J/18 [Turn over 8 8 A supermarket uses a barcode scanner to read the barcodes on its products. (a) Describe how the barcode scanner reads the barcode. ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... [4] (b) Explain how the barcode system could help the supermarket manage its stock. ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... [3] (c) An infrared touch screen is used to view and navigate the supermarket stock system. Explain how the infrared touch screen detects a user’s touch. ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... [4] © UCLES 2018 0478/11/M/J/18 9 (d) The supermarket uses secondary storage and off-line storage to store data about its stock. Explain what is meant by secondary storage and off-line storage. Secondary storage ................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... Off-line storage ......................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... [4] 9 A business wants to use a biometric security system to control entry to the office. The system will use a biometric device and a microprocessor. Explain how the biometric security system will make use of the biometric device and the microprocessor to control entry to the office. .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... [6] © UCLES 2018 0478/11/M/J/18 [Turn over 10 10 RockICT is a music business that has a website to allow customers to view and buy the products it sells. The website consists of web pages. (a) Describe what is meant by HTML structure and presentation for a web page. ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ...............................................................................................................................................[4] (b) The URL for the music company’s website is: https://www.rockict.net/index.htm Part 1 (i) Part 2 Identify what Part 1 and Part 2 represent in this URL. Part 1 ................................................................................................................................ Part 2 ................................................................................................................................ [2] (ii) Describe what is meant by https. ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... .......................................................................................................................................[2] © UCLES 2018 0478/11/M/J/18 11 (c) When a customer enters the website, a message is displayed: “RockICT makes use of cookies. By continuing to browse you are agreeing to our use of cookies.” Explain why the music company uses cookies. ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... [2] (d) The music company is concerned about the security of its website. The company uses a proxy server as part of its security system. Describe the role of a proxy server in the security system. ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... [4] © UCLES 2018 0478/11/M/J/18 12 BLANK PAGE Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will be pleased to make amends at the earliest possible opportunity. To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after the live examination series. Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge. © UCLES 2018 0478/11/M/J/18 Cambridge Assessment International Education Cambridge International General Certificate of Secondary Education COMPUTER SCIENCE 0478/11 Paper 1 May/June 2018 MARK SCHEME Maximum Mark: 75 Published This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the details of the discussions that took place at an Examiners’ meeting before marking began, which would have considered the acceptability of alternative answers. Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for Teachers. Cambridge International will not enter into discussions about these mark schemes. Cambridge International is publishing the mark schemes for the May/June 2018 series for most Cambridge IGCSE™, Cambridge International A and AS Level and Cambridge Pre-U components, and some Cambridge O Level components. IGCSE™ is a registered trademark. This syllabus is approved for use in England, Wales and Northern Ireland as a Cambridge International Level 1/Level 2 Certificate. This document consists of 12 printed pages. © UCLES 2018 [Turn over 0478/11 Cambridge IGCSE – Mark Scheme PUBLISHED Generic Marking Principles May/June 2018 These general marking principles must be applied by all examiners when marking candidate answers. They should be applied alongside the specific content of the mark scheme or generic level descriptors for a question. Each question paper and mark scheme will also comply with these marking principles. GENERIC MARKING PRINCIPLE 1: Marks must be awarded in line with: • • • the specific content of the mark scheme or the generic level descriptors for the question the specific skills defined in the mark scheme or in the generic level descriptors for the question the standard of response required by a candidate as exemplified by the standardisation scripts. GENERIC MARKING PRINCIPLE 2: Marks awarded are always whole marks (not half marks, or other fractions). GENERIC MARKING PRINCIPLE 3: Marks must be awarded positively: • • • • • marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit is given for valid answers which go beyond the scope of the syllabus and mark scheme, referring to your Team Leader as appropriate marks are awarded when candidates clearly demonstrate what they know and can do marks are not deducted for errors marks are not deducted for omissions answers should only be judged on the quality of spelling, punctuation and grammar when these features are specifically assessed by the question as indicated by the mark scheme. The meaning, however, should be unambiguous. GENERIC MARKING PRINCIPLE 4: Rules must be applied consistently e.g. in situations where candidates have not followed instructions or in the application of generic level descriptors. © UCLES 2018 Page 2 of 12 0478/11 Cambridge IGCSE – Mark Scheme PUBLISHED May/June 2018 GENERIC MARKING PRINCIPLE 5: Marks should be awarded using the full range of marks defined in the mark scheme for the question (however; the use of the full mark range may be limited according to the quality of the candidate responses seen). GENERIC MARKING PRINCIPLE 6: Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should not be awarded with grade thresholds or grade descriptors in mind. © UCLES 2018 Page 3 of 12 0478/11 Cambridge IGCSE – Mark Scheme PUBLISHED Question 1 Answer 1 mark for each correct answer, in the given order: − − − − − − 1 mark for each correct conversion: 3 Answer 1 mark for correct register, 3 marks for reason: − Marks 4 Register C Any three from: − Count the number of 1/0 bits (in each byte/register) − Two bytes/registers have an odd number of 1/0 bits // Two use odd parity − Odd parity must be the parity used − One byte/register has an even number of 1/0 bits // One uses even parity − One with an even number of one bits/even parity is incorrect // Register C should have odd parity © UCLES 2018 Marks 42 257 542 Question 3 6 Answer − − − Marks analogue digital denary 10 binary 2 Question 2 May/June 2018 Page 4 of 12 0478/11 Cambridge IGCSE – Mark Scheme PUBLISHED Question 4(a) May/June 2018 Answer 1 mark for each correct answer: Marks 2 Lossy (compression) Lossless (compression) 4(b) 1 mark for correct compression, 3 marks for description: − Lossless (compression) Any three from: − The file can be restored/decompressed to the exact same state it was before compression/ to original − (It is a computer program so) no data can be lost // Lossy would remove data − Will not run correctly (with any other compression) − (Lossless) will give repeating words/sections of word a value// RLE is used // Other valid examples of methods of lossless compression − Value is recorded in an index © UCLES 2018 Page 5 of 12 4 0478/11 Cambridge IGCSE – Mark Scheme PUBLISHED Question 5 Answer 1 mark for each correct line, up to a maximum of 5 marks: Component Immediate access store (IAS) © UCLES 2018 Description Holds data and instructions when they are loaded from main memory and are waiting to be processed. Register Holds data temporarily that is currently being used in a calculation. Control unit (CU) Holds data or instructions temporarily when they are being processed. Accumulator (ACC) Manages the flow of data and interaction between the components of the processor. Arithmetic logic unit (ALU) Carries out the calculations on data. Bus Pathway for transmitting data and instructions. Page 6 of 12 May/June 2018 Marks 5 0478/11 Question 6(a) © UCLES 2018 Cambridge IGCSE – Mark Scheme PUBLISHED Answer 1 mark for each correct logic gate (with the correct direction of input(s)) Page 7 of 12 May/June 2018 Marks 6 0478/11 Cambridge IGCSE – Mark Scheme PUBLISHED Question 6(b) © UCLES 2018 Answer May/June 2018 Marks 4 marks for 8 correct outputs 3 marks for 6 or 7 correct outputs 2 marks for 4 or 5 correct outputs 1 mark for 2 or 3 correct outputs 4 A B C Working space X 0 0 0 1 0 0 1 1 0 1 0 1 0 1 1 1 1 0 0 0 1 0 1 1 1 1 0 1 1 1 1 1 Page 8 of 12 0478/11 Question 7 Cambridge IGCSE – Mark Scheme PUBLISHED Answer Compiler Any three from: − Translates high-level language into machine code/low level language − Translates (the source code) all in one go/all at once − Produces an executable file − Produces an error report May/June 2018 Marks 6 Interpreter Any three from: – Translates high-level language into machine code/low level language − Translates (the source code) line by line/statement by statement – Stops if it finds an error – Will only continue when error is fixed Question Answer Marks 8(a) Any four from: − Shines light / (red) laser at barcode − Light is called an illuminator − Light is reflected back // White lines reflect light // Black lines reflect less light/absorbs light − Sensors / photoelectric cells detect the light − Different reflections / bars will give different binary values / digital values // pattern converted to digital values − A microprocessor interprets the data 4 8(b) Any three from: − barcode identifies a (unique) product − barcode can be used to look up product (in a database) − data about stock levels can be stored on a system − stock can be automatically deducted from the system − can check stock is below a certain level // check stock level − automatic re-order // Alerts when stock is low − automatically update new stock level − to locate if an item of stock is available in another location 3 © UCLES 2018 Page 9 of 12 0478/11 Question Cambridge IGCSE – Mark Scheme PUBLISHED May/June 2018 Answer Marks 8(c) Any four from: − (Infrared) rays are sent across screen (from the edges) − Has sensors around edge // Sensors capture beams − (Infrared) rays form a grid across the screen − (Infrared) ray is broken (by a finger blocking a beam) − Calculation is made (on where beam is broken) to locate the ‘touch’ // Co-ordinates are used to locate the touch 4 8(d) Secondary Storage – any two from: − Not directly accessed by the CPU − Non-volatile storage − Secondary is internal to the computer/device − An example of secondary storage would be HDD/SSD 4 Off-line storage – any two from: − Non-volatile storage − Off-line storage is storage that is removable from a computer/device // not internal // portable − An example of off-line storage would be CD/DVD/USB stick/SD card/magnetic tape/ external HDD/SSD Question 9 © UCLES 2018 Answer Any six from: − Suitable biometric device, such as fingerprint scanner/retina/eye/iris scanner/face recognition/voice recognition/palm scanner // description of use e.g. use fingerprint on device − Sensor (in biometric device) captures/takes data/readings (of user) − Data/readings are converted from analogue to digital (using ADC) − Data/reading sent to the microprocessor − Data/readings compared to stored values/data « − « if data/readings match user can enter − « if data/readings do not match user is declined entry // user asked to try again « − « alert may be sent to security // alarm may sound Page 10 of 12 Marks 6 0478/11 Cambridge IGCSE – Mark Scheme PUBLISHED Question 10(a) 10(b)(i) Answer 10(c) © UCLES 2018 Marks Any four from: − Structure and presentation are defined using (mark-up) tags − Structure and presentation dictate the appearance of the website − Structure is used for layout − Example of structure − Presentation is used for formatting / style − Example of formatting − Separate file / CSS can be used for presentation content 4 1 mark for each correct part 2 − − 10(b)(ii) May/June 2018 domain (name) file name/webpage name Any two from: − Hypertext Transfer Protocol Secure // it is the access protocol // It is a protocol − It means the website uses SSL/TLS − It means data sent (to and from the webserver) is encrypted 2 Any two from e.g. : − To store items that a customer has added to an online shopping basket − To store a customer’s credit card details − To store log-in details − To track what product a customer browses // Track music preferences − Targeted advertising // making recommendations − Personalises/customises the experience − Shows who are new and returning customers − To speed up log-in times − To speed up/allow single click purchases − Improves the experience 2 Page 11 of 12 0478/11 Question 10(d) © UCLES 2018 Cambridge IGCSE – Mark Scheme PUBLISHED Answer Any four from: − Prevents direct access to the webserver // Sits between user and webserver − If an attack is launched it hits the proxy server instead // can be used to help prevent DDOS // help prevent hacking of webserver − Used to direct invalid traffic away from the webserver − Traffic is examined by the proxy server // Filters traffic − If traffic is valid the data from the webserver will be obtained by the user − If traffic is invalid the request to obtain data is declined − Can block requests from certain IP addresses Page 12 of 12 May/June 2018 Marks 4 Cambridge International Examinations Cambridge International General Certificate of Secondary Education * 8 0 0 3 2 9 5 9 2 1 * 0478/12 COMPUTER SCIENCE May/June 2018 Paper 1 Theory 1 hour 45 minutes Candidates answer on the Question Paper. No Additional Materials are required. No calculators allowed. READ THESE INSTRUCTIONS FIRST Write your Centre number, candidate number and name in the spaces at the top of this page. Write in dark blue or black pen. You may use an HB pencil for any diagrams, graphs or rough working. Do not use staples, paper clips, glue or correction fluid. DO NOT WRITE IN ANY BARCODES. Answer all questions. No marks will be awarded for using brand names of software packages or hardware. Any businesses described in this paper are entirely fictitious. At the end of the examination, fasten all your work securely together. The number of marks is given in brackets [ ] at the end of each question or part question. The maximum number of marks is 75. This syllabus is approved for use in England, Wales and Northern Ireland as a Cambridge International Level 1/Level 2 Certificate. This document consists of 11 printed pages and 1 blank page. DC (SC/SW) 150229/2 © UCLES 2018 [Turn over 2 1 Different units of data can be used to represent the size of a file, as it changes in size. Fill in the missing units of data, using the list given: • byte • gigabyte (GB) • megabyte (MB) • nibble The units of data increase in size from smallest to largest. Smallest bit ……………………………………………….. ……………………………………………….. kilobyte (kB) ……………………………………………….. ……………………………………………….. Largest terabyte (TB) [4] 2 (a) Nancy has captured images of her holiday with her camera. The captured images are stored as digital photo files on her camera. Explain how the captured images are converted to digital photo files. ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... .............................................................................................................................................. [4] © UCLES 2018 0478/12/M/J/18 3 (b) Nancy wants to email the photos to Nadia. Many of the photos are very large files, so Nancy needs to reduce their file size as much as possible. Identify which type of compression would be most suitable for Nancy to use. Explain your choice. Compression type ..................................................................................................................... Explanation ............................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... [4] 3 A stopwatch uses six digits to display hours, minutes and seconds. The stopwatch is stopped at: 0 2 Hours 3 1 Minutes 5 8 Seconds An 8-bit register is used to store each pair of digits. (a) Write the 8-bit binary numbers that are currently stored for the Hours, Minutes and Seconds. Hours Minutes Seconds [3] © UCLES 2018 0478/12/M/J/18 [Turn over 4 (b) The stopwatch is started again and then stopped. When the watch is stopped, the 8-bit binary registers show: Hours 0 0 0 0 0 1 0 1 Minutes 0 0 0 1 1 0 1 0 Seconds 0 0 1 1 0 1 1 1 Write the denary values that will now be shown on the stopwatch. Hours Minutes Seconds [3] 4 Jafar is using the Internet when he gets the message: “D03, page is not available” Jafar remembers that hexadecimal is often used to represent binary values in error codes. Convert the hexadecimal number in the error message into 12-bit binary. [3] © UCLES 2018 0478/12/M/J/18 5 5 The three binary numbers in the registers X, Y and Z have been transmitted from one computer to another. Parity bit Register X 1 0 0 1 0 0 1 0 Register Y 1 1 1 0 0 1 1 1 Register Z 1 1 1 0 1 0 0 1 Only one binary number has been transmitted correctly. This is identified through the use of a parity bit. Identify which register contains the binary number that has been transmitted correctly. Explain the reason for your choice. The binary number that has been transmitted correctly is in Register ............................................ Explanation ...................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... [4] © UCLES 2018 0478/12/M/J/18 [Turn over 6 6 Kelvin correctly answers an examination question about the Von Neumann model. Eight different terms have been removed from his answer. Complete the sentences in Kelvin’s answer, using the list given. Not all items in the list need to be used. • accumulator (ACC) • address bus • arithmetic logic unit (ALU) • control unit (CU) • data bus • executed • fetches • immediate access store (IAS) • memory address register (MAR) • memory data register (MDR) • program counter (PC) • saved • transmits The central processing unit (CPU) .................................................................................... the data and instructions needed and stores them in the .................................................................................... to wait to be processed. The .................................................................................... holds the address of the next instruction. This address is sent to the .................................................................................... . The data from this address is sent to the .................................................................................... . The instruction can then be decoded and .................................................................................... . Any calculations that are carried out on the data are done by the .................................................................................... . During calculations, the data is temporarily held in a register called the .................................................................................... . © UCLES 2018 0478/12/M/J/18 [8] 7 7 Consider the logic statement: X = 1 if ((A is 1 AND B is NOT 1) NAND C is 1) XOR ((A is 1 AND C is 1) OR B is 1) (a) Draw a logic circuit to represent the given logic statement. A B X C [6] (b) Complete the truth table for the given logic statement. A B C 0 0 0 0 0 1 0 1 0 0 1 1 1 0 0 1 0 1 1 1 0 1 1 1 Working space X [4] © UCLES 2018 0478/12/M/J/18 [Turn over 8 8 Dimitri is writing a computer program in a high-level language. He needs to send just the machine code for the program to his friend, electronically. It is important that the program is executed as quickly as possible. Identify which translator will be most suitable for Dimitri to use. Explain your choice. Type of translator ............................................................................................................................. Explanation ...................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... [4] 9 An advertisement in a magazine displays this barcode: (a) Identify this type of barcode. .............................................................................................................................................. [1] (b) Explain how the data stored in this barcode is read. ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... .............................................................................................................................................. [4] © UCLES 2018 0478/12/M/J/18 9 10 Alexandra has a new mobile device. It has a touch screen that uses capacitive technology. (a) Describe how a capacitive touch screen registers Alexandra’s touch. ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... .............................................................................................................................................. [4] (b) Alexandra is wearing gloves because it is cold. She presses an icon on her touch screen but her action is not registered. (i) Explain why the touch screen will not register her touch. ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... ...................................................................................................................................... [2] (ii) Alexandra does not want to remove her gloves. Explain how Alexandra could use her mobile device whilst still wearing gloves. ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... ...................................................................................................................................... [2] © UCLES 2018 0478/12/M/J/18 [Turn over 10 11 A factory uses a security system to control a security light. The system uses a sensor and a microprocessor. Explain how the security system makes use of the sensor and the microprocessor to control the security light. .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... ..................................................................................................................................................... [6] © UCLES 2018 0478/12/M/J/18 11 12 (a) Selma has some important personal information that she needs to email to her employer. She wants to make sure that if the personal information is intercepted, it cannot be understood. (i) State how Selma could email her personal data more securely. ...................................................................................................................................... [1] (ii) Describe how your chosen solution works. ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... ...................................................................................................................................... [5] (b) Selma wants to make sure that the information received is correct. A parity check can be used to detect errors. Describe another error detection method that can be used to check the information received is correct. Error detection method ............................................................................................................. Description ................................................................................................................................ ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... [3] © UCLES 2018 0478/12/M/J/18 12 BLANK PAGE Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will be pleased to make amends at the earliest possible opportunity. To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after the live examination series. Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge. © UCLES 2018 0478/12/M/J/18 Cambridge Assessment International Education Cambridge International General Certificate of Secondary Education COMPUTER SCIENCE 0478/12 Paper 1 May/June 2018 MARK SCHEME Maximum Mark: 75 Published This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the details of the discussions that took place at an Examiners’ meeting before marking began, which would have considered the acceptability of alternative answers. Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for Teachers. Cambridge International will not enter into discussions about these mark schemes. Cambridge International is publishing the mark schemes for the May/June 2018 series for most Cambridge IGCSE™, Cambridge International A and AS Level and Cambridge Pre-U components, and some Cambridge O Level components. IGCSE™ is a registered trademark. This syllabus is approved for use in England, Wales and Northern Ireland as a Cambridge International Level 1/Level 2 Certificate. This document consists of 10 printed pages. © UCLES 2018 [Turn over 0478/12 Cambridge IGCSE – Mark Scheme PUBLISHED Generic Marking Principles May/June 2018 These general marking principles must be applied by all examiners when marking candidate answers. They should be applied alongside the specific content of the mark scheme or generic level descriptors for a question. Each question paper and mark scheme will also comply with these marking principles. GENERIC MARKING PRINCIPLE 1: Marks must be awarded in line with: • • • the specific content of the mark scheme or the generic level descriptors for the question the specific skills defined in the mark scheme or in the generic level descriptors for the question the standard of response required by a candidate as exemplified by the standardisation scripts. GENERIC MARKING PRINCIPLE 2: Marks awarded are always whole marks (not half marks, or other fractions). GENERIC MARKING PRINCIPLE 3: Marks must be awarded positively: • • • • • marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit is given for valid answers which go beyond the scope of the syllabus and mark scheme, referring to your Team Leader as appropriate marks are awarded when candidates clearly demonstrate what they know and can do marks are not deducted for errors marks are not deducted for omissions answers should only be judged on the quality of spelling, punctuation and grammar when these features are specifically assessed by the question as indicated by the mark scheme. The meaning, however, should be unambiguous. GENERIC MARKING PRINCIPLE 4: Rules must be applied consistently e.g. in situations where candidates have not followed instructions or in the application of generic level descriptors. © UCLES 2018 Page 2 of 10 0478/12 Cambridge IGCSE – Mark Scheme PUBLISHED May/June 2018 GENERIC MARKING PRINCIPLE 5: Marks should be awarded using the full range of marks defined in the mark scheme for the question (however; the use of the full mark range may be limited according to the quality of the candidate responses seen). GENERIC MARKING PRINCIPLE 6: Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should not be awarded with grade thresholds or grade descriptors in mind. © UCLES 2018 Page 3 of 10 0478/12 Cambridge IGCSE – Mark Scheme PUBLISHED Question 1 Answer 1 mark for each unit, in the given order: – – nibble byte – – megabyte (MB) gigabyte (GB) May/June 2018 Marks 4 Question Answer Marks 2(a) Any four from: – Image is converted from analogue to digital (using ADC) – Image is turned into pixels – Each pixel is given a binary value – Pixels form a grid (to create the image) – Each pixel has a colour – Pixels are stored in sequence (in a file) – Meta data is stored (to describe the dimensions/resolution of the image) // It stores the dimensions/colour depth .etc. – An example of a suitable photo file format e.g. JPEG 4 2(b) 1 mark for correct compression, 3 marks for explanation: 4 – Lossy Any three from: – Lossy would reduce the file size more (than lossless) – The redundant data can be removed from the files // by example (must be about redundant data) – Images can still be a similar quality – There is no requirement for the files to be exactly the same as original file – Photos can be sent quicker // faster to upload // faster to download © UCLES 2018 Page 4 of 10 0478/12 Cambridge IGCSE – Mark Scheme PUBLISHED Question 3(a) 3(b) Answer 3 Hours 0 0 0 0 0 0 1 0 Minutes 0 0 0 1 1 1 1 1 Seconds 0 0 1 1 1 0 1 0 1 mark for each correct section: 3 5 2 Hours 6 5 Minutes Question 5 Seconds Answer Marks 1 mark for each correct section: 1 1 0 1 mark © UCLES 2018 Marks 1 mark for each correct register 0 4 May/June 2018 1 3 0 0 0 0 1 mark 0 0 1 1 mark Page 5 of 10 1 0478/12 Cambridge IGCSE – Mark Scheme PUBLISHED Question 5 Answer 1 mark for correct register, 3 marks for reason: – May/June 2018 Marks 4 Register Y Any three from: – Count the number of 1/0 bits (in each byte/register) – Two bytes/registers have an odd number of 1/0 bits // Two have odd parity – Even parity must be the parity used – One byte/register has an even number of 1/0 bits // One uses even parity – The two with an odd number of one bits/odd parity are incorrect // Register X and Z should have even parity Question 6 Answer 1 mark for each correct missing word, in the given order: – – – – – – – – © UCLES 2018 fetches immediate access store // IAS program counter // PC memory address register // MAR memory data register // MDR executed arithmetic logic unit // ALU accumulator // ACC Page 6 of 10 Marks 8 0478/12 Cambridge IGCSE – Mark Scheme PUBLISHED Question Answer May/June 2018 Marks 7(a) 1 mark for each correct logic gate with correct direct of input(s): 6 7(b) 4 marks for 8 correct outputs 3 marks for 6 or 7 correct outputs 2 marks for 4 or 5 correct outputs 1 mark for 2 or 3 correct outputs 4 © UCLES 2018 A B C Working space X 0 0 0 1 0 0 1 1 0 1 0 0 0 1 1 0 1 0 0 1 1 0 1 1 1 1 0 0 1 1 1 0 Page 7 of 10 0478/12 Cambridge IGCSE – Mark Scheme PUBLISHED Question 8 Answer 1 mark for correct translator, 3 marks for explanation: – May/June 2018 Marks 4 Compiler Any three from: – Does not require recompilation // compiled program can be executed without a compiler « – ... therefore, allows faster execution – Provides an executable file « – « therefore, allows him to just send machine code – Dimitri’s friend does not need translation/compilation software to execute the program Question Answer Marks 9(a) QR/Quick response 1 9(b) Any four from: – Read/scanned using app (on mobile device) – It is the camera that is used to scan/capture the image – The three large squares are used to define the alignment // uses alignment targets/modules – Black squares reflect less light // white squares reflect more light – The app/device processes the image – Each small square/pixel is converted to a binary value 4 Question 10(a) © UCLES 2018 Answer Any four from: – Conductive layer – An electrostatic/electric field is created – Sensor(s) (around the screen) monitor the electrostatic field – When touched (electrostatic) charge is transferred to finger – Location of touch is calculated // Co-ordinates used to calculate touch Page 8 of 10 Marks 4 0478/12 Cambridge IGCSE – Mark Scheme PUBLISHED Question Answer May/June 2018 Marks 10(b)(i) Any two from: – Gloves are not conductive // Gloves are an insulator – Block current/charge from finger / body / person – Stop the electrostatic field being disturbed/changed 2 10(b)(ii) Any two from e.g. (1 mark for method, 1 for expansion): – She could use a (conductive) stylus« – « this will allow the charge to be charged/disturbed 2 – – She could use capacitive gloves« « this will allow the charge to be charged/disturbed – – She could use a natural language interface/voice operated interface « « she could give vocal commands to the device Question 11 Answer Any six from: – Suitable sensor (motion/infra-red) – Data converted (from analogue) to digital (using ADC) – Data sent to microprocessor – Data is compared to stored value/range « – « if data matches/out of range data security light turned on « – « waits for suitable period/until no motion detected « – « light turned off – Continuous loop/process Question 12(a)(i) © UCLES 2018 Answer Encryption Marks 6 Marks 1 Page 9 of 10 0478/12 Cambridge IGCSE – Mark Scheme PUBLISHED Question 12(a)(ii) 12(b) Answer Marks Any five from: – Her personal details before encryption is the plain text – The plain text/her personal details is encrypted using an encryption algorithm – The plain text/her personal details is encrypted using a key – The encrypted text is cypher/cipher text – The key is transmitted separately (from the text) – The key is used to decrypt the cypher text (after transmission) 5 Any three from a single error method: – Checksum – Calculation carried out on data – (checksum/calculated) value sent with data – recalculated after transmission and compared to original – If they do not match an error is present 3 – – – – – © UCLES 2018 May/June 2018 ARQ uses acknowledgment and timeout A request is sent with data to acknowledge all data is received Acknowledgement sent back to say all data is received If no acknowledgement is received in a time frame an error in transmission detected / data automatically resent. Page 10 of 10 Cambridge International Examinations Cambridge International General Certificate of Secondary Education * 0 5 5 7 4 2 2 1 9 3 * 0478/13 COMPUTER SCIENCE May/June 2018 Paper 1 Theory 1 hour 45 minutes Candidates answer on the Question Paper. No Additional Materials are required. No calculators allowed. READ THESE INSTRUCTIONS FIRST Write your Centre number, candidate number and name in the spaces at the top of this page. Write in dark blue or black pen. You may use an HB pencil for any diagrams, graphs or rough working. Do not use staples, paper clips, glue or correction fluid. DO NOT WRITE IN ANY BARCODES. Answer all questions. No marks will be awarded for using brand names of software packages or hardware. Any businesses described in this paper are entirely fictitious. At the end of the examination, fasten all your work securely together. The number of marks is given in brackets [ ] at the end of each question or part question. The maximum number of marks is 75. This syllabus is approved for use in England, Wales and Northern Ireland as a Cambridge International Level 1/Level 2 Certificate. This document consists of 11 printed pages and 1 blank page. DC (SC/CGW) 148529/3 © UCLES 2018 [Turn over 2 1 State five sensors that could be used in the following applications. Give a different type of sensor for each application. Application Sensor Weighing a baby in a hospital Turning off a kettle when the water boils Controlling an automatic door Monitoring the air quality in an aeroplane Counting cars crossing a bridge [5] 2 Draw a line to connect each term to the correct application. Term Application Simplex A telephone that can receive and transmit audio signals simultaneously. Duplex A two-way radio (walkie-talkie) that can receive and transmit messages, but not at the same time. Half-duplex A microphone that transmits data to a MIDI system. [2] © UCLES 2018 0478/13/M/J/18 3 3 Three security issues that could affect users online are phishing, pharming and spam. Explain what is meant by each security issue. Phishing ........................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... Pharming .......................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... Spam ................................................................................................................................................ .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... [6] © UCLES 2018 0478/13/M/J/18 [Turn over 4 4 A company transmits data to external storage at the end of each day. (a) Parity checks can be used to check for errors during data transmission. The system uses odd parity. (i) Tick (✓) to show for each of the received bytes whether they have been transmitted correctly or transmitted incorrectly. Received byte Transmitted correctly (✓) Transmitted incorrectly (✓) 10001011 10101110 01011101 00100101 [4] (ii) State one other method that could be used to check for transmission errors. ...................................................................................................................................... [1] (b) Data can be transferred using parallel or serial data transmission. (i) Describe what is meant by parallel data transmission. ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... ...................................................................................................................................... [2] (ii) Give one application of parallel data transmission. ........................................................................................................................................... ...................................................................................................................................... [1] © UCLES 2018 0478/13/M/J/18 5 (iii) Explain why serial data transmission is normally used for transferring data over a long distance. ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... ...................................................................................................................................... [2] (c) Data transferred over a network is encrypted to improve data security. The system uses 64-bit symmetric encryption. (i) Explain how encryption improves data security. ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... ...................................................................................................................................... [2] (ii) Explain one method that could be used to increase the level of security provided by the encryption. ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... ...................................................................................................................................... [2] © UCLES 2018 0478/13/M/J/18 [Turn over 6 5 (a) Convert the denary number 107 to binary. .............................................................................................................................................. [1] (b) Represent the denary number 300 as it would be stored in a 12-bit binary register. .............................................................................................................................................. [2] (c) Convert the denary number 179 to hexadecimal. .............................................................................................................................................. [2] 6 One of the roles of an operating system is to deal with interrupts. (a) Explain the term interrupt. ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... .............................................................................................................................................. [2] (b) Identify three devices that make use of interrupts. Device 1 .................................................................................................................................... Device 2 .................................................................................................................................... Device 3 .................................................................................................................................... [3] © UCLES 2018 0478/13/M/J/18 7 7 A train station uses large touch screens to allow passengers to search for train information and buy tickets. (a) State three benefits of using a touch screen in the train station. Benefit 1 ................................................................................................................................... ................................................................................................................................................... Benefit 2 ................................................................................................................................... ................................................................................................................................................... Benefit 3 ................................................................................................................................... ................................................................................................................................................... [3] (b) The touch screens at the station use resistive touch technology. Describe how resistive touch technology works. ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... .............................................................................................................................................. [4] © UCLES 2018 0478/13/M/J/18 [Turn over 8 8 A logic circuit is shown below. A B X C (a) Complete the truth table for the given logic circuit. A B C 0 0 0 0 0 1 0 1 0 0 1 1 1 0 0 1 0 1 1 1 0 1 1 1 Working space X [4] © UCLES 2018 0478/13/M/J/18 9 (b) Draw a logic circuit corresponding to this logic statement: X = 1 if (A is NOT 1) OR ((B is 1 OR C is 1) AND (B is NOT 1 OR A is NOT 1)) A B X C [6] 9 Three types of translators are assemblers, compilers and interpreters. Tick (✓) the appropriate boxes to show which statements apply to each type of translator. Statement Assembler (✓) Compiler (✓) Interpreter (✓) Translates highlevel language into machine code Provides error diagnostics Translates whole program to object code in one operation Translates and executes one line of code at a time [3] © UCLES 2018 0478/13/M/J/18 [Turn over 10 10 Explain how an instruction is fetched in a computer based on the Von Neumann model. .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... ..................................................................................................................................................... [6] 11 Identify three similarities between CDs and DVDs. 1 ....................................................................................................................................................... .......................................................................................................................................................... 2 ....................................................................................................................................................... .......................................................................................................................................................... 3 ....................................................................................................................................................... .......................................................................................................................................................... [3] © UCLES 2018 0478/13/M/J/18 11 12 An image is to be stored electronically. The image is 256 pixels high by 200 pixels wide with a 16-bit colour depth. Calculate the file size of the image. You must show all of your working. File size ................................................................................. kB [3] 13 Describe the role of an Internet Service Provider (ISP). .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... ..................................................................................................................................................... [6] © UCLES 2018 0478/13/M/J/18 12 BLANK PAGE Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will be pleased to make amends at the earliest possible opportunity. To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after the live examination series. Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge. © UCLES 2018 0478/13/M/J/18 Cambridge Assessment International Education Cambridge International General Certificate of Secondary Education COMPUTER SCIENCE 0478/13 Paper 1 May/June 2018 MARK SCHEME Maximum Mark: 75 Published This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the details of the discussions that took place at an Examiners’ meeting before marking began, which would have considered the acceptability of alternative answers. Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for Teachers. Cambridge International will not enter into discussions about these mark schemes. Cambridge International is publishing the mark schemes for the May/June 2018 series for most Cambridge IGCSE™, Cambridge International A and AS Level and Cambridge Pre-U components, and some Cambridge O Level components. IGCSE™ is a registered trademark. This syllabus is approved for use in England, Wales and Northern Ireland as a Cambridge International Level 1/Level 2 Certificate. This document consists of 12 printed pages. © UCLES 2018 [Turn over 0478/13 Cambridge IGCSE – Mark Scheme PUBLISHED Generic Marking Principles May/June 2018 These general marking principles must be applied by all examiners when marking candidate answers. They should be applied alongside the specific content of the mark scheme or generic level descriptors for a question. Each question paper and mark scheme will also comply with these marking principles. GENERIC MARKING PRINCIPLE 1: Marks must be awarded in line with: • • • the specific content of the mark scheme or the generic level descriptors for the question the specific skills defined in the mark scheme or in the generic level descriptors for the question the standard of response required by a candidate as exemplified by the standardisation scripts. GENERIC MARKING PRINCIPLE 2: Marks awarded are always whole marks (not half marks, or other fractions). GENERIC MARKING PRINCIPLE 3: Marks must be awarded positively: • • • • • marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit is given for valid answers which go beyond the scope of the syllabus and mark scheme, referring to your Team Leader as appropriate marks are awarded when candidates clearly demonstrate what they know and can do marks are not deducted for errors marks are not deducted for omissions answers should only be judged on the quality of spelling, punctuation and grammar when these features are specifically assessed by the question as indicated by the mark scheme. The meaning, however, should be unambiguous. GENERIC MARKING PRINCIPLE 4: Rules must be applied consistently e.g. in situations where candidates have not followed instructions or in the application of generic level descriptors. © UCLES 2018 Page 2 of 12 0478/13 Cambridge IGCSE – Mark Scheme PUBLISHED May/June 2018 GENERIC MARKING PRINCIPLE 5: Marks should be awarded using the full range of marks defined in the mark scheme for the question (however; the use of the full mark range may be limited according to the quality of the candidate responses seen). GENERIC MARKING PRINCIPLE 6: Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should not be awarded with grade thresholds or grade descriptors in mind. © UCLES 2018 Page 3 of 12 0478/13 Cambridge IGCSE – Mark Scheme PUBLISHED Question 1 Answer One mark per each sensor (sensors must be different): 2 Sensor Weighing a baby in a hospital Pressure Turning off a kettle when it boils Temperature Controlling an automatic door Infrared / Light / Pressure Monitoring the air quality in an aeroplane Oxygen / Gas / Humidity Counting cars crossing a bridge Pressure / Infrared / Magnetic Answer Term Applicaon Simplex A telephone that can receive and transmit audio signals simultaneously. Duplex A two-way radio (walkie talkie) that can receive and transmit messages, but not at the same me. Half-duplex A microphone that transmits data to a MIDI system. Three correct lines = 2 marks Two or one correct line = 1 mark © UCLES 2018 Marks 5 Application Question May/June 2018 Page 4 of 12 Marks 2 0478/13 Cambridge IGCSE – Mark Scheme PUBLISHED Question 3 Answer 2 marks per issue from: May/June 2018 Marks 6 Phishing – Legitimate looking emails sent to use – When user clicks on attachment / link sent to fraudulent website – Asked to reveal/designed to steal sensitive information Pharming – Malicious code loaded on user hard drive – Will redirect URL requests to fraudulent website – Asked to reveal/designed to steal sensitive information Spam – – – – Junk / unwanted email Sent to large numbers of people Used for advertising / spreading malware Fills up mail boxes Question 4(a)(i) Answer Received Byte Transmitted correctly (9) © UCLES 2018 4 9 10001011 4(a)(ii) Transmitted incorrectly (9) Marks 10101110 9 01011101 9 00100101 9 One from: – ARQ – Check Sum 1 Page 5 of 12 0478/13 Cambridge IGCSE – Mark Scheme PUBLISHED Question 4(b)(i) Answer – – Multiple bits / byte(s) sent at the same time Using multiple wires May/June 2018 Marks 2 4(b)(ii) Any one from e.g.: – Integrated Circuits – Any appropriate CPU buses – Any suitable device connection that uses parallel 1 4(b)(iii) Two from: – Bits remain synchronised – reducing data errors 2 – – Only single wire is required more cost effective to install/manufacture 4(c)(i) – – Encrypted text is meaningless Need the key to decrypt the text 2 4(c)(ii) – – Increase length / more bits used for key will generate more possibilities for key / less chance of decryption by brute force method 2 Question Answer Marks 5(a) (0)1101011 1 5(b) 000 100101100 1 mark for three leading zeros, 1 mark for correct binary number 2 5(c) B3 1 mark for each correct character 2 6(a) Any two from: – A signal sent from a device / software – Requests processor time // Processor stops to service interrupt – Interrupts have different priorities 2 © UCLES 2018 Page 6 of 12 0478/13 Cambridge IGCSE – Mark Scheme PUBLISHED Question 6(b) Answer Any three from e.g.: – Keyboard – Printer – Mouse Question 7(a) 7(b) © UCLES 2018 Marks 3 Answer Any three from: – Does not require peripherals (mouse or keyboard) – Number of possible inputs limited / menu driven interface – Less chance of input error – Resistant to weather – – – – May/June 2018 Uses two/multiple layers When top layer touched / pushed two layers make contact Circuit is completed when layers touch Point of contact is determined/calculated Page 7 of 12 Marks 3 4 0478/13 Cambridge IGCSE – Mark Scheme PUBLISHED Question 8(a) Answer A B C X 0 0 0 1 0 0 1 1 0 1 0 0 0 1 1 1 1 0 0 0 1 0 1 1 1 1 0 1 1 1 1 1 Marks 4 All 8 for 4 marks 6 or 7 for 3 marks 4 or 5 for 2 marks 2 or 3 for 1 mark © UCLES 2018 May/June 2018 Page 8 of 12 0478/13 Cambridge IGCSE – Mark Scheme PUBLISHED Question May/June 2018 Answer Marks 8(b) 6 X 1 mark per gate with correct inputs © UCLES 2018 Page 9 of 12 0478/13 Cambridge IGCSE – Mark Scheme PUBLISHED Question 9 Answer Statement Assembler (9) Translates highlevel language into machine code Compiler (9) Interpreter (9) 9 9 9 Provides error diagnostics 9 9 Translates whole program to object code in one operation 9 9 Translates and executes one line of code at a time May/June 2018 Marks 3 9 1 mark for each correct column Question 10 © UCLES 2018 Answer Any six from: – Program counter (PC) holds address / location of the instruction – The address held in PC is sent to MAR – Address is sent using address bus – PC is incremented – The instruction is sent from address in memory to MDR – Instruction is transferred using the data bus – Instruction sent to CIR Page 10 of 12 Marks 6 0478/13 Cambridge IGCSE – Mark Scheme PUBLISHED Question 11 Answer Any three from: – Optical media – Non-volatile – Offline – Single (continuous spiral) track – Data stored using lands / pits – Read using (red) lasers – Can be read only (R) or read write (RW) Question 12 Marks 3 Answer 256 × 200 = 51 200 Marks 3 51 200 × 16 = 102 400 8 102 400 = 100 1024 Answer 100 kB One mark for correct answer and two marks for correct calculations. © UCLES 2018 May/June 2018 Page 11 of 12 0478/13 Question 13 © UCLES 2018 Cambridge IGCSE – Mark Scheme PUBLISHED Answer Any six from e.g.: – Provide access to the internet / dial up / broadband – Usually charge a monthly fee – Monitor usage – Give users an IP address – Determine bandwidth – Supports domain names – Provide security services – Provide web hosting facilities – Provide access to Email / Mailbox – Provides online data storage Page 12 of 12 May/June 2018 Marks 6 Cambridge International Examinations Cambridge International General Certificate of Secondary Education * 6 4 9 5 6 2 2 5 9 6 * 0478/11 COMPUTER SCIENCE October/November 2018 Paper 1 Theory 1 hour 45 minutes Candidates answer on the Question Paper. No Additional Materials are required. No calculators allowed. READ THESE INSTRUCTIONS FIRST Write your Centre number, candidate number and name in the spaces at the top of this page. Write in dark blue or black pen. You may use an HB pencil for any diagrams, graphs or rough working. Do not use staples, paper clips, glue or correction fluid. DO NOT WRITE IN ANY BARCODES. Answer all questions. No marks will be awarded for using brand names of software packages or hardware. Any businesses described in this paper are entirely fictitious. At the end of the examination, fasten all your work securely together. The number of marks is given in brackets [ ] at the end of each question or part question. The maximum number of marks is 75. This syllabus is approved for use in England, Wales and Northern Ireland as a Cambridge International Level 1/Level 2 Certificate. This document consists of 11 printed pages and 1 blank page. DC (NF/SW) 150228/3 © UCLES 2018 [Turn over 2 1 (a) Computer files can be saved in different file formats. Four file formats and four file types are given. Draw a line to match each file format to the most suitable file type. File format File type .jpeg Text file .mp3 Image file .mp4 Audio file .txt Video file [3] (b) Jamelia wants to store an image file. The image has an 8-bit resolution and is 150 pixels by 100 pixels in size. Calculate the file size of the image. Give your answer in kilobytes (kB). Show all of your working. ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... File size ........................................................................................................... kB © UCLES 2018 0478/11/O/N/18 [3] 3 (c) Large files can be compressed to reduce their file size. Two types of compression that can be used are lossy and lossless. Explain how a file is compressed using lossless compression. ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... .............................................................................................................................................. [3] (d) The table contains four different file formats that use compression. Tick () to show whether each file format uses lossy or lossless compression. File format Lossy () Lossless () .jpeg .mp3 .mp4 .zip [4] © UCLES 2018 0478/11/O/N/18 [Turn over 4 2 (a) Six binary or hexadecimal numbers and six denary conversions are given. Draw a line to connect each binary or hexadecimal number to the correct denary conversion. Binary or hexadecimal Denary 01001011 75 4E 78 11011010 157 10011101 167 A7 25 19 218 [5] (b) Hexadecimal is often used by computer programmers to represent binary values. Explain why computer programmers may choose to use hexadecimal. ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... .............................................................................................................................................. [2] © UCLES 2018 0478/11/O/N/18 5 3 A logic circuit is shown: A X B C (a) Complete the truth table for the given logic circuit. A B C 0 0 0 0 0 1 0 1 0 0 1 1 1 0 0 1 0 1 1 1 0 1 1 1 Working space X [4] (b) Explain the difference between the functions of an AND gate and an OR gate. ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... .............................................................................................................................................. [3] © UCLES 2018 0478/11/O/N/18 [Turn over 6 4 Phishing and pharming are two examples of online security threats to a computer system. (a) Explain what is meant by phishing and pharming. Phishing .................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... Pharming .................................................................................................................................. ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... [4] (b) Identify two other online security threats to a computer system. Security threat 1 ....................................................................................................................... Security threat 2 ....................................................................................................................... [2] (c) Give two security measures that can help to protect a computer system from online security threats. Security measure 1 ................................................................................................................... Security measure 2 ................................................................................................................... [2] © UCLES 2018 0478/11/O/N/18 7 5 (a) Five storage devices or media are listed in the table. Tick () to show whether each storage device or media is an example of primary, secondary or off-line storage. Storage device or media Primary () Secondary () Off-line () External HDD RAM Internal SSD ROM DVD [5] (b) Users can store their data on optical storage media. Explain how data is written to optical storage media. ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... .............................................................................................................................................. [4] © UCLES 2018 0478/11/O/N/18 [Turn over 8 (c) A sports events company uses a digital camera attached to a drone (small flying system), to video their events from the sky. The video is stored as it is captured, on a device that is attached to the drone. (i) Circle the most suitable type of storage to store the video. Optical Magnetic Solid state [1] (ii) Explain the reasons for your choice in part (c)(i). ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... ...................................................................................................................................... [2] 6 Two examples of output devices are a 3D printer and a 3D cutter. (a) The table contains four statements about 3D printers and 3D cutters. Tick () to show which statements apply to each output device, some statements may apply to both output devices. 3D printer () Statement 3D cutter () Outputs a physical 3D product Uses a high powered laser to create the output Creates 3D prototypes Uses layers of material to create the output [4] (b) Identify the software used to create the computerised designs for 3D printing. .............................................................................................................................................. [1] © UCLES 2018 0478/11/O/N/18 9 (c) A Digital Light Projector (DLP) is another example of an output device. Describe how a DLP displays an image. ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... .............................................................................................................................................. [3] 7 Computers can use different methods of transmission to send data from one computer to another. Parallel data transmission is one method that can be used. (a) Explain what is meant by parallel data transmission. ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... .............................................................................................................................................. [2] (b) Give one benefit and one drawback of parallel data transmission, compared to serial data transmission, over short distances. Benefit ...................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... Drawback .................................................................................................................................. ................................................................................................................................................... ................................................................................................................................................... [2] (c) Give one example where parallel data transmission is used. .............................................................................................................................................. [1] © UCLES 2018 0478/11/O/N/18 [Turn over 10 8 Kamil correctly answers an examination question about a number of internet terms. Six different terms have been removed from Kamil’s answer. Complete the sentences in Kamil’s answer, using the list given. Not all terms in the list need to be used. • • • • • • • • • • • • browser connection domain name server (DNS) Internet Internet Service Provider (ISP) IP address MAC address network protocol uniform resource locator (URL) webpages hypertext mark-up language (HTML) A .................................................................................................. is a program that allows a user to view .................................................................................................. . An .................................................................................................. is a company that provides a connection to access the .................................................................................................. . The main .................................................................................................. that governs the transmission of data using the Internet is http. The .................................................................................................. is provided by the network, and given to each device on the network. © UCLES 2018 0478/11/O/N/18 [6] 11 9 A sports stadium uses a pressure sensor and a microprocessor to monitor the number of people entering the sports stadium. For the counter to increment the weight on the pressure sensor must exceed 5 kg. Explain how the system uses the pressure sensor and the microprocessor to monitor the number of people entering. .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... ..................................................................................................................................................... [5] 10 Personal computers (PCs) use an operating system. Explain why this type of computer needs an operating system. .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... ..................................................................................................................................................... [4] © UCLES 2018 0478/11/O/N/18 12 BLANK PAGE Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will be pleased to make amends at the earliest possible opportunity. To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after the live examination series. Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge. © UCLES 2018 0478/11/O/N/18 Cambridge Assessment International Education Cambridge International General Certificate of Secondary Education COMPUTER SCIENCE 0478/11 Paper 1 October/November 2018 MARK SCHEME Maximum Mark: 75 Published This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the details of the discussions that took place at an Examiners’ meeting before marking began, which would have considered the acceptability of alternative answers. Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for Teachers. Cambridge International will not enter into discussions about these mark schemes. Cambridge International is publishing the mark schemes for the October/November 2018 series for most Cambridge IGCSE™, Cambridge International A and AS Level components and some Cambridge O Level components. This syllabus is approved for use in England, Wales and Northern Ireland as a Cambridge International Level 1/Level 2 Certificate. This document consists of 12 printed pages. © UCLES 2018 [Turn over 0478/11 Cambridge IGCSE – Mark Scheme PUBLISHED Generic Marking Principles October/November 2018 These general marking principles must be applied by all examiners when marking candidate answers. They should be applied alongside the specific content of the mark scheme or generic level descriptors for a question. Each question paper and mark scheme will also comply with these marking principles. GENERIC MARKING PRINCIPLE 1: Marks must be awarded in line with: • • • the specific content of the mark scheme or the generic level descriptors for the question the specific skills defined in the mark scheme or in the generic level descriptors for the question the standard of response required by a candidate as exemplified by the standardisation scripts. GENERIC MARKING PRINCIPLE 2: Marks awarded are always whole marks (not half marks, or other fractions). GENERIC MARKING PRINCIPLE 3: Marks must be awarded positively: • • • • • marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit is given for valid answers which go beyond the scope of the syllabus and mark scheme, referring to your Team Leader as appropriate marks are awarded when candidates clearly demonstrate what they know and can do marks are not deducted for errors marks are not deducted for omissions answers should only be judged on the quality of spelling, punctuation and grammar when these features are specifically assessed by the question as indicated by the mark scheme. The meaning, however, should be unambiguous. GENERIC MARKING PRINCIPLE 4: Rules must be applied consistently e.g. in situations where candidates have not followed instructions or in the application of generic level descriptors. © UCLES 2018 Page 2 of 12 0478/11 Cambridge IGCSE – Mark Scheme PUBLISHED October/November 2018 GENERIC MARKING PRINCIPLE 5: Marks should be awarded using the full range of marks defined in the mark scheme for the question (however; the use of the full mark range may be limited according to the quality of the candidate responses seen). GENERIC MARKING PRINCIPLE 6: Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should not be awarded with grade thresholds or grade descriptors in mind. © UCLES 2018 Page 3 of 12 0478/11 Cambridge IGCSE – Mark Scheme PUBLISHED Question 1(a) 1(b) Answer 1 mark for each correct line (to a maximum of 3) File format © UCLES 2018 Marks 3 File type .jpeg Text file .mp3 Image file .mp4 Audio file .txt Video file 2 marks for working, 1 mark for correct answer • 150*100 = 15 000 • 15 000/1024 • 1(c) October/November 2018 3 14.65kB Three from: • a compression algorithm is used • no data is lost in the process • repeated words/patterns can be indexed // repeated sections of words/patterns can be indexed // given by example • The indexed words/patterns can be replaced with numerical values // given by example Page 4 of 12 3 0478/11 Cambridge IGCSE – Mark Scheme PUBLISHED Question 1(d) Answer Marks 1 mark for each correct tick (9) 4 File format Lossy (9) .jpeg 9 .mp3 9 .mp4 9 Lossless (9) 9 .zip © UCLES 2018 October/November 2018 Page 5 of 12 0478/11 Cambridge IGCSE – Mark Scheme PUBLISHED Question 2(a) 2(b) © UCLES 2018 Answer October/November 2018 Marks 1 mark for each correct line (to a maximum of 5) 5 Binary or hexadecimal Denary 01001011 75 4E 78 11011010 157 10011101 167 A7 25 19 218 Two from: • It makes the values easier to read/write/understand/debug • It is a shorter way to represent the values Page 6 of 12 2 0478/11 Cambridge IGCSE – Mark Scheme PUBLISHED Question 3(a) 3(b) © UCLES 2018 October/November 2018 Answer • • • • Marks 4 4 marks for 8 correct outputs 3 marks for 6 or 7 correct outputs 2 marks for 4 or 5 correct outputs 1 mark for 2 or 3 correct outputs A B C Working space 0 0 0 1 0 0 1 1 0 1 0 1 0 1 1 1 1 0 0 0 1 0 1 1 1 1 0 1 1 1 1 1 Three from: • output of AND is 1 if both inputs are 1 • output of AND is 0 if either or both inputs are 0 • output of OR is 1 if either input is 1 • output of OR is 0 if both inputs are 0 • correct example of AND truth table • correct example of OR truth table X 3 Page 7 of 12 0478/11 Cambridge IGCSE – Mark Scheme PUBLISHED Question Answer October/November 2018 Marks 4(a) Four from: Phishing: • A legitimate looking email is sent to a user • The email will encourage the user to click a link/open an attachment • The link will redirect a user to a legitimate looking webpage (to steal personal data) Pharming: • A malicious code is installed on a user’s hard drive/server • The code will cause a redirection to a legitimate looking webpage (to steal personal data) 4 4(b) Two from: • Hacking • Cracking • Virus • Denial of service • Malware • Spyware 2 4(c) Two from: • Firewall • Proxy server • Anti-virus • Anti-malware • Anti-spyware • Username and password 2 © UCLES 2018 Page 8 of 12 0478/11 Cambridge IGCSE – Mark Scheme PUBLISHED Question 5(a) October/November 2018 Answer Marks 1 mark for the correct tick for each storage Storage device or media 5 Primary (9) Secondary (9) 9 External HDD 9 RAM 9 Internal SSD 9 ROM 9 DVD 5(b) Off-line (9) Four from: • The disc is rotated/spun • Laser beam is used • The laser beam makes indentations on the surface of the disc/pits and lands • The data is written in a spiral/concentric tracks • The pits and lands represent binary values/1s and 0s • It is called burning data to the disc 4 5(c)(i) Solid state 1 5(c)(ii) Two from: • It has no moving parts so will be durable • It is small/compact so it can be easily fit onto the device • It is light so it will not be difficult to lift for the drone • It can hold the large amount of data needed for the video/film footage • Uses less power so drone battery will last longer 2 © UCLES 2018 Page 9 of 12 0478/11 Cambridge IGCSE – Mark Scheme PUBLISHED Question 6(a) October/November 2018 Answer Marks 1 mark for the correct ticks (9) for each statement 4 Statement Outputs a physical 3D product 3D printer (9) 3D cutter (9) 9 9 9 Uses a high powered laser to create the output Creates 3D prototypes 9 Uses layers of material to create the output 9 9 6(b) Computer Aided Design/CAD 1 6(c) Three from: • Uses a large number of tiny mirrors • Mirrors are laid out in a grid/matrix • Each mirror creates a pixel in the image • Mirrors can tilt toward or away from light source • The mirrors reflect light toward a (projection) lens • Colour is produced using a colour wheel // Light passes through colour wheel // filters light into red/green/blue • Can be used to display an image on a wall/screen 3 © UCLES 2018 Page 10 of 12 0478/11 Cambridge IGCSE – Mark Scheme PUBLISHED Question October/November 2018 Answer Marks 7(a) 1 mark for each correct answer: • uses several/multiple wires • transmits multiple bits at a time 2 7(b) Benefit 1 mark for: • quicker/faster data transfer 2 Drawback One from: • More chance of data being skewed due to bits being sent simultaneously/out of order // less safe transmission as bits are sent simultaneously/out of order • More expensive as requires more/several/multiple wires • More chance of interference as more/several/multiple wires are used (than can create crosstalk) 7(c) One from: • Used in integrated circuits • Used in RAM • Used in connections to peripheral devices (e.g. printer) Question 8 © UCLES 2018 Answer 1 mark for each correct answer, in the given order: • browser • webpages • Internet Service Provider (ISP) • Internet • protocol • IP address 1 Marks 6 Page 11 of 12 0478/11 Question 9 Question 10 © UCLES 2018 Cambridge IGCSE – Mark Scheme PUBLISHED October/November 2018 Answer Five from: • The data is sent to the microprocessor • The analogue data is converted to digital (using ADC) • The microprocessor compares the data to a stored value of 5 kg – If the value is greater than 5 kg – a counter is added to/incremented • The process is continuous Answer Four from: • It performs a number of basic tasks, including controlling hardware/file handling (any other suitable examples) • It allows the user to communicate with the computer using hardware // without it the user would not be able to communicate with the computer using hardware • It provides the user with a user interface // without it the user would not have a user interface to use • PC’s are often used to perform many complex tasks at a time – the OS is needed to handle this multitasking – therefore, it provides the ability to handle interrupts Page 12 of 12 Marks 5 Marks 4 Cambridge International Examinations Cambridge International General Certificate of Secondary Education * 6 2 9 5 6 2 5 4 5 1 * 0478/12 COMPUTER SCIENCE October/November 2018 Paper 1 Theory 1 hour 45 minutes Candidates answer on the Question Paper. No Additional Materials are required. No calculators allowed. READ THESE INSTRUCTIONS FIRST Write your Centre number, candidate number and name in the spaces at the top of this page. Write in dark blue or black pen. You may use an HB pencil for any diagrams, graphs or rough working. Do not use staples, paper clips, glue or correction fluid. DO NOT WRITE IN ANY BARCODES. Answer all questions. No marks will be awarded for using brand names of software packages or hardware. Any businesses described in this paper are entirely fictitious. At the end of the examination, fasten all your work securely together. The number of marks is given in brackets [ ] at the end of each question or part question. The maximum number of marks is 75. This syllabus is approved for use in England, Wales and Northern Ireland as a Cambridge International Level 1/Level 2 Certificate. This document consists of 11 printed pages and 1 blank page. DC (LEG/SW) 150227/2 © UCLES 2018 [Turn over 2 1 Computers use a character set to convert text into binary. One character set that can be used is ASCII. Each letter in ASCII can also be represented as a denary value. (a) The word BUS has the denary values: B U S 66 85 83 Convert the denary values into 8-bit binary. 66 85 83 [3] (b) Each letter in ASCII can also be represented as a hexadecimal value. The word KEY has the 8-bit binary values: (i) © UCLES 2018 K E Y 01001011 01000101 01011001 Convert the three 8-bit binary values into hexadecimal. 01001011 ............................................... 01000101 ............................................... 01011001 ............................................... 0478/12/O/N/18 [3] 3 (ii) Give three other uses of hexadecimal notation in computer science. 1 ......................................................................................................................................... 2 ......................................................................................................................................... 3 ......................................................................................................................................... [3] (iii) State two benefits of using hexadecimal notation to represent binary values. Benefit 1 ............................................................................................................................ ........................................................................................................................................... Benefit 2 ............................................................................................................................ ........................................................................................................................................... [2] 2 A computer uses RAM and ROM to store data. (a) The table contains three statements about RAM or ROM. Tick (✓) to show whether each statement describes RAM or ROM. Statement RAM (✓) ROM (✓) Stores the programs and data that are currently in use Used to boot up the computer when power is turned on Contents are retained when power is turned off [3] (b) Circle the storage category that includes both RAM and ROM. Primary Secondary Off-line [1] (c) Explain what is meant by off-line storage. ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ...............................................................................................................................................[2] © UCLES 2018 0478/12/O/N/18 [Turn over 4 3 A greenhouse uses a system to monitor the conditions that plants need to grow. The inputs to the system are: Binary value Input W T H Condition 1 Window is open 0 Window is closed 1 Temperature >=26 °C 0 Temperature <26 °C 1 Humidity >=50% 0 Humidity <50% The system will sound an alarm when certain conditions are detected. Alarm (X) will sound (=1) when: window is closed and temperature >=26 °C or temperature <26 °C and humidity >=50% Draw a logic circuit to represent the system. W T X H [5] © UCLES 2018 0478/12/O/N/18 5 4 (a) Identify three security issues that can put a computer system at risk. Security issue 1 ........................................................................................................................ Security issue 2 ........................................................................................................................ Security issue 3 ........................................................................................................................ [3] (b) Explain how a firewall can help to protect a computer system from security issues. ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ...............................................................................................................................................[4] 5 (a) Karina is taking her Computer Science examination. She has three questions to answer about output devices. (i) For the first question she writes the answer: “It is a high powered laser that cuts materials such as thin metals or wood.” Identify the output device that Karina is describing. .......................................................................................................................................[1] (ii) For the second question she writes the answer: “The screen is made up of blocks of red, green and blue pixels. The screen uses layers of different types of liquid.” Identify the output device that Karina is describing. .......................................................................................................................................[1] (iii) For the third question she writes the answer: “It is responsible for powering and moving a motor in machinery, such as a robot arm in a factory.” Identify the output device that Karina is describing. .......................................................................................................................................[1] © UCLES 2018 0478/12/O/N/18 [Turn over 6 (b) Karina correctly answers another examination question about some more output devices. Five different terms have been removed from her answer. Complete the sentences in Karina’s answer, using the list given. Not all terms in the list need to be used. • • • • • • • • • • 3D digital light projector inkjet interactive whiteboard laser rotating scanning sliding speaker thermal bubble An ................................................................................................... allows a user to write on a surface using a pen, the text and drawings can then be captured and stored for later use. An ................................................................................................... printer produces a hard copy of a document using ................................................................................................... and piezoelectric technology. A ................................................................................................... printer uses a .............................................................................................. drum, and positive and negative charges, to produce a hard copy of a document. © UCLES 2018 0478/12/O/N/18 [5] 7 6 (a) Many programmers write computer programs in high-level languages. The programs need to be translated into machine code to be read by the computer. State two types of translator that can be used. Translator 1 ............................................................................................................................... Translator 2 ............................................................................................................................... [2] (b) Explain two reasons why a computer programmer may choose to write a program in a highlevel language, rather than a low-level language. Reason 1 .................................................................................................................................. ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... Reason 2 .................................................................................................................................. ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... [4] (c) Three examples of computer code are given in the table. Tick (✓) to show whether each example of computer code is High-level language, Assembly language or Machine code. Computer code High-level language (✓) Assembly language (✓) Machine code (✓) 10110111 11001100 01011100 FOR X = 1 TO 10 PRINT X NEXT X INP X STA X LDA Y © UCLES 2018 [3] 0478/12/O/N/18 [Turn over 8 7 Six internet terms and six definitions are listed. Draw a line to connect each term to a correct definition. Internet term Definition Browser A program that allows a user to view webpages Internet Service Provider (ISP) The main protocol that governs the transmission of data using the Internet Hyper Text Transfer Protocol (HTTP) The website address that is typed into the address bar Uniform Resource Locator (URL) An address given to each device on a network. It is provided by the network MAC address A unique address given to a device on a network. It is provided by the manufacturer IP address A company that provides a connection to access the Internet [5] 8 Describe the purpose of an interrupt in a computer system. .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... ......................................................................................................................................................[4] © UCLES 2018 0478/12/O/N/18 9 9 (a) Computers can transmit data using different methods. Describe the three data transmission methods given. (i) Serial data transmission ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... .......................................................................................................................................[2] (ii) Parallel data transmission ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... .......................................................................................................................................[2] (iii) Duplex data transmission ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... .......................................................................................................................................[2] © UCLES 2018 0478/12/O/N/18 [Turn over 10 (b) Data can sometimes be corrupted when it is transmitted from one computer to another, causing errors to be present in the data. Identify and describe three methods of error detection that could be used to see if an error has occurred. Error detection method 1 .......................................................................................................... Description ................................................................................................................................ ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... Error detection method 2 .......................................................................................................... Description ................................................................................................................................ ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... Error detection method 3 .......................................................................................................... Description ................................................................................................................................. ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... [9] © UCLES 2018 0478/12/O/N/18 11 10 A system uses pH sensors and a microprocessor to help monitor pollution in a river. The pH of the water should be between 6 and 8. The system outputs an alert if the pH of the water is not in this range. Explain how the system uses the pH sensors and the microprocessor to help monitor the pollution. .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... ......................................................................................................................................................[5] © UCLES 2018 0478/12/O/N/18 12 BLANK PAGE Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will be pleased to make amends at the earliest possible opportunity. To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after the live examination series. Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge. © UCLES 2018 0478/12/O/N/18 Cambridge Assessment International Education Cambridge International General Certificate of Secondary Education COMPUTER SCIENCE 0478/12 Paper 1 October/November 2018 MARK SCHEME Maximum Mark: 75 Published This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the details of the discussions that took place at an Examiners’ meeting before marking began, which would have considered the acceptability of alternative answers. Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for Teachers. Cambridge International will not enter into discussions about these mark schemes. Cambridge International is publishing the mark schemes for the October/November 2018 series for most Cambridge IGCSE™, Cambridge International A and AS Level components and some Cambridge O Level components. This syllabus is approved for use in England, Wales and Northern Ireland as a Cambridge International Level 1/Level 2 Certificate. This document consists of 12 printed pages. © UCLES 2018 [Turn over 0478/12 Cambridge IGCSE – Mark Scheme PUBLISHED Generic Marking Principles October/November 2018 These general marking principles must be applied by all examiners when marking candidate answers. They should be applied alongside the specific content of the mark scheme or generic level descriptors for a question. Each question paper and mark scheme will also comply with these marking principles. GENERIC MARKING PRINCIPLE 1: Marks must be awarded in line with: • • • the specific content of the mark scheme or the generic level descriptors for the question the specific skills defined in the mark scheme or in the generic level descriptors for the question the standard of response required by a candidate as exemplified by the standardisation scripts. GENERIC MARKING PRINCIPLE 2: Marks awarded are always whole marks (not half marks, or other fractions). GENERIC MARKING PRINCIPLE 3: Marks must be awarded positively: • • • • • marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit is given for valid answers which go beyond the scope of the syllabus and mark scheme, referring to your Team Leader as appropriate marks are awarded when candidates clearly demonstrate what they know and can do marks are not deducted for errors marks are not deducted for omissions answers should only be judged on the quality of spelling, punctuation and grammar when these features are specifically assessed by the question as indicated by the mark scheme. The meaning, however, should be unambiguous. GENERIC MARKING PRINCIPLE 4: Rules must be applied consistently e.g. in situations where candidates have not followed instructions or in the application of generic level descriptors. © UCLES 2018 Page 2 of 12 0478/12 Cambridge IGCSE – Mark Scheme PUBLISHED October/November 2018 GENERIC MARKING PRINCIPLE 5: Marks should be awarded using the full range of marks defined in the mark scheme for the question (however; the use of the full mark range may be limited according to the quality of the candidate responses seen). GENERIC MARKING PRINCIPLE 6: Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should not be awarded with grade thresholds or grade descriptors in mind. © UCLES 2018 Page 3 of 12 0478/12 Cambridge IGCSE – Mark Scheme PUBLISHED Question 1(a) Answer 1 mark for each correct 8-bit binary number October/November 2018 Marks 3 66 0 1 0 0 0 0 1 0 85 0 1 0 1 0 1 0 1 83 0 1 0 1 0 0 1 1 1(b)(i) 1 mark for each correct hexadecimal number 4B 45 59 3 1(b)(ii) Three from: • (HTML) colour codes • Error messages • MAC addresses • IP addresses • Assembly language • Memory dump • Locations in memory 3 1(b)(iii) Two from: • Easier to read/write/understand (for humans) • Easier to remember (for humans) • Short way to represent binary // Uses less screen/display space • Fewer errors made (in data transcription) • Easier to debug (for humans) 2 © UCLES 2018 Page 4 of 12 0478/12 Cambridge IGCSE – Mark Scheme PUBLISHED Question 2(a) October/November 2018 Answer Marks 1 mark for each correct tick (9) 3 Statement Stores the programs and data that are currently in use RAM (9) ROM (9) 9 Used to boot up the computer when power is turned on 9 Contents are retained when power is turned off 9 2(b) Primary 1 2(c) Two from: • Non-volatile storage • Storage that can be disconnected/removed from the computer • Any suitable example • Must be (physically) connected to computer to obtain stored data • Used to store files as a backup 2 © UCLES 2018 Page 5 of 12 0478/12 Cambridge IGCSE – Mark Scheme PUBLISHED Question 3 © UCLES 2018 Answer 1 mark for each correct logic gate, with correct inputs. October/November 2018 Marks 5 Page 6 of 12 0478/12 Cambridge IGCSE – Mark Scheme PUBLISHED Question Answer October/November 2018 Marks 4(a) Three from: • Malware • Virus // No antivirus • Denial of service • Spyware // No antispyware • Phishing // opening unknown links/emails • Pharming // opening unknown links/emails (only award once for this alternative) • Hacking/cracking/unauthorised access // No/weak password // No/weak firewall • Downloading/Using unknown software • Not updating software • Physical issue e.g. computer/door left unlocked 3 4(b) Four from: • It examines/monitors/filters traffic into and out of a computer • It allows a user to set criteria/rules for the traffic • It checks whether the traffic meets the criteria/rules • It blocks any traffic that does not meet the criteria/rules // Blocks unauthorised access • It warns a user of any unauthorised software/access/unauthorised outgoing traffic • It keeps a log of all traffic (that can be examined) 4 Question Answer Marks 5(a)(i) 2D/3D cutter 1 5(a)(ii) Liquid crystal display // LCD 1 5(a)(iii) Actuator 1 1 mark for each correct missing word, in the given order: • interactive whiteboard • inkjet • thermal bubble • laser • rotating 5 5(b) © UCLES 2018 Page 7 of 12 0478/12 Cambridge IGCSE – Mark Scheme PUBLISHED Question 6(a) 6(b) © UCLES 2018 Answer • • October/November 2018 Marks 2 Compiler Interpreter Four from: • Closer to human language/English « • « so it is easier/quicker to read/write/understand • « so it is easier/quicker to debug the program • « therefore, less likely to make errors • • • The program can be used on many different platforms « « because it is written in source code « because it is compiled into object code • • They have built-in functions/libraries « « this saves time when writing the program • • Do not need to manipulate memory addresses directly « « therefore, specialist knowledge of this is not required • • Only need to learn a single language « « as this can be used on many different computers Page 8 of 12 4 0478/12 Cambridge IGCSE – Mark Scheme PUBLISHED Question 6(c) October/November 2018 Answer Marks 1 mark for each correct tick (9) Computer code 3 High-level language (9) Assembly language (9) 10110111 11001100 01011100 FOR X = 1 TO 10 PRINT X NEXT X 9 9 INP X STA X LDA Y © UCLES 2018 Machine code (9) 9 Page 9 of 12 0478/12 Cambridge IGCSE – Mark Scheme PUBLISHED Question 7 Answer 1 mark for each correct line (to a maximum of 5) Browser © UCLES 2018 October/November 2018 Marks 5 A program that allows a user to view webpages Internet Service Provider (ISP) The main protocol that governs the transmission of data using the Internet Hypertext Transfer Protocol (HTTP) The website address that is typed into the address bar Uniform Resource Locator (URL) An address given to each device on a network. It is provided by the network MAC address A unique address given to a device on a network. It is provided by the manufacturer IP address A company that provides a connection to access the Internet Page 10 of 12 0478/12 Cambridge IGCSE – Mark Scheme PUBLISHED Question 8 Answer Four from: • Used to attend to certain tasks/issues • Used to make sure that vital tasks are dealt with immediately • The interrupt/signal tells the CPU/processor (that its attention is required) • A signal that can be sent from a device (attached to the computer) • A signal that can be sent from software (installed on the computer) • The interrupt will cause the OS/current process to pause • The OS/CPU/ISR will service/handle the interrupt • They have different levels of priority • After the interrupt is serviced, the (previous) process is continued • It enables multi-tasking to be carried out on a computer • A valid example of an interrupt e.g. ‘out of paper’ message for a printer Question Answer October/November 2018 Marks 4 Marks 9(a)(i) Two from: • Data is transmitted one bit at a time • Data is transmitted using a single wire • Bits arrive in order/sequence 2 9(a)(ii) Two from: • Data is transmitted multiple bits at a time/simultaneously • Data is transmitted using multiple wires • Bits may arrive out of sequence/skewed (and are reordered) 2 9(a)(iii) 1 mark for each: • Data is transmitted in both directions • « at the same time/simultaneously 2 © UCLES 2018 Page 11 of 12 0478/12 Cambridge IGCSE – Mark Scheme PUBLISHED Question 9(b) October/November 2018 Answer Maximum of three marks per error detection method. 1 mark for naming the method, 2 marks for describing it. Parity (check) • Odd or even parity can be used • Bits are added together // 1 bits are counted • Parity bit added (depending on parity set) • Parity checked on receipt • If parity bit is incorrect an error is detected Marks 9 Checksum • Calculation performed on data (to get the checksum) • Checksum sent with data • Checksum recalculated after transmission • Comparison made between checksum before and checksum after transmission • Error detected if checksums are different Automatic repeat request (ARQ) • Uses acknowledgement and timeout • Request is sent (with data) requiring acknowledgement • If no response/acknowledgment within certain time frame data package is resent • When data received contains an error a request is sent (automatically) to resend the data • The resend request is repeatedly sent until packet is received error free/limit is reached/acknowledgement received Question 10 © UCLES 2018 Answer Five from: • The sensor sends data to the microprocessor • The analogue data is converted to digital (using ADC) • The microprocessor compares the reading to the set range/stored values/stored data (6 to 8) « – « If the reading is >8 or <6 / outside range « o « the microprocessor sends a signal to output the alert • The process is continuous/repeated Page 12 of 12 Marks 5 Cambridge International Examinations Cambridge International General Certificate of Secondary Education * 9 6 3 2 1 2 6 1 4 9 * 0478/13 COMPUTER SCIENCE October/November 2018 Paper 1 Theory 1 hour 45 minutes Candidates answer on the Question Paper. No Additional Materials are required. No calculators allowed. READ THESE INSTRUCTIONS FIRST Write your Centre number, candidate number and name in the spaces at the top of this page. Write in dark blue or black pen. You may use an HB pencil for any diagrams, graphs or rough working. Do not use staples, paper clips, glue or correction fluid. DO NOT WRITE IN ANY BARCODES. Answer all questions. No marks will be awarded for using brand names of software packages or hardware. Any businesses described in this paper are entirely fictitious. At the end of the examination, fasten all your work securely together. The number of marks is given in brackets [ ] at the end of each question or part question. The maximum number of marks is 75. This syllabus is approved for use in England, Wales and Northern Ireland as a Cambridge International Level 1/Level 2 Certificate. This document consists of 11 printed pages and 1 blank page. DC (KN/SW) 150225/2 © UCLES 2018 [Turn over 2 1 There are six output devices and six descriptions shown. Draw a line to connect each output device to the most appropriate description. Device Description Uses a high-intensity beam of light shone through three layers of changing pixels Laser Printer Uses millions of micro mirrors to reflect light through a lens LCD Projector Digital Light Projector (DLP) Uses plastic, resin or powdered metal to generate a physical output Inkjet Printer Uses a static electric charge on a rotating drum to generate a physical output 3D Printer Uses liquid ink to generate a physical output 2D Cutter Uses a high-power laser to generate a physical output [5] © UCLES 2018 0478/13/O/N/18 3 2 Parity checks and Automatic Repeat reQuests (ARQ) can be used to check for errors during data transmission and storage. (a) A system uses even parity. Write the appropriate parity bit for each byte. Parity Bit 1 0 1 0 0 1 1 1 0 1 1 1 1 1 1 0 1 0 0 0 1 [2] (b) Explain how Automatic Repeat reQuests (ARQ) are used in data transmission and storage. ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ...............................................................................................................................................[2] (c) State one other method that could be used to check for transmission errors. ...............................................................................................................................................[1] 3 An elevator (lift) has a maximum weight limit of 2400 kg. The weight carried is monitored by a sensor and a microprocessor. Describe how the sensor and the microprocessor are used to make sure the maximum weight limit is not exceeded. .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... ......................................................................................................................................................[6] © UCLES 2018 0478/13/O/N/18 [Turn over 4 4 The MAC address of a device is represented using hexadecimal. A section of a MAC address is shown. Each pair of hexadecimal digits is stored using 8-bit binary. (a) Complete the table to show the 8-bit binary equivalents for the section of MAC address. The first number has already been converted. 6A FF 08 93 01101010 [3] (b) Explain why data is stored as binary in computers. ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ...............................................................................................................................................[2] 5 Data can be transferred using half-duplex serial transmission. (a) Describe serial transmission. ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ...............................................................................................................................................[2] (b) Give one application of serial data transmission. ................................................................................................................................................... ...............................................................................................................................................[1] (c) Describe half-duplex data transmission. ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ...............................................................................................................................................[2] © UCLES 2018 0478/13/O/N/18 5 6 Sarah stores data electronically. Describe three methods that she could use to avoid loss of stored data. Method 1 .......................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... Method 2 .......................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... Method 3 .......................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... [6] © UCLES 2018 0478/13/O/N/18 [Turn over 6 7 David is writing a program using a high-level language. The program will be published and sold for profit. (a) David uses an interpreter when creating the computer program. State three features of an interpreter. Feature 1 .................................................................................................................................. ................................................................................................................................................... Feature 2 .................................................................................................................................. ................................................................................................................................................... Feature 3 .................................................................................................................................. ................................................................................................................................................... [3] (b) David compiles the program when he has completed it. Explain two benefits of compiling the program. Benefit 1 ................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... Benefit 2 ................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... [4] © UCLES 2018 0478/13/O/N/18 7 (c) David needs to send a large section of the programming code as an email attachment. He uses lossless compression to reduce the file size. Explain how the file size is reduced. ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ...............................................................................................................................................[3] © UCLES 2018 0478/13/O/N/18 [Turn over 8 8 Alice enters a URL into a web browser to access a webpage. (a) State what URL represents. U ........................................... R ........................................... L ........................................... [1] (b) Explain how the web browser uses the URL to access the webpage. ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ...............................................................................................................................................[4] 9 Describe two differences between Read Only Memory (ROM) and Random Access Memory (RAM). Difference 1 ....................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... Difference 2 ...................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... [4] © UCLES 2018 0478/13/O/N/18 9 10 A logic circuit is shown: A X B C (a) Complete the truth table for the given logic circuit. A B C 0 0 0 0 0 1 0 1 0 0 1 1 1 0 0 1 0 1 1 1 0 1 1 1 Working space X [4] © UCLES 2018 0478/13/O/N/18 [Turn over 10 (b) Draw a logic circuit corresponding to the logic statement: X = 1 if ((A is 1 AND B is 1) AND (A is 1 OR C is NOT 1)) OR (B is 1 AND C is NOT 1) A B X C [6] 11 The fetch-execute cycle make use of registers. (a) Describe the role of the Program Counter (PC). ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ...............................................................................................................................................[2] (b) Describe the role of the Memory Data Register (MDR). ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ...............................................................................................................................................[2] © UCLES 2018 0478/13/O/N/18 11 12 Explain the difference between a Musical Instrument Digital Interface (MIDI) file and a MP3 file. .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... ......................................................................................................................................................[4] 13 State which types of storage device or media would be most suitable for these scenarios. For each device or media, justify your choice. (a) Creating a backup of 150 GB of data. ................................................................................................................................................... Justification ............................................................................................................................... ................................................................................................................................................... [2] (b) Storing applications on a tablet device. ................................................................................................................................................... Justification ............................................................................................................................... ................................................................................................................................................... [2] (c) Storing a 1200 MB high-definition promotional movie about a new car. The movie is to be given to people who are interested in buying a new car. ................................................................................................................................................... Justification ............................................................................................................................... ................................................................................................................................................... [2] © UCLES 2018 0478/13/O/N/18 12 BLANK PAGE Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will be pleased to make amends at the earliest possible opportunity. To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after the live examination series. Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge. © UCLES 2018 0478/13/O/N/18 Cambridge Assessment International Education Cambridge International General Certificate of Secondary Education COMPUTER SCIENCE 0478/13 Paper 1 October/November 2018 MARK SCHEME Maximum Mark: 75 Published This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the details of the discussions that took place at an Examiners’ meeting before marking began, which would have considered the acceptability of alternative answers. Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for Teachers. Cambridge International will not enter into discussions about these mark schemes. Cambridge International is publishing the mark schemes for the October/November 2018 series for most Cambridge IGCSE™, Cambridge International A and AS Level components and some Cambridge O Level components. This syllabus is approved for use in England, Wales and Northern Ireland as a Cambridge International Level 1/Level 2 Certificate. This document consists of 13 printed pages. © UCLES 2018 [Turn over 0478/13 Cambridge IGCSE – Mark Scheme PUBLISHED Generic Marking Principles October/November 2018 These general marking principles must be applied by all examiners when marking candidate answers. They should be applied alongside the specific content of the mark scheme or generic level descriptors for a question. Each question paper and mark scheme will also comply with these marking principles. GENERIC MARKING PRINCIPLE 1: Marks must be awarded in line with: • • • the specific content of the mark scheme or the generic level descriptors for the question the specific skills defined in the mark scheme or in the generic level descriptors for the question the standard of response required by a candidate as exemplified by the standardisation scripts. GENERIC MARKING PRINCIPLE 2: Marks awarded are always whole marks (not half marks, or other fractions). GENERIC MARKING PRINCIPLE 3: Marks must be awarded positively: • • • • • marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit is given for valid answers which go beyond the scope of the syllabus and mark scheme, referring to your Team Leader as appropriate marks are awarded when candidates clearly demonstrate what they know and can do marks are not deducted for errors marks are not deducted for omissions answers should only be judged on the quality of spelling, punctuation and grammar when these features are specifically assessed by the question as indicated by the mark scheme. The meaning, however, should be unambiguous. GENERIC MARKING PRINCIPLE 4: Rules must be applied consistently e.g. in situations where candidates have not followed instructions or in the application of generic level descriptors. © UCLES 2018 Page 2 of 13 0478/13 Cambridge IGCSE – Mark Scheme PUBLISHED October/November 2018 GENERIC MARKING PRINCIPLE 5: Marks should be awarded using the full range of marks defined in the mark scheme for the question (however; the use of the full mark range may be limited according to the quality of the candidate responses seen). GENERIC MARKING PRINCIPLE 6: Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should not be awarded with grade thresholds or grade descriptors in mind. © UCLES 2018 Page 3 of 13 0478/13 Cambridge IGCSE – Mark Scheme PUBLISHED Question 1 Answer Marks 1 mark for each correct line, maximum 5 marks 5 Device Description Laser Printer Uses a high-intensity beam of light shone through three layers of changing pixels LCD Projector © UCLES 2018 October/November 2018 Uses millions of micro mirrors to reflect light through a lens Digital Light Projector (DLP) Uses plastic, resin or powdered metal to generate a physical output Inkjet Printer Uses a static electric charge on a rotating drum to generate a physical output 3D Printer Uses liquid ink to generate a physical output 2D Cutter Uses a high-power laser to generate a physical output Page 4 of 13 0478/13 Cambridge IGCSE – Mark Scheme PUBLISHED Question 2(a) October/November 2018 Answer Marks 2 marks for 3 correct bits, 1 mark for 2 correct bits 2 Parity Bit 0 1 0 1 0 0 1 1 0 1 0 1 1 1 1 1 1 1 0 1 0 0 0 1 2(b) Two from: • Set of rules for controlling error checking/detection // it’s an error detection method // used to detect errors • Uses acknowledgement and timeout • Request is sent (with data) requiring acknowledgement • If no response/acknowledgment within certain time frame data package is resent • When data received contains an error a request is sent (automatically) to resend the data • The resend request is repeatedly sent until packet is received error free/limit is reached/acknowledgement received 2 2(c) Checksum 1 Question 3 © UCLES 2018 Answer Six from: • A pressure sensor is used • The sensor sends data/signals to the microprocessor • Data is converted to digital format • Microprocessor compares data value against set value • If value <= 2400 Kg/under weight limit lift is permitted to operate • If value > 2400 Kg/over weight limit signal is sent from the microprocessor to deliver warning message to passengers • If value > 2400 Kg signal is sent from the microprocessor to lift mechanism to stop lift operating • Weight continuously monitored Page 5 of 13 Marks 6 0478/13 Cambridge IGCSE – Mark Scheme PUBLISHED Question 4(a) Answer • • 3 11111111 5(b) 5(c) © UCLES 2018 00001000 Answer • • Marks 2 Bits sent one at a time Uses a single wire USB / SATA / Wifi /PCI Express / Any appropriate serial device • • 10010011 2 Computers use switches / logic gates Only uses 2 states / On or Off / 1 or 0 Question 5(a) Marks 1 mark for each correct conversion 01101010 4(b) October/November 2018 1 2 Data is transferred in two directions Data is sent in only one direction at a time Page 6 of 13 0478/13 Cambridge IGCSE – Mark Scheme PUBLISHED Question 6 Answer 1 mark for method name, 1 mark for description e.g. Marks 6 Backups • Make a copy of the data • Copy stored away from main computer • Data can be restored from backup Anti-virus • Scans computer for viruses • Software to detect/remove viruses • Can prevent data being corrupted by viruses Firewall • Hardware or software that monitors network traffic • To help prevent hackers gaining access / deleting data Password/Biometrics • To help protect files / computer from unauthorised access Restricted access • To stop users downloading/installing software that could harm Verification • Message e.g. to ask if definitely want to delete Physical methods • Locks/alarms/CCTV to alert/deter unauthorised access © UCLES 2018 October/November 2018 Page 7 of 13 0478/13 Cambridge IGCSE – Mark Scheme PUBLISHED Question Answer October/November 2018 Marks 7(a) Three from: • It is a translator • Translates (high level language) to low level language • Executes one line at a time • Translates source code line by line • Runs error diagnostic • Produces error messages to tell user location of error • Stops execution when encounters errors • Continues translating when an error is fixed 3 7(b) Four from (Max three per benefit): 4 7(c) © UCLES 2018 • • • Produces executable file this creates a smaller file size more saleable • • Program will be machine independent / portable this means it can be used on any hardware • • • No need for compiler to run executable file this means it will be quicker to run customers can just execute the program • • Source code cannot be accessed therefore, code cannot be stolen / plagiarised Three from: • Uses compression algorithm / by example e.g. RLE • Repeating words / phrases / patterns identified • replaced with value • File / dictionary / index of phrases created • Index will store word/phrase with value Page 8 of 13 3 0478/13 Cambridge IGCSE – Mark Scheme PUBLISHED Question Answer October/November 2018 Marks 8(a) Uniform Resource Locator 1 8(b) Four from: • The web browser sends URL to DNS • DNS stores an index of URL and matching IP address • DNS searches for URL to obtain the IP address • IP address sent to web browser, (if found) • Web browser sends request to IP of webserver • Webserver sends web page to web browser • Web browser interprets HTML to display web page • If URL not found DNS returns error 4 Question 9 © UCLES 2018 Answer Four from: • • ROM is permanent RAM is temporary • • ROM is non-volatile RAM is volatile • • ROM is read only RAM can have read/write operations • • ROM holds instructions for boot up RAM holds files / instructions in use Marks 4 Page 9 of 13 0478/13 Cambridge IGCSE – Mark Scheme PUBLISHED Question 10(a) © UCLES 2018 Answer October/November 2018 Marks 4 marks for 8 correct outputs 3 marks for 6 or 7 correct outputs 2 marks for 4 or 5 correct outputs 1 mark for 2 or 3 correct outputs 4 A B C X 0 0 0 0 0 0 1 0 0 1 0 1 0 1 1 1 1 0 0 0 1 0 1 1 1 1 0 0 1 1 1 0 Page 10 of 13 0478/13 Cambridge IGCSE – Mark Scheme PUBLISHED Question 10(b) Answer 1 mark per correct gate with correct inputs. Question October/November 2018 Marks 6 Answer Marks 11(a) • • Holds address of next/current instruction to be fetched/processed/executed 2 11(b) • • Stores data/instruction that is in use « from address in MAR 2 © UCLES 2018 Page 11 of 13 0478/13 Cambridge IGCSE – Mark Scheme PUBLISHED Question 12 Answer Four from (Max three from each): MP3 • Digital recording of sound • Produced by recording software / microphone • Used when distributing sound files • Compressed file format MIDI • • • • • • © UCLES 2018 Marks 4 Instructions of how to make sound Non-audio recording File created using digital musical instruments Produced by synthesizer Used when composing music Individual notes/instruments can be changed Question 13(a) October/November 2018 Answer 1 mark for storage, 1 mark for justification Marks 2 • External/Removable HDD // External/Removable SSD // Large capacity USB Flash Drive • • • Backups must be stored separately Will hold sufficient data Faster write abilities (SSD/USB drive only) Page 12 of 13 0478/13 Cambridge IGCSE – Mark Scheme PUBLISHED Question 13(b) 13(c) © UCLES 2018 Answer 1 mark for storage, 1 mark for justification • SSD // SD card // Flash memory • • • • • • Small physical size Lightweight Low heat production Low power consumption It’s quiet Fast read/write times October/November 2018 Marks 2 1 mark for storage, 1 mark for justification 2 • DVD // Blu-ray // USB Flash Drive // SD card • • • • Easy to distribute Small in size Cheap to buy Universal storage therefore compatible with many devices Page 13 of 13 www.dynamicpapers.com Cambridge Assessment International Education Cambridge International General Certificate of Secondary Education * 6 6 7 7 5 3 2 7 6 4 * 0478/12 COMPUTER SCIENCE February/March 2019 Paper 1 Theory 1 hour 45 minutes Candidates answer on the Question Paper. No Additional Materials are required. No calculators allowed. READ THESE INSTRUCTIONS FIRST Write your centre number, candidate number and name in the spaces at the top of this page. Write in dark blue or black pen. You may use an HB pencil for any diagrams, graphs or rough working. Do not use staples, paper clips, glue or correction fluid. DO NOT WRITE IN ANY BARCODES. Answer all questions. No marks will be awarded for using brand names of software packages or hardware. Any businesses described in this paper are entirely fictitious. At the end of the examination, fasten all your work securely together. The number of marks is given in brackets [ ] at the end of each question or part question. The maximum number of marks is 75. This syllabus is regulated for use in England, Wales and Northern Ireland as a Cambridge International Level 1/Level 2 Certificate. This document consists of 11 printed pages and 1 blank page. DC (KN/FC) 168931/3 © UCLES 2019 [Turn over 2 1 www.dynamicpapers.com (a) Elle has a file stored on her computer that is 20 MB in size. Jordan has a file that is 10 GB in size. Tick (3) to show which is the larger file. File size Tick (3) 20 MB 10 GB [1] (b) Bob has a file stored on his computer that is 3500 kB in size. Gerty has a file that is 3 MB in size. Tick (3) to show which is the larger file. File size Tick (3) 3500 kB 3 MB [1] 2 Many computer systems have an input device and an output device. (a) (i) State what is meant by an input device. ........................................................................................................................................... ..................................................................................................................................... [1] (ii) Give an example of an input device. ..................................................................................................................................... [1] (b) (i) State what is meant by an output device. ........................................................................................................................................... ..................................................................................................................................... [1] (ii) Give an example of an output device. ..................................................................................................................................... [1] © UCLES 2019 0478/12/F/M/19 www.dynamicpapers.com 3 3 (a) A long distance running race uses an electronic counter that counts each competitor who finishes the race. The count is stored as binary in a 12-bit register. A denary value of the count is displayed on a screen above the finish line. (i) The screen currently displays: 0 0 3 9 State the binary value that is currently stored to display the count shown. ........................................................................................................................................... ..................................................................................................................................... [2] (ii) More competitors cross the finish line and the screen now displays: 0 3 5 0 State the binary value that is currently stored to display the count shown. ........................................................................................................................................... ..................................................................................................................................... [2] (iii) At the end of the race the binary value stored is: 011011000111 Give the denary value that would be displayed on the screen at the end of the race. Show your working. ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... Screen display: [2] © UCLES 2019 0478/12/F/M/19 [Turn over 4 www.dynamicpapers.com (b) Sensors are used at the finish line to identify the number of competitors who finish the race. (i) Identify two different sensors that could be used to identify the number of competitors. Sensor 1 ............................................................................................................................. Sensor 2 ............................................................................................................................. [2] (ii) The sensors are used with a microprocessor to count how many competitors finish the race. Explain how the sensor and the microprocessor are used. ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... ..................................................................................................................................... [6] © UCLES 2019 0478/12/F/M/19 5 4 www.dynamicpapers.com Darius is writing a computer program that allows binary values to be calculated. Darius chooses to write the program in a high-level language rather than a low-level language. (a) Explain why Darius chooses to write the program in a high-level language. ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ............................................................................................................................................. [2] (b) Darius will use a translator to translate the program. He could use a compiler or an interpreter. Five statements are given about compilers and interpreters. Tick (3) to show if the statement applies to a Compiler or an Interpreter. Statements may apply to both. Compiler (3) Statement Interpreter (3) A report of errors is produced at the end of translation. The program is translated one line at a time. The program is translated from high-level language into machine code. An executable file is produced. The program will not run at all if an error is detected. [5] © UCLES 2019 0478/12/F/M/19 [Turn over 6 www.dynamicpapers.com Darius is sending several programs that he has created to his friend Selma. (c) He wants to compress the files to send them as he needs to attach them to an email. Darius tells Selma he is going to use lossy compression. Selma tells him that he should use lossless instead. Explain why Selma tells Darius to use lossless compression instead of lossy. ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ............................................................................................................................................. [4] (d) Errors can occur when data is transmitted, stored or entered into a system. Darius could use an error detection method to find whether errors have occurred. One error detection method he could use is a checksum. (i) Describe how a checksum detects errors. ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... ..................................................................................................................................... [5] © UCLES 2019 0478/12/F/M/19 7 (ii) www.dynamicpapers.com State three other error detection methods that Darius could use. Method 1 ............................................................................................................................ Method 2 ............................................................................................................................ Method 3 ............................................................................................................................ [3] © UCLES 2019 0478/12/F/M/19 [Turn over 8 5 www.dynamicpapers.com Consider the following logic statement: X = 1 if ((A is 1 NAND C is 1) NOR A is NOT 1) OR (B is 1 AND C is NOT 1) (a) Draw a logic circuit that represents the given logic statement. Your logic gates must have a maximum of two inputs. Do not simplify the logic statement. A B X C [6] (b) Complete the truth table for the given logic statement. A B C 0 0 0 0 0 1 0 1 0 0 1 1 1 0 0 1 0 1 1 1 0 1 1 1 Working space X [4] © UCLES 2019 0478/12/F/M/19 9 6 www.dynamicpapers.com Nadia purchases a printer to print out her homework. She connects the printer to her computer using USB. (a) Explain what is meant by USB. ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ............................................................................................................................................. [3] (b) Nadia’s printer uses powdered toner rather than liquid ink. (i) State the type of printer Nadia has purchased. ..................................................................................................................................... [1] (ii) Give two benefits of using this type of printer. Benefit 1 ............................................................................................................................. ........................................................................................................................................... Benefit 2 ............................................................................................................................. ........................................................................................................................................... [2] (iii) Give one drawback of using this type of printer. Drawback 1 ........................................................................................................................ ..................................................................................................................................... [1] © UCLES 2019 0478/12/F/M/19 [Turn over www.dynamicpapers.com 10 (c) Nadia uses several types of computer storage for her homework and other projects. (i) Five examples of computer storage are given. Tick (3) to show if the computer storage is Primary, Secondary or Off-line. Storage example Primary (3) Secondary (3) Off-line (3) Solid state drive (SSD) Blu-ray disc USB flash memory Random access memory (RAM) Read only memory (ROM) [5] (ii) Nadia is considering purchasing a magnetic storage device. Describe how a magnetic storage device stores data. ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... ..................................................................................................................................... [6] © UCLES 2019 0478/12/F/M/19 11 (iii) www.dynamicpapers.com Give two advantages of using a magnetic storage device rather than a solid state storage device. Advantage 1 ....................................................................................................................... ........................................................................................................................................... Advantage 2 ....................................................................................................................... ........................................................................................................................................... [2] 7 Arya regularly uses the Internet as a research tool for her school projects. Identify and describe three risks to Arya’s computer when she is using the Internet for research. Risk 1 ................................................................................................................................................ Description ........................................................................................................................................ .......................................................................................................................................................... .......................................................................................................................................................... Risk 2 ................................................................................................................................................ Description ........................................................................................................................................ .......................................................................................................................................................... .......................................................................................................................................................... Risk 3 ................................................................................................................................................ Description ........................................................................................................................................ .......................................................................................................................................................... .......................................................................................................................................................... [6] © UCLES 2019 0478/12/F/M/19 12 www.dynamicpapers.com BLANK PAGE Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will be pleased to make amends at the earliest possible opportunity. To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cambridgeinternational.org after the live examination series. Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge. © UCLES 2019 0478/12/F/M/19 www.dynamicpapers.com Cambridge Assessment International Education Cambridge International General Certificate of Secondary Education COMPUTER SCIENCE 0478/12 Paper 1 March 2019 MARK SCHEME Maximum Mark: 50 Published This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the details of the discussions that took place at an Examiners’ meeting before marking began, which would have considered the acceptability of alternative answers. Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for Teachers. Cambridge International will not enter into discussions about these mark schemes. Cambridge International is publishing the mark schemes for the March 2019 series for most Cambridge IGCSE™, Cambridge International A and AS Level components and some Cambridge O Level components. This syllabus is regulated for use in England, Wales and Northern Ireland as a Cambridge International Level 1/Level 2 Certificate. This document consists of 9 printed pages. © UCLES 2019 [Turn over Cambridge IGCSE – Mark Scheme www.dynamicpapers.com PUBLISHED Generic Marking Principles These general marking principles must be applied by all examiners when marking candidate answers. They should be applied alongside the specific content of the mark scheme or generic level descriptors for a question. Each question paper and mark scheme will also comply with these marking principles. GENERIC MARKING PRINCIPLE 1: Marks must be awarded in line with: • • • the specific content of the mark scheme or the generic level descriptors for the question the specific skills defined in the mark scheme or in the generic level descriptors for the question the standard of response required by a candidate as exemplified by the standardisation scripts. GENERIC MARKING PRINCIPLE 2: Marks awarded are always whole marks (not half marks, or other fractions). GENERIC MARKING PRINCIPLE 3: Marks must be awarded positively: • • • • • marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit is given for valid answers which go beyond the scope of the syllabus and mark scheme, referring to your Team Leader as appropriate marks are awarded when candidates clearly demonstrate what they know and can do marks are not deducted for errors marks are not deducted for omissions answers should only be judged on the quality of spelling, punctuation and grammar when these features are specifically assessed by the question as indicated by the mark scheme. The meaning, however, should be unambiguous. GENERIC MARKING PRINCIPLE 4: Rules must be applied consistently e.g. in situations where candidates have not followed instructions or in the application of generic level descriptors. GENERIC MARKING PRINCIPLE 5: Marks should be awarded using the full range of marks defined in the mark scheme for the question (however; the use of the full mark range may be limited according to the quality of the candidate responses seen). GENERIC MARKING PRINCIPLE 6: Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should not be awarded with grade thresholds or grade descriptors in mind. © UCLES 2019 Page 2 of 9 0478/12 March 2019 www.dynamicpapers.com Cambridge IGCSE – Mark Scheme PUBLISHED Question Answer 1(a) File size Marks Tick (9) 1 20 MB 9 10 GB 1(b) File size Tick (9) 1 9 3500 kB 3 MB Question Answer Marks 2(a)(i) − 2(a)(ii) One from e.g.: − Keyboard − Mouse − Microphone − Sensor − Touch screen 1 2(b)(i) − 1 2(b)(ii) One from e.g. : − Monitor − Speaker − Headphones − Printer (A device that allows) data to be entered (into a computer system) (A device that allows the user to) view/hear the data (that has been entered into a computer system) © UCLES 2019 1 1 Page 3 of 9 0478/12 Cambridge IGCSE – Mark Scheme PUBLISHED Question 3(a)(i) Answer − March 2019 www.dynamicpapers.com Marks 2 000000100111 1 mark 1 mark 3(a)(ii) − 2 000101011110 1 mark 1 mark 3(a)(iii) 1 mark for working, 1 mark for correct answer − 1024 + 512 + 128 + 64 + 4 + 2 + 1 − 1735 2 3(b)(i) Two from: − Pressure sensor − Light sensor − Motion sensor − Magnetic field (can be used if competitors are wearing a compatible chip) 2 3(b)(ii) − − − − − − 6 Sensor sends signal to microprocessor Signal is analogue and is converted to digital (using ADC) Data is compared to stored value // Check for signal If data does not match / is out of range/ in range // signal detected counter is incremented by 1 Continuous process © UCLES 2019 Page 4 of 9 0478/12 March 2019 www.dynamicpapers.com Cambridge IGCSE – Mark Scheme PUBLISHED Question Answer Marks 4(a) Two from: − Closer to English statements / human language − Easier / quicker to write / read / understand / remember − Easier / quicker to debug − Less likely to make errors − One line of code can carry out multiple commands − Portable language 2 4(b) 1 mark for correct tick(s) for each statement 5 Statement Compiler Interpreter A report of errors is produced at the end of translation 9 9 The program is translated one line at a time The program is translated from high-level language into machine code 9 An executable file is produced 9 The program will not run at all if an error is detected 9 9 4(c) − − − − Lossy would remove data Lossless does not remove data // No data can be lost Can be restored to original state otherwise will not run / work correctly 4 4(d)(i) − − − − − Sending device creates value from calculation on data // By example Value is transmitted with the data Receiving device performs same calculation Values are compared after transmission // If values do not match an error is detected 5 © UCLES 2019 Page 5 of 9 0478/12 Cambridge IGCSE – Mark Scheme PUBLISHED Question 4d(ii) Answer − − − Marks 3 Parity check Check digit Automatic repeat request Question 5(a) March 2019 www.dynamicpapers.com Answer Marks 1 mark for each correct logic gate with correct input(s) 6 A B X C © UCLES 2019 Page 6 of 9 0478/12 Cambridge IGCSE – Mark Scheme PUBLISHED Question 5(b) Answer 6(b)(i) Marks 4 marks for 8 correct outputs 3 marks for 6/7 correct outputs 2 marks for 4/5 correct outputs 1 mark for 2/3 correct outputs Question 6(a) March 2019 www.dynamicpapers.com 4 A B C Working space 0 0 0 0 0 0 1 0 0 1 0 1 0 1 1 0 1 0 0 0 1 0 1 1 1 1 0 1 1 1 1 1 Answer X Marks Three from: − Universal Serial Bus − Data transmission method − Uses serial transmission // bits of data are sent one at a time − Universal standard // common interface 3 − 1 Laser printer © UCLES 2019 Page 7 of 9 0478/12 March 2019 www.dynamicpapers.com Cambridge IGCSE – Mark Scheme PUBLISHED Question Answer Marks 6(b)(ii) Two from: − Cheaper printing cost per page − It prints at a faster speed − It prints text at a high quality − Colour fast 2 6(b)(iii) One from: − Expensive to purchase printer − Toner is expensive − Print images at a lower quality − Can be quite large in size 1 6(c)(i) 1 mark per each correct tick 5 Storage example Primary Off-line 9 Solid state drive (SSD) © UCLES 2019 Secondary Blu-ray disc 9 USB flash memory 9 Random access memory (RAM) 9 Read only memory (ROM) 9 Page 8 of 9 0478/12 Cambridge IGCSE – Mark Scheme PUBLISHED Question 6(c)(ii) March 2019 www.dynamicpapers.com Answer Six from: − Storage device has platters − Platters/disk divided into tracks − Storage platter / disk is spun − Has a read/write arm that moves across storage media − Read/writes data using electromagnets − Uses magnetic fields to control magnetic dots of data − Magnetic field determines binary value Marks 6 NOTE: Marks can be awarded for an alternative description e.g. magnetic tape 6(c)(iii) − − Magnetic is cheaper per unit of data Magnetic has more longevity // Magnetic can perform more read/write cycles Question 7 Answer For each of three risks Naming the risk – 1 mark, describing the risk – 1 mark: Marks 6 − − − Hacking when a person tries to gain unauthorised access to a computer system data can be deleted/corrupted by hacker − − − Malware a software program designed to damage data / disrupt the computer system replicates itself and fills the hard disk − − Virus a program that replicates itself to damage / delete files NOTE: Multiple kinds of malware can be awarded if listed and given a matching description e.g. trojan horse, worm. © UCLES 2019 2 Page 9 of 9 www.dynamicpapers.com Cambridge Assessment International Education Cambridge International General Certificate of Secondary Education * 8 2 2 6 4 6 8 0 1 1 * 0478/11 COMPUTER SCIENCE May/June 2019 Paper 1 Theory 1 hour 45 minutes Candidates answer on the Question Paper. No Additional Materials are required. No calculators allowed. READ THESE INSTRUCTIONS FIRST Write your centre number, candidate number and name in the spaces at the top of this page. Write in dark blue or black pen. You may use an HB pencil for any diagrams, graphs or rough working. Do not use staples, paper clips, glue or correction fluid. DO NOT WRITE IN ANY BARCODES. Answer all questions. No marks will be awarded for using brand names of software packages or hardware. Any businesses described in this paper are entirely fictitious. At the end of the examination, fasten all your work securely together. The number of marks is given in brackets [ ] at the end of each question or part question. The maximum number of marks is 75. This syllabus is regulated for use in England, Wales and Northern Ireland as a Cambridge International Level 1/Level 2 Certificate. This document consists of 11 printed pages and 1 blank page. DC (LK) 172696/2 © UCLES 2019 [Turn over 2 1 www.dynamicpapers.com Hexadecimal is used for MAC addresses. Part of a MAC address is given: 97 – 5C – E1 Each pair of digits is stored as binary in an 8-bit register. (a) Show what the binary register stores for each pair of the given digits. 97 5C E1 [6] (b) Explain what is meant by a MAC address. ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ............................................................................................................................................. [4] (c) Give two other examples where hexadecimal can be used. Example 1 ................................................................................................................................. ................................................................................................................................................... Example 2 ................................................................................................................................. ................................................................................................................................................... [2] © UCLES 2019 0478/11/M/J/19 3 2 www.dynamicpapers.com Rajesh creates a logic circuit. He uses three different logic gates in his circuit. Each logic gate has a maximum of two inputs. He describes the logic of each gate. (a) “The only time the output will be 1 is when both inputs are 1.” State the single logic gate ................................................... Draw the single logic gate: [2] (b) “The only time the output will be 1 is when both inputs are 0.” State the single logic gate ................................................... Draw the single logic gate: [2] (c) “The only time the output will be 0 is when both inputs are 1.” State the single logic gate ................................................... Draw the single logic gate: [2] © UCLES 2019 0478/11/M/J/19 [Turn over 4 3 www.dynamicpapers.com Five descriptions of different input or output devices are given in the table. Complete the table by stating the name of each input or output device. Description Name of device This is an input device that works by shining a light onto the surface of a document. The light source is automatically moved across the document and the reflected light is captured by mirrors and lenses. This is an input device where a laser or a light source is moved across an object. The width, height and depth of the object are measured to allow a model to be created. This is a large input device that is usually fixed to a wall. A user can calibrate the device to make sure the sensors align with a projected image. The user can use either their finger or a special pen to make selections. ................................................... ................................................... ................................................... This is an output device that uses many small mirrors to reflect light towards a lens. This will display an image. ................................................... This is an output device that creates an object by building layer upon layer of material. ................................................... [5] © UCLES 2019 0478/11/M/J/19 5 4 www.dynamicpapers.com (a) Lola is concerned about the risks to her computer when using the Internet. She wants to use some security methods to help protect her computer from the risks. Identify a security method she could use for each of the following risks. Each security method must be different. Describe how each security method will help protect Lola’s computer. (i) Computer virus Security method ................................................................................................................ Description ........................................................................................................................ ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... [3] (ii) Hacking Security method ................................................................................................................ Description ........................................................................................................................ ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... [3] (iii) Spyware Security method ................................................................................................................ Description ........................................................................................................................ ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... [3] © UCLES 2019 0478/11/M/J/19 [Turn over 6 www.dynamicpapers.com (b) Lola is also concerned that the data she stores could be subject to accidental damage or accidental loss. (i) State three ways that the data Lola stores could be accidentally damaged or accidentally lost. 1 ........................................................................................................................................ ........................................................................................................................................... 2 ........................................................................................................................................ ........................................................................................................................................... 3 ........................................................................................................................................ ........................................................................................................................................... [3] (ii) Give two methods that Lola could use to help keep her data safe from accidental damage or accidental loss. 1 ........................................................................................................................................ ........................................................................................................................................... 2 ........................................................................................................................................ ........................................................................................................................................... [2] © UCLES 2019 0478/11/M/J/19 7 5 www.dynamicpapers.com The following text is stored as a text file: She sells sea shells on the seashore. The shells that she sells are sea shells I am sure. Explain how lossless compression would compress this file. .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .................................................................................................................................................... [5] © UCLES 2019 0478/11/M/J/19 [Turn over 8 6 www.dynamicpapers.com A law company holds a lot of sensitive data about its clients. (a) It currently requires employees to enter a username and a password to log-in to an account. Each password must be 8 letters. The company wants to increase the security of the log-in system. Identify two improvements the company could use to make the log-in system more secure. Explain how each improvement increases security. Improvement 1 .......................................................................................................................... ................................................................................................................................................... Explanation ............................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... Improvement 2 .......................................................................................................................... ................................................................................................................................................... Explanation ............................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... [4] (b) The law company wants to purchase a new file server. The company can purchase a server with either solid state storage or magnetic storage. After discussion, it decides to purchase a file server with magnetic storage. Explain why the company chose magnetic storage rather than solid state storage. ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ............................................................................................................................................. [4] © UCLES 2019 0478/11/M/J/19 9 www.dynamicpapers.com (c) The law company also uses optical storage. Give three different examples of optical storage. 1 ................................................................................................................................................ 2 ................................................................................................................................................ 3 ................................................................................................................................................ [3] 7 Annie writes a paragraph of text as an answer to an examination question about programming languages. Using the list given, complete Annie’s answer by inserting the correct six missing terms. Not all terms will be used. • • • • • • • • • • Assembly Converter Denary Hexadecimal High-level language Low-level language Machine Code Source Code Syntax Translator The structure of language statements in a computer program is called the ....................................................................... . A programming language that uses natural language statements is called a ....................................................................... . When programs are written in this type of language they need a ....................................................................... to convert them into ....................................................................... . A programming language that is written using mnemonic codes is called a ....................................................................... . An example of this type of language is ....................................................................... language. © UCLES 2019 0478/11/M/J/19 [6] [Turn over 10 8 www.dynamicpapers.com An art gallery has a website that is used to display and sell art. (a) The gallery uses Secure Socket Layer (SSL) to provide a secure connection when selling art. Describe the process of SSL and how it provides a secure connection. ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ............................................................................................................................................. [6] (b) The art gallery also uses a firewall. Six statements are given about firewalls. Tick (3) to show if the statement is True or False. Statement True (3) False (3) Firewalls are only available as hardware devices Firewalls allow a user to set rules for network traffic Firewalls will automatically stop all malicious traffic Firewalls only examine traffic entering a network Firewalls encrypt all data that is transmitted around a network Firewalls can be used to block access to certain websites [6] © UCLES 2019 0478/11/M/J/19 11 www.dynamicpapers.com (c) The art gallery is concerned about computer ethics relating to its website. Explain what is meant by computer ethics and why the art gallery is concerned about computer ethics. ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ............................................................................................................................................. [4] © UCLES 2019 0478/11/M/J/19 12 www.dynamicpapers.com BLANK PAGE Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will be pleased to make amends at the earliest possible opportunity. To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cambridgeinternational.org after the live examination series. Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge. © UCLES 2019 0478/11/M/J/19 www.dynamicpapers.com Cambridge Assessment International Education Cambridge International General Certificate of Secondary Education COMPUTER SCIENCE 0478/11 Paper 1 May/June 2019 MARK SCHEME Maximum Mark: 75 Published This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the details of the discussions that took place at an Examiners’ meeting before marking began, which would have considered the acceptability of alternative answers. Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for Teachers. Cambridge International will not enter into discussions about these mark schemes. Cambridge International is publishing the mark schemes for the May/June 2019 series for most Cambridge IGCSE™, Cambridge International A and AS Level and Cambridge Pre-U components, and some Cambridge O Level components. This syllabus is regulated for use in England, Wales and Northern Ireland as a Cambridge International Level 1/Level 2 Certificate. This document consists of 14 printed pages. © UCLES 2019 [Turn over 0478/11 Cambridge IGCSE – Mark Scheme PUBLISHED Generic Marking Principles May/June 2019 www.dynamicpapers.com These general marking principles must be applied by all examiners when marking candidate answers. They should be applied alongside the specific content of the mark scheme or generic level descriptors for a question. Each question paper and mark scheme will also comply with these marking principles. GENERIC MARKING PRINCIPLE 1: Marks must be awarded in line with: • • • the specific content of the mark scheme or the generic level descriptors for the question the specific skills defined in the mark scheme or in the generic level descriptors for the question the standard of response required by a candidate as exemplified by the standardisation scripts. GENERIC MARKING PRINCIPLE 2: Marks awarded are always whole marks (not half marks, or other fractions). GENERIC MARKING PRINCIPLE 3: Marks must be awarded positively: • • • • • marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit is given for valid answers which go beyond the scope of the syllabus and mark scheme, referring to your Team Leader as appropriate marks are awarded when candidates clearly demonstrate what they know and can do marks are not deducted for errors marks are not deducted for omissions answers should only be judged on the quality of spelling, punctuation and grammar when these features are specifically assessed by the question as indicated by the mark scheme. The meaning, however, should be unambiguous. GENERIC MARKING PRINCIPLE 4: Rules must be applied consistently e.g. in situations where candidates have not followed instructions or in the application of generic level descriptors. © UCLES 2019 Page 2 of 14 0478/11 Cambridge IGCSE – Mark Scheme PUBLISHED May/June 2019 www.dynamicpapers.com GENERIC MARKING PRINCIPLE 5: Marks should be awarded using the full range of marks defined in the mark scheme for the question (however; the use of the full mark range may be limited according to the quality of the candidate responses seen). GENERIC MARKING PRINCIPLE 6: Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should not be awarded with grade thresholds or grade descriptors in mind. © UCLES 2019 Page 3 of 14 0478/11 May/June 2019 www.dynamicpapers.com Cambridge IGCSE – Mark Scheme PUBLISHED Question Answer Marks 1(a) 6 97 1 0 0 1 0 1 mark 5C 0 1 1 1 0 1 1 © UCLES 2019 1 1 0 0 0 1 1 mark 1 0 0 1 mark 1(b) 1 1 mark 1 mark E1 1 0 1 mark Four from: • Media Access Control (address) • Used to identify a device • It is a unique (address) • It is a static address // It does not change • It is set by the manufacturer • The first part is the manufacturer ID/number/identifies the manufacturer • The second part is the serial number/ID Page 4 of 14 4 0478/11 Cambridge IGCSE – Mark Scheme PUBLISHED Question 1(c) Answer Two from e.g.: • • • • • • • • Colour codes // Colour in HTML / CSS Error messages Locations in memory Memory dump // debugging IP address ASCII // Unicode Assembly language URL Answer 1 mark for correct name, 1 mark for correct gate symbol − 2(b) © UCLES 2019 Marks 2 AND 1 mark for correct name, 1 mark for correct gate symbol − Marks 2 Question 2(a) May/June 2019 www.dynamicpapers.com NOR Page 5 of 14 2 0478/11 Cambridge IGCSE – Mark Scheme PUBLISHED Question 2(c) Answer 2 NAND Question © UCLES 2019 Marks 1 mark for correct name, 1 mark for correct gate symbol − 3 May/June 2019 www.dynamicpapers.com Answer Marks 1 mark for each correct device 5 Description of input or output device Name of device This is an input device that works by shining a light onto the surface of a document. The light source is automatically moved across the document and the reflected light is captured by mirrors and lenses. 2D Scanner This is an input device where a laser or a light source is moved across an object. The width, height and depth of the object are measured to allow a model to be created. 3D scanner This is a large input device that is usually fixed to a wall. A user can calibrate the device to make sure the sensors align with a projected image. The user can use either their finger or a special pen to make selections. Interactive whiteboard This is an output device that uses many small mirrors to reflect light towards a lens. This will display an image. Projector This is an output device that creates an object by building layer upon layer of material. 3D printer Page 6 of 14 0478/11 Cambridge IGCSE – Mark Scheme PUBLISHED Question 4(a)(i) Answer 1 mark for security method, 2 marks for description Marks 3 Anti-virus (software) // Anti-malware (software) • Scans the computer system (for viruses) • Has a record of known viruses • Removes/quarantines any viruses that are found • Checks data before it is downloaded • « and stops download if virus found/warns user may contain virus Firewall // Proxy server • Monitors traffic coming into and out of the computer system • Checks that the traffic meets any criteria/rules set • Blocks any traffic that does not meet the criteria/rules set // set blacklist/whitelist © UCLES 2019 May/June 2019 www.dynamicpapers.com Page 7 of 14 0478/11 Cambridge IGCSE – Mark Scheme PUBLISHED Question 4(a)(ii) May/June 2019 www.dynamicpapers.com Answer 1 mark for security method, 2 marks for description 3 Firewall // proxy server • Monitors traffic coming into and out of the computer system • Check that the traffic meets any criteria/rules set • Blocks any traffic that does not meet the criteria/rules set // set blacklist/whitelist NOTE: Cannot be awarded if already given in 4(a)(i) Passwords • Making a password stronger // by example • Changing it regularly • Lock out after set number of attempts // stops brute force attacks // makes it more difficult to guess Biometrics • Data needed to enter is unique to individual • « therefore very difficult to replicate • Lock out after set number of attempts Two-step verification // Two-factor authentication • Extra data is sent to device, pre-set by user • « making it more difficult for hacker to obtain it • Data has to be entered into the same system • « so if attempted from a remote location, it will not be accepted © UCLES 2019 Marks Page 8 of 14 0478/11 Cambridge IGCSE – Mark Scheme PUBLISHED Question 4(a)(iii) Answer 1 mark for security method, 2 marks for description May/June 2019 www.dynamicpapers.com Marks 3 Anti-spyware software // Anti-malware (software) • Scans the computer for spyware • Removes/quarantines any spyware that is found • Can prevent spyware being downloaded NOTE: Anti-malware (software) cannot be awarded if already given in 4(a)(i) Drop-down boxes // onscreen/virtual keyboard • Means key logger cannot collect data // key presses cannot be recorded • « and relay it to third party Two-step verification // Two-factor authentication • Extra data is sent to device, pre-set by user • « making it more difficult for hacker to obtain it • Data has to be entered into the same system • « so if attempted from a remote location, it will not be accepted NOTE: Cannot be awarded if already given in 4(a)(ii) Firewall // proxy server • Monitors traffic coming into and out of the computer system • Check that the traffic meets any criteria/rules set • Blocks any traffic that does not meet the criteria/rules set // set blacklist/whitelist NOTE: Cannot be awarded if already given in 4(a)(i) or 4(a)(ii) 4(b)(i) © UCLES 2019 Three from: • Human error e.g. accidentally deleting a file • Hardware failure • Physical damage e.g. fire/flood • Power failure // power surge • Misplacing a storage device 3 Page 9 of 14 0478/11 Question 4(b)(ii) Question 5 Cambridge IGCSE – Mark Scheme PUBLISHED Answer Two from: • Back data up • Use surge protection • Keep data in a fireproof / waterproof / protective case • Use verification methods (for deleting files) • Following correct procedure e.g. ejecting offline devices / regularly saving Answer Five from: • A (compression) algorithm is used • No data is removed in the process // original file can be restored • Repeated words (are identified) // Patterns in the data (are identified) • « and are indexed/put into a table // by example • « and are replaced with their index // by example • « and their positions are stored (in the table) // by example • « and the number of times the word/pattern appears is stored (in the table) // by example NOTE: Other valid methods of lossless compression can be awarded marks © UCLES 2019 Page 10 of 14 May/June 2019 www.dynamicpapers.com Marks 2 Marks 5 0478/11 Cambridge IGCSE – Mark Scheme PUBLISHED Question 6(a) © UCLES 2019 Answer Four from (max 2 marks per improvement): • Make the password require more characters • Makes the password harder to crack/guess • More possible combinations for the password May/June 2019 www.dynamicpapers.com Marks 4 • • • Make the password require different types of characters Makes the password harder to crack/guess More possible combinations for the password • • Use a biometric device Hard to fake a person’s biological data // data is unique • • • • • Two-step verification // Two factor-authentication Adds an additional level to hack Have to have the set device for the code to receive it Drop-down boxes // onscreen keyboard To prevent passwords being obtained using keylogger • • Request random characters Won’t reveal entire password • • • Set number of password attempts Will lock account if attempting to guess Will stop brute-force attacks Page 11 of 14 0478/11 Cambridge IGCSE – Mark Scheme PUBLISHED Question 6(b) 6(c) © UCLES 2019 Answer Four from (max 3 marks for benefits only, without an explanation): • More read/write cycles (over its lifetime) // greater longevity « • « likely to be a lot of read/write functions each day • Read/write speed is sufficient « • « even though it is slower than solid-state • Cheaper per unit of data stored « • « better value for the company to purchase • « so the law company can afford to buy a server with greater storage capacity • No requirement for portability « • « as a server, it does not need to be moved • Trusted technology « • « it has been traditionally used for many years • • • May/June 2019 www.dynamicpapers.com Marks 4 3 DVD CD Blu-ray Page 12 of 14 0478/11 Cambridge IGCSE – Mark Scheme PUBLISHED Question 7 Question 8(a) © UCLES 2019 Answer 1 mark for each correct term, in the correct place: • Syntax • High-level language • Translator • Machine code • Assembly • Low-level language May/June 2019 www.dynamicpapers.com Marks 6 Answer Six from: • SSL is a (security) protocol • It encrypts any data that is sent • It uses/sends digital certificates « • « which is sent to the (buyer’s/user’s) browser // requested by (buyer’s/user’s) browser • « that contains the gallery’s public key • « that can be used to authenticate the gallery • Once the certificate is authenticated, the transaction will begin Page 13 of 14 Marks 6 0478/11 Question 8(b) May/June 2019 www.dynamicpapers.com Cambridge IGCSE – Mark Scheme PUBLISHED Answer Marks 1 mark for each correct tick. 6 Statement True (9) False (9) 9 Firewalls are only available as hardware devices 9 Firewalls allow a user to set rules for network traffic Firewalls will automatically stop all malicious traffic 9 Firewalls only examine traffic entering a network 9 Firewalls encrypt all data that is transmitted around a network 9 Firewalls can be used to block access to certain websites 9 8(c) Four from: • A set of guidelines • Rules/laws that govern the use of computers / by example • Tell people how to behave when using computers // helps keep users safe when using computers // by example • Art gallery could be subject to plagiarism / intellectual property theft • Art gallery could copyright their work (to make it illegal to steal it) © UCLES 2019 Page 14 of 14 4 www.dynamicpapers.com Cambridge Assessment International Education Cambridge International General Certificate of Secondary Education * 5 1 3 5 6 8 3 2 6 3 * 0478/12 COMPUTER SCIENCE May/June 2019 Paper 1 Theory 1 hour 45 minutes Candidates answer on the Question Paper. No Additional Materials are required. No calculators allowed. READ THESE INSTRUCTIONS FIRST Write your centre number, candidate number and name in the spaces at the top of this page. Write in dark blue or black pen. You may use an HB pencil for any diagrams, graphs or rough working. Do not use staples, paper clips, glue or correction fluid. DO NOT WRITE IN ANY BARCODES. Answer all questions. No marks will be awarded for using brand names of software packages or hardware. Any businesses described in this paper are entirely fictitious. At the end of the examination, fasten all your work securely together. The number of marks is given in brackets [ ] at the end of each question or part question. The maximum number of marks is 75. This syllabus is regulated for use in England, Wales and Northern Ireland as a Cambridge International Level 1/Level 2 Certificate. This document consists of 11 printed pages and 1 blank page. DC (KS/CB) 172695/2 © UCLES 2019 [Turn over 2 1 www.dynamicpapers.com Input and output devices are often connected to a personal computer. (a) Identify three input devices that can be connected to a personal computer. 1 ................................................................................................................................................ 2 ................................................................................................................................................ 3 ................................................................................................................................................ [3] (b) Identify three output devices that can be connected to a personal computer. 1 ................................................................................................................................................ 2 ................................................................................................................................................ 3 ................................................................................................................................................ [3] 2 A finance company uses off-line storage to archive their accounts. (a) Explain what is meant by off-line storage. ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ............................................................................................................................................. [2] (b) The computers in the finance company use both primary and secondary storage. (i) Give one example of primary storage. ..................................................................................................................................... [1] (ii) Give two examples of secondary storage. 1 ........................................................................................................................................ 2 ........................................................................................................................................ [2] © UCLES 2019 0478/12/M/J/19 3 3 www.dynamicpapers.com Vanessa writes a paragraph as an answer to an examination question about the central processing unit (CPU). Use the list given to complete Vanessa’s answer by inserting the correct six missing terms. Not all terms will be used. • • • • • • • • • Components Data Decoded Executed Fetched Instructions RAM ROM Secondary storage The CPU processes ........................................................ and ........................................................ . An instruction is ........................................................ from ........................................................ into the CPU where it is then ........................................................ . Once this has taken place the instruction is then ........................................................ . © UCLES 2019 0478/12/M/J/19 [6] [Turn over 4 4 www.dynamicpapers.com (a) Marley wants to store a video he has created for his school project. He considers using a DVD or a Blu-ray to store the video. Explain two differences between a DVD and a Blu-ray. 1 ................................................................................................................................................ ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... 2 ................................................................................................................................................ ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... [2] (b) (i) Marley also needs to store ten 8-bit colour images in a file for his project. Each image is 500 pixels wide and 300 pixels high. Calculate the total file size in megabytes (MB) for all Marley’s images. Show all your working. ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... File size ....................................................... MB © UCLES 2019 0478/12/M/J/19 [3] 5 (ii) www.dynamicpapers.com Marley prints the images for his project using an inkjet printer. Describe how the inkjet printer prints an image. ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... ..................................................................................................................................... [4] 5 A music company wants to send a new music file to many radio stations. It will send the music file the day before the release date so that the radio stations can store the file ready for release. The music company does not want the radio stations to be able to open the music file until 09:00 on the release date. Identify two security measures and describe how each measure can be used to make sure the music file cannot be opened until the release date. Security measure 1 .......................................................................................................................... Description ....................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... Security measure 2 .......................................................................................................................... Description ....................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... [4] © UCLES 2019 0478/12/M/J/19 [Turn over 6 6 www.dynamicpapers.com Priya creates a website to sell her old comic books and superhero figures. (a) She uses HTML to create her website. The HTML she produces has both structure and presentation. Explain what is meant by HTML structure and presentation. Include an example of each. Structure ................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... Presentation ............................................................................................................................. ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... [4] (b) Priya uses cookies in her website. Five statements are given about cookies. Tick (✓) to show if the statement is True or False. Statement True (✓) False (✓) Cookies can be used to store a customer’s credit card details Cookies can be used to track the items a customer has viewed on a website Cookies will corrupt the data on a customer’s computer Cookies are downloaded onto a customer’s computer Cookies can be deleted from a customer’s computer [5] © UCLES 2019 0478/12/M/J/19 7 www.dynamicpapers.com (c) Priya stores her website on a webserver. To transmit the website data to the webserver she uses parallel duplex data transmission. Describe how data is transmitted using parallel duplex data transmission. ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ............................................................................................................................................. [4] (d) Priya has a URL for her website. State what is meant by a URL. ................................................................................................................................................... ............................................................................................................................................. [1] (e) Priya is concerned about a denial of service attack (DoS) occurring on her webserver. (i) Explain what is meant by a denial of service attack. ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... ..................................................................................................................................... [4] (ii) Give one security device that can be used to help prevent a denial of service attack. ..................................................................................................................................... [1] © UCLES 2019 0478/12/M/J/19 [Turn over 8 7 www.dynamicpapers.com (a) An office has an automated lighting system. When movement is detected in the office the lights are switched on. If movement is not detected for a period of 2 minutes the lights are switched off. The system uses a sensor and a microprocessor. Describe how the automated lighting system uses a sensor and a microprocessor. ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ............................................................................................................................................. [6] (b) A microprocessor uses ROM. Explain what is meant by ROM. ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ............................................................................................................................................. [3] © UCLES 2019 0478/12/M/J/19 9 8 www.dynamicpapers.com Consider the logic statement: X = 1 if ((A is 1 NOR C is 1) AND (B is NOT 1 NOR C is 1)) OR (A is 1 AND B is 1) (a) Draw a logic circuit to match the given logic statement. Each logic gate used must have a maximum of two inputs. Do not attempt to simplify the logic statement. A X B C [6] (b) Complete the truth table for the given logic statement. A B C 0 0 0 0 0 1 0 1 0 0 1 1 1 0 0 1 0 1 1 1 0 1 1 1 Working space X [4] © UCLES 2019 0478/12/M/J/19 [Turn over www.dynamicpapers.com 10 9 The contents of three binary registers have been transmitted from one computer to another. Even parity has been used as an error detection method. The outcome after transmission is: Register A and Register C have been transmitted correctly. Register B has been transmitted incorrectly. Complete the Parity bit for each register to show the given outcome. Parity bit Register A 0 1 0 0 1 0 1 Register B 1 0 0 0 0 0 1 Register C 1 0 0 0 0 1 1 [3] © UCLES 2019 0478/12/M/J/19 11 www.dynamicpapers.com 10 Remy has a mobile device that has a capacitive touch screen. Describe how the capacitive touch screen registers Remy’s touch. .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .................................................................................................................................................... [4] © UCLES 2019 0478/12/M/J/19 12 www.dynamicpapers.com BLANK PAGE Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will be pleased to make amends at the earliest possible opportunity. To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cambridgeinternational.org after the live examination series. Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge. © UCLES 2019 0478/12/M/J/19 www.dynamicpapers.com Cambridge Assessment International Education Cambridge International General Certificate of Secondary Education COMPUTER SCIENCE 0478/12 Paper 1 May/June 2019 MARK SCHEME Maximum Mark: 75 Published This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the details of the discussions that took place at an Examiners’ meeting before marking began, which would have considered the acceptability of alternative answers. Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for Teachers. Cambridge International will not enter into discussions about these mark schemes. Cambridge International is publishing the mark schemes for the May/June 2019 series for most Cambridge IGCSE™, Cambridge International A and AS Level and Cambridge Pre-U components, and some Cambridge O Level components. This syllabus is regulated for use in England, Wales and Northern Ireland as a Cambridge International Level 1/Level 2 Certificate. This document consists of 12 printed pages. © UCLES 2019 [Turn over 0478/12 Cambridge IGCSE – Mark Scheme PUBLISHED Generic Marking Principles May/June 2019 www.dynamicpapers.com These general marking principles must be applied by all examiners when marking candidate answers. They should be applied alongside the specific content of the mark scheme or generic level descriptors for a question. Each question paper and mark scheme will also comply with these marking principles. GENERIC MARKING PRINCIPLE 1: Marks must be awarded in line with: • • • the specific content of the mark scheme or the generic level descriptors for the question the specific skills defined in the mark scheme or in the generic level descriptors for the question the standard of response required by a candidate as exemplified by the standardisation scripts. GENERIC MARKING PRINCIPLE 2: Marks awarded are always whole marks (not half marks, or other fractions). GENERIC MARKING PRINCIPLE 3: Marks must be awarded positively: • • • • • marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit is given for valid answers which go beyond the scope of the syllabus and mark scheme, referring to your Team Leader as appropriate marks are awarded when candidates clearly demonstrate what they know and can do marks are not deducted for errors marks are not deducted for omissions answers should only be judged on the quality of spelling, punctuation and grammar when these features are specifically assessed by the question as indicated by the mark scheme. The meaning, however, should be unambiguous. GENERIC MARKING PRINCIPLE 4: Rules must be applied consistently e.g. in situations where candidates have not followed instructions or in the application of generic level descriptors. © UCLES 2019 Page 2 of 12 0478/12 Cambridge IGCSE – Mark Scheme PUBLISHED May/June 2019 www.dynamicpapers.com GENERIC MARKING PRINCIPLE 5: Marks should be awarded using the full range of marks defined in the mark scheme for the question (however; the use of the full mark range may be limited according to the quality of the candidate responses seen). GENERIC MARKING PRINCIPLE 6: Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should not be awarded with grade thresholds or grade descriptors in mind. © UCLES 2019 Page 3 of 12 0478/12 Cambridge IGCSE – Mark Scheme PUBLISHED Question Answer May/June 2019 www.dynamicpapers.com Marks 1(a) Three from e.g.: − Keyboard − Mouse − Microphone − 2D scanner − 3D scanner − Touchscreen − Webcam // digital camera − Joystick − Trackpad − Sensor − Interactive whiteboard 3 1(b) Three from e.g.: − Monitor // touchscreen − Inkjet printer − Laser printer − 3D printer − Speaker − Headphones − LED Projector − DLP − 2D cutter − 3D cutter − Actuator 3 © UCLES 2019 Page 4 of 12 0478/12 Cambridge IGCSE – Mark Scheme PUBLISHED Question 2(a) Answer May/June 2019 www.dynamicpapers.com Marks Two from: − It is non-volatile − Can be easily disconnected from the computer − It is not directly accessed by the CPU − Suitable example e.g. CD, DVD, USB flash memory 2 2(b)(i) One from: − ROM − RAM 1 2(b)(ii) Two from: − HDD − SSD − Flash memory 2 Question 3 © UCLES 2019 Answer 1 mark for each correct term, in the correct place: − Data/instructions − Instructions/data (must be the alternative to MP1) − Fetched − RAM − Decoded − Executed Page 5 of 12 Marks 6 0478/12 Cambridge IGCSE – Mark Scheme PUBLISHED Question 4(a) 4(b)(i) Answer © UCLES 2019 Marks Two from e.g.: − DVD uses red laser/light whereas blu-ray uses blue/violet laser/light − DVD has a smaller (storage) capacity // Blu-ray has a larger (storage) capacity − DVD has two layers (of polycarbonate) whereas Blu-ray disks have a single layer (of polycarbonate) − DVD has a slower transfer rate (of approximately 10 mbps) // Blu-ray has a faster transfer rate (of approximately 36 mbps) 2 2 marks for any two correct stages of working, 1 mark for correct answer. − 500 * 300 * 10 // 150 000 *10 − * 8 then ÷ 8 (anywhere in the process) − 1 500 000 ÷ 1024 ÷ 1024 // 1 500 000 ÷ 1 048 576 3 − 4(b)(ii) May/June 2019 www.dynamicpapers.com = 1.43 MB Four from: − Rollers are used to move the paper through the printer − Nozzles spray/drop/jet ink onto the paper − Ink jets/print head/nozzles are moved across the paper (to distribute the ink) − Different colour inks are mixed to create required colours − Technology could be piezoelectric − Technology could be thermal bubble − − − − Ink is heated and expands/evaporates into a bubble Bubble is pushed through the nozzle on to the paper then the bubble collapses − − − Electrical current is applied to a crystal which makes it vibrate which forces a droplet of ink through the nozzle Page 6 of 12 4 0478/12 Question 5 Answer − − Password protection Password is released on the release date − − Encryption Encryption key is released on the release date Marks 4 Question 6(a) May/June 2019 www.dynamicpapers.com Cambridge IGCSE – Mark Scheme PUBLISHED Answer Marks Structure − This is the layout of the web page − e.g. placing an image alongside some text // example of tag, such as <div> 4 Presentation − This is the formatting/style of the web page − e.g. the colour that is applied to some text // example of tag, such as <font-color> 6(b) 1 mark per each correct row. 5 True (9) Statement Cookies can be used to store a customer’s credit card details 9 Cookies can be used to track the items a customer has viewed on a website 9 9 Cookies will corrupt the data on a customer’s computer © UCLES 2019 Cookies are downloaded onto a customer’s computer 9 Cookies can be deleted from a customer’s computer 9 Page 7 of 12 False (9) 0478/12 Cambridge IGCSE – Mark Scheme PUBLISHED Question 6(c) 6(d) Answer − − − − Several/multiple bits are transmitted at a time/simultaneously Several/multiple wires are used Data is transmitted in both directions at the same time/simultaneously May/June 2019 www.dynamicpapers.com Marks 4 One from: − Uniform resource locator − The website’s address − User friendly version of the IP address 1 6(e)(i) Four from: − Designed to deny people access to a website − A large number/numerous requests are sent (to a server) − all at the same time − The server is unable to respond/struggles to respond to all the requests − The server fails/times out as a result 4 6(e)(ii) One from: − Proxy server − Firewall 1 © UCLES 2019 Page 8 of 12 0478/12 Question Cambridge IGCSE – Mark Scheme PUBLISHED May/June 2019 www.dynamicpapers.com Answer Marks 7(a) Six from: − Motion sensor is used − Sensor sends data/signal to microprocessor − Data/Signal is converted from analogue data to digital data (using ADC) − Value to compared to stored value(s) // − If value is outside range/matches − microprocessor sends signal to switch lights on − actuator used to switch light on/off − timer is set for 2 minutes − Every time movement is detected the timer is reset − When timer reaches 0/120/times out microprocessor sends signal to switch lights off − Process is continuous 6 7(b) Three from: − Read only memory − Non-volatile memory // Contents of memory are retained when power is turned off//permanent storage − Primary storage // directly accessed by the CPU − Holds firmware/boot-up instructions/start-up instructions/BIOS − Cannot be written to 3 © UCLES 2019 Page 9 of 12 0478/12 Cambridge IGCSE – Mark Scheme PUBLISHED Question 8(a) © UCLES 2019 Answer 1 mark per each correct logic gate, with correct input(s) Page 10 of 12 May/June 2019 www.dynamicpapers.com Marks 6 0478/12 Cambridge IGCSE – Mark Scheme PUBLISHED Question 8(b) © UCLES 2019 May/June 2019 www.dynamicpapers.com Answer Marks 4 marks for 8 correct outputs 3 marks for 6/7 correct outputs 2 marks for 4/5 correct outputs 1 mark for 2/3 correct outputs 4 A B C Working space 0 0 0 0 0 0 1 0 0 1 0 1 0 1 1 0 1 0 0 0 1 0 1 0 1 1 0 1 1 1 1 1 Page 11 of 12 X 0478/12 Question 9 May/June 2019 www.dynamicpapers.com Cambridge IGCSE – Mark Scheme PUBLISHED Answer Marks 1 mark per each correct parity bit: 3 Parity bit Question 10 © UCLES 2019 Register A 1 0 1 0 0 1 0 1 Register B 1 1 0 0 0 0 0 1 Register C 1 1 0 0 0 0 1 1 Answer Four from: − Electrical field/charge is spread across the screen − Sensors are located around the screen // sensors are used to read the electric field − When finger touches screen, the charge/ is transferred to the user − as it is affected by the conductivity of another object − Coordinates of touch determined/calculated/measured Page 12 of 12 Marks 4 www.dynamicpapers.com Cambridge Assessment International Education Cambridge International General Certificate of Secondary Education * 0 8 5 8 6 2 0 4 7 3 * 0478/13 COMPUTER SCIENCE May/June 2019 Paper 1 Theory 1 hour 45 minutes Candidates answer on the Question Paper. No Additional Materials are required. No calculators allowed. READ THESE INSTRUCTIONS FIRST Write your centre number, candidate number and name in the spaces at the top of this page. Write in dark blue or black pen. You may use an HB pencil for any diagrams, graphs or rough working. Do not use staples, paper clips, glue or correction fluid. DO NOT WRITE IN ANY BARCODES. Answer all questions. No marks will be awarded for using brand names of software packages or hardware. Any businesses described in this paper are entirely fictitious. At the end of the examination, fasten all your work securely together. The number of marks is given in brackets [ ] at the end of each question or part question. The maximum number of marks is 75. This syllabus is regulated for use in England, Wales and Northern Ireland as a Cambridge International Level 1/Level 2 Certificate. This document consists of 11 printed pages and 1 blank page. DC (RW/CB) 172694/3 © UCLES 2019 [Turn over 2 1 www.dynamicpapers.com Victoria is building a website for her cake design business. (a) She uses the hexadecimal colour code #D2E3F5 as the background colour for her website. The colour code is stored in two 12‑bit binary registers. Show how the code would be stored in the registers. D2E 3F5 [6] (b) Victoria uses HTML to create her website. State what is meant by HTML. ................................................................................................................................................... ............................................................................................................................................. [1] (c) The HTML Victoria writes has both structure and presentation. Five examples are given of structure and presentation. Tick (✓) to show which example is Structure and which is Presentation. Structure (✓) Example Presentation (✓) The colour applied to a text heading on a web page The font style applied to a paragraph of text on a web page The placement of a paragraph of text on a web page The size that an image is set to be displayed at on a web page The placement of an image next to a paragraph of text on a web page [5] © UCLES 2019 0478/13/M/J/19 3 www.dynamicpapers.com (d) Customers will use a web browser to access Victoria’s website. Victoria writes a paragraph of text to explain how the website will be displayed on a customer’s computer. Use the list given to complete Victoria’s paragraph by inserting the correct six missing terms. Not all terms will be used. • • • • • • • • • • browser domain name firewall hexadecimal HTML https MAC address search engine Uniform Resource Locator (URL) web server The user enters the website .................................................................. into the address bar. The protocol that is used is .................................................................. . The URL contains the .................................................................. for the website. This is used to look up the IP address of the company. A DNS server stores an index of IP addresses. The browser sends a request to the .................................................................. as this is where the files for the website are stored. The files are sent back to the .................................................................. as .................................................................. files. This is interpreted by the browser and the web page is displayed. © UCLES 2019 0478/13/M/J/19 [6] [Turn over 4 www.dynamicpapers.com (e) When customers access Victoria’s website they will be given the message: This website uses cookies. An explanation of their purpose can be found in our cookies policy. (i) Explain what is meant by cookies. ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... ..................................................................................................................................... [2] (ii) Explain why Victoria would use cookies as part of her website. ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... ..................................................................................................................................... [4] 2 (a) A computer can have both a MAC address and an IP address. Four statements are given about MAC addresses and IP addresses. Tick (✓) to show whether each statement is True or False. Statement True (✓) False (✓) A MAC address is unique to a computer on a network Once an IP address has been set it cannot be changed A MAC address is made up of the computer’s serial number and the IP address If a computer does not have an IP address it cannot communicate with another device using the Internet [4] © UCLES 2019 0478/13/M/J/19 5 www.dynamicpapers.com (b) A computer uses the Von Neumann model and the stored program concept. (i) Explain what is meant by the stored program concept. ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... ..................................................................................................................................... [2] (ii) The Von Neumann model has several components that are used in the fetch‑execute cycle. One component is the Arithmetic Logic Unit (ALU). Describe the role of the ALU. ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... ..................................................................................................................................... [4] (c) The computer has an operating system. (i) A signal causes the operating system to stop and assess what to do next. Identify the name of this signal. ..................................................................................................................................... [1] (ii) State two functions of an operating system. 1 ........................................................................................................................................ 2 ........................................................................................................................................ [2] © UCLES 2019 0478/13/M/J/19 [Turn over 6 3 www.dynamicpapers.com A finance company is concerned that its employees are being distracted by using gaming websites at work. (a) Explain how a firewall could help prevent this distraction. ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ............................................................................................................................................. [4] (b) The finance company is also worried about the security of the data stored on its servers. The company has decided to encrypt the data to improve the security. Describe how the data are encrypted. ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ............................................................................................................................................. [4] © UCLES 2019 0478/13/M/J/19 7 www.dynamicpapers.com (c) The finance company realises that its computer systems have been hacked. The company thinks that spyware was used to obtain a user’s password. Explain how spyware could have been used to obtain the user’s password. ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ............................................................................................................................................. [6] © UCLES 2019 0478/13/M/J/19 [Turn over 8 4 www.dynamicpapers.com Consider the given logic circuit: A X B C (a) Redraw the logic circuit using only 4 logic gates. Each logic gate used must have a maximum of two inputs. A X B C [4] © UCLES 2019 0478/13/M/J/19 9 www.dynamicpapers.com (b) Complete the truth table for the given logic circuit. A B C 0 0 0 0 0 1 0 1 0 0 1 1 1 0 0 1 0 1 1 1 0 1 1 1 Working space X [4] (c) Describe the purpose of a logic gate in a logic circuit. ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ............................................................................................................................................. [2] © UCLES 2019 0478/13/M/J/19 [Turn over www.dynamicpapers.com 10 5 The three binary numbers in the registers given have been transmitted from one computer to another. One binary number has been transmitted incorrectly. This can be identified by the use of a Parity bit. Identify the binary number that has been transmitted incorrectly. Explain how you identified the incorrect binary number. Parity bit Register A 1 0 1 1 1 0 0 1 Register B 1 1 1 0 0 1 1 1 Register C 1 0 0 1 1 0 1 1 The binary number that has been transmitted incorrectly is in Register ............................ Explanation ...................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .................................................................................................................................................... [4] © UCLES 2019 0478/13/M/J/19 11 6 www.dynamicpapers.com A museum has an information point. Visitors to the museum can use the information point to plan their visit to the museum. The information point allows visitors to access the information using a resistive touch screen. Visitors can either listen to the information or read it on the screen. They can also select to output a paper copy of the information they require. (a) Describe how the resistive touch screen registers the visitor’s touch. ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ............................................................................................................................................. [4] (b) The information point has a screen to allow visitors to read information. Identify two other output devices that are present in the information point. Output device 1 ........................................................................................................................ Output device 2 ........................................................................................................................ [2] (c) The information point uses both primary and secondary storage. Explain what is meant by primary and secondary storage. Primary ..................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... Secondary ................................................................................................................................ ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... [4] © UCLES 2019 0478/13/M/J/19 12 www.dynamicpapers.com BLANK PAGE Permission to reproduce items where third‑party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will be pleased to make amends at the earliest possible opportunity. To avoid the issue of disclosure of answer‑related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cambridgeinternational.org after the live examination series. Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge. © UCLES 2019 0478/13/M/J/19 www.dynamicpapers.com Cambridge Assessment International Education Cambridge International General Certificate of Secondary Education COMPUTER SCIENCE 0478/13 Paper 1 Theory May/June 2019 MARK SCHEME Maximum Mark: 75 Published This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the details of the discussions that took place at an Examiners’ meeting before marking began, which would have considered the acceptability of alternative answers. Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for Teachers. Cambridge International will not enter into discussions about these mark schemes. Cambridge International is publishing the mark schemes for the May/June 2019 series for most Cambridge IGCSE™, Cambridge International A and AS Level and Cambridge Pre-U components, and some Cambridge O Level components. This syllabus is regulated for use in England, Wales and Northern Ireland as a Cambridge International Level 1/Level 2 Certificate. This document consists of 12 printed pages. © UCLES 2019 [Turn over 0478/13 Cambridge IGCSE – Mark Scheme PUBLISHED Generic Marking Principles May/June 2019 www.dynamicpapers.com These general marking principles must be applied by all examiners when marking candidate answers. They should be applied alongside the specific content of the mark scheme or generic level descriptors for a question. Each question paper and mark scheme will also comply with these marking principles. GENERIC MARKING PRINCIPLE 1: Marks must be awarded in line with: • • • the specific content of the mark scheme or the generic level descriptors for the question the specific skills defined in the mark scheme or in the generic level descriptors for the question the standard of response required by a candidate as exemplified by the standardisation scripts. GENERIC MARKING PRINCIPLE 2: Marks awarded are always whole marks (not half marks, or other fractions). GENERIC MARKING PRINCIPLE 3: Marks must be awarded positively: • • • • • marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit is given for valid answers which go beyond the scope of the syllabus and mark scheme, referring to your Team Leader as appropriate marks are awarded when candidates clearly demonstrate what they know and can do marks are not deducted for errors marks are not deducted for omissions answers should only be judged on the quality of spelling, punctuation and grammar when these features are specifically assessed by the question as indicated by the mark scheme. The meaning, however, should be unambiguous. GENERIC MARKING PRINCIPLE 4: Rules must be applied consistently e.g. in situations where candidates have not followed instructions or in the application of generic level descriptors. © UCLES 2019 Page 2 of 12 0478/13 Cambridge IGCSE – Mark Scheme PUBLISHED May/June 2019 www.dynamicpapers.com GENERIC MARKING PRINCIPLE 5: Marks should be awarded using the full range of marks defined in the mark scheme for the question (however; the use of the full mark range may be limited according to the quality of the candidate responses seen). GENERIC MARKING PRINCIPLE 6: Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should not be awarded with grade thresholds or grade descriptors in mind. © UCLES 2019 Page 3 of 12 0478/13 May/June 2019 www.dynamicpapers.com Cambridge IGCSE – Mark Scheme PUBLISHED Question Answer Marks 1(a) 6 1 1 0 1 0 0 1 1 1 mark 1(b) 0 1 1 1 1 1 1 0 1 mark 1 0 1 mark 1 0 1 1 mark One from: − − 1(c) 1 1 mark 1 mark 0 0 1 Hypertext Mark-up Language A mark-up language used to create webpages 1 mark for each correct row: 5 Structure (9) Example The colour applied to a text heading on a web page 9 The font style applied to a paragraph of text on a web page 9 9 The placement of a paragraph of text on a web page 9 The size that an image is set to be displayed at on a web page The placement of an image next to a paragraph of text of a web page © UCLES 2019 Presentation (9) Page 4 of 12 9 0478/13 Cambridge IGCSE – Mark Scheme PUBLISHED Question 1(d) 1(e)(i) 1(e)(ii) Answer 1 mark for each correct term, in the correct place: − − − − − − URL https Domain name Web server Browser HTML − − Small packets of data « that are stored by the web browser © UCLES 2019 Marks 6 2 Four from: − − − − − May/June 2019 www.dynamicpapers.com 4 To store a customer’s password « To store a customer’s credit card details « « so they do not need to be re-entered in future To track what the customer has viewed on the website « « so she can send them adverts that match their preferences Page 5 of 12 0478/13 Question 2(a) Answer 4 True (9) Once an IP address has been set it cannot be changed 9 A MAC address is made up of the computer’s serial number and the IP address 9 If a computer does not have an IP address it cannot communicate with another device using the Internet © UCLES 2019 False (9) 9 A MAC address is unique to a computer on a network 2(b)(ii) Marks 1 mark for each correct row: Statement 2(b)(i) May/June 2019 www.dynamicpapers.com Cambridge IGCSE – Mark Scheme PUBLISHED Two from: 9 2 − − − Programs / instructions are stored in memory Data is stored in memory Instructions are fetched and executed one after another − − − − Carries out calculations Carries out logical operations Holds temporary / interim values during calculations « in a register called the accumulator (ACC) Page 6 of 12 4 0478/13 Cambridge IGCSE – Mark Scheme PUBLISHED Question 2(c)(i) 2(c)(ii) Answer − © UCLES 2019 Marks 1 Interrupt Two from: − − − − − − − − − − − − − May/June 2019 www.dynamicpapers.com 2 Provides an interface Loads / opens / installs / closes software Manages the hardware // manages peripherals // spooling Manages the transfer of programs into and out of memory Divides processing time // processor management Manages file handling Manages error handling // interrupt handling Manages security software Manages utility software Manages user accounts Multitasking Multiprogramming // time slicing Batch processing Page 7 of 12 0478/13 Cambridge IGCSE – Mark Scheme PUBLISHED Question 3(a) Answer Four from: − − − − − 3(b) © UCLES 2019 The company could use the firewall to set criteria Gaming websites can be listed as blocked websites // ports can be blocked The firewall would examine any traffic leaving the network If it detected traffic requesting a listed website, it will block access to it Keeps a log of all attempts to access blocked websites 4 An encryption algorithm is used « to scramble data The original data is called the plain text A key is used to encrypt the data The key is applied to the plain text Plain text is encrypted into cypher text Six from: − − − − − − − Marks 4 Four from: − − − − − − 3(c) May/June 2019 www.dynamicpapers.com 6 The user could have been sent an email with an attachment / link containing the spyware The user could have clicked a link on an untrusted website When the attachment / link was clicked the spyware was downloaded onto the user’s computer The spyware recorded all the key logs from the user’s keyboard The recorded key logs were sent back to the creator of the spyware The key logs were analysed A common pattern / word in the key logs could have allowed a password to be identified Page 8 of 12 0478/13 Cambridge IGCSE – Mark Scheme PUBLISHED Question 4(a) © UCLES 2019 Answer 1 mark for each correct logic gate, with correct inputs: May/June 2019 www.dynamicpapers.com Marks 4 Page 9 of 12 0478/13 Cambridge IGCSE – Mark Scheme PUBLISHED Question 4(b) 4(c) Answer Marks 4 marks for 8 correct outputs 3 marks for 6/7 correct outputs 2 marks for 4/5 correct outputs 1 mark for 2/3 correct outputs 4 A B C 0 0 0 0 0 0 1 0 0 1 0 1 0 1 1 0 1 0 0 1 1 0 1 0 1 1 0 1 1 1 1 0 Working space X Two from: − − − © UCLES 2019 May/June 2019 www.dynamicpapers.com 2 To carry out a logical operation To control the flow of electricity through a logic circuit An input is given and the logic of the gate is applied to give an output // to alter the output from given inputs Page 10 of 12 0478/13 Cambridge IGCSE – Mark Scheme PUBLISHED Question 5 Answer − May/June 2019 www.dynamicpapers.com Marks 4 B Three from: − − − − Added up the number of 1’s / 0’s in each register With the parity bit, two registers have an odd number of 1’s / 0’s One register has an even number of 1’s / 0’s Odd parity must be the parity used Question 6(a) Answer Four from: − − − − − 6(b) © UCLES 2019 4 Screen has two / multiple layers Visitor presses on top layer Top layer connects to bottom layer « creating a circuit Calculation is carried out on where layers are connected Two from: − − − Marks 2 Speaker Headphones Printer Page 11 of 12 0478/13 Cambridge IGCSE – Mark Scheme PUBLISHED Question 6(c) May/June 2019 www.dynamicpapers.com Answer Four from (max. 2 marks per type): 4 Primary − Memory that is directly accessed by the CPU − An example is RAM / ROM − RAM stores programs and data that are currently in use and ROM stores boot-up instructions − RAM is volatile and ROM is non volatile Secondary − Storage that is not directly accessed by the CPU − An example is HDD / SSD − Stores data / files that can be accessed at a later stage − Non volatile © UCLES 2019 Marks Page 12 of 12 www.dynamicpapers.com Cambridge Assessment International Education Cambridge International General Certificate of Secondary Education * 3 3 4 3 6 7 5 4 5 7 * 0478/11 COMPUTER SCIENCE October/November 2019 Paper 1 Theory 1 hour 45 minutes Candidates answer on the Question Paper. No Additional Materials are required. No calculators allowed. READ THESE INSTRUCTIONS FIRST Write your centre number, candidate number and name in the spaces at the top of this page. Write in dark blue or black pen. You may use an HB pencil for any diagrams, graphs or rough working. Do not use staples, paper clips, glue or correction fluid. DO NOT WRITE IN ANY BARCODES. Answer all questions. No marks will be awarded for using brand names of software packages or hardware. Any businesses described in this paper are entirely fictitious. At the end of the examination, fasten all your work securely together. The number of marks is given in brackets [ ] at the end of each question or part question. The maximum number of marks is 75. This syllabus is regulated for use in England, Wales and Northern Ireland as a Cambridge International Level 1/Level 2 Certificate. This document consists of 12 printed pages. DC (SC/SG) 163095/2 © UCLES 2019 [Turn over 2 1 www.dynamicpapers.com Andrew wants to produce advertising material for his company. (a) Andrew can use an Inkjet printer or a Laser printer. Draw lines to connect each printer to a correct statement. More than one line may be used to connect to each printer or statement. Printer Statement Can print in colour Inkjet printer Uses a charged drum to create the printed item Uses powdered toner Laser printer Creates output line by line using a print head [2] (b) Andrew wants to print a single page A4 leaflet. He wants to print 10 000 copies. State whether he should use an inkjet or a laser printer. ............................................................................................................................................. [1] (c) Andrew wants to produce small 3D models of the company logo. Explain how a 3D cutter could be used to produce the models. ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ............................................................................................................................................. [2] © UCLES 2019 0478/11/O/N/19 3 2 www.dynamicpapers.com An electronic guessing game compares denary integer values input by a user with pre-stored values. The pre-stored values are held in 10-bit binary format. (a) Convert the binary values in the table to denary. Binary Denary 0001001110 0110110111 1000000001 [3] (b) When planning the game, the designer decided to use hexadecimal notation to represent the binary values. Explain why the designer used hexadecimal notation. ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ............................................................................................................................................. [2] (c) State the hexadecimal equivalent of the binary value 1010110101 ............................................................................................................................................. [3] 3 A company has several offices. It uses the Internet to transfer data between offices. The company also makes payments to staff and suppliers using online banking. The company are concerned about spyware and other security aspects of using the Internet. (a) Explain what is meant by spyware and how it is used to obtain data. ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ............................................................................................................................................. [3] © UCLES 2019 0478/11/O/N/19 [Turn over 4 www.dynamicpapers.com (b) The company uses a web page to log on to the online bank. Identify one method that could be used by the online bank to reduce the impact of spyware when logging on. State how the method prevents the use of spyware. ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ............................................................................................................................................. [2] (c) The company has installed a firewall as part of its data security. Describe how a firewall can help protect against unauthorised access to data. ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ............................................................................................................................................. [4] (d) State two other methods the company could use to help prevent unauthorised access to data. Method 1 ................................................................................................................................... Method 2 ................................................................................................................................... [2] © UCLES 2019 0478/11/O/N/19 5 4 www.dynamicpapers.com A zoo has an information point. • • • Visitors use a menu to select information about animals. The menu includes 500 different animals. The information is provided only using high definition video with an audio track. (a) State one input device that could be used for the information point. ............................................................................................................................................. [1] (b) The output is shown on a monitor. State one other output device that could be used for the information point. ............................................................................................................................................. [1] (c) The video files are stored at the information point. State one secondary storage device that could be used. ............................................................................................................................................. [1] (d) The zoo decides to introduce Quick Response codes in different places in the zoo. These provide further information about the animals. Describe how customers obtain the information from the Quick Response codes. ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ............................................................................................................................................. [4] © UCLES 2019 0478/11/O/N/19 [Turn over www.dynamicpapers.com 6 5 Sonia shares files with her friends. The method of data transmission she uses is half-duplex serial transmission. (a) Describe how data is transmitted using half-duplex serial data transmission. ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ............................................................................................................................................. [4] (b) The system uses parity bits to check for errors during data transmission. The outcome of four bytes after transmission is: Byte 1 Byte 2 Byte 3 Byte 4 00110011 01010100 10110100 01110111 One of the bytes has been transmitted incorrectly. Identify the byte that was transmitted incorrectly. Byte ........................................................... Explain how you identified the byte that was transmitted incorrectly. ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... [4] © UCLES 2019 0478/11/O/N/19 7 6 www.dynamicpapers.com Ishan is a member of a software community that develops computer games. He has programmed a new feature for one of the community’s existing games. (a) Ishan compiles the program before he issues it to the community. (i) Explain one benefit of Ishan compiling the program. ........................................................................................................................................... ..................................................................................................................................... [1] (ii) Explain one drawback of Ishan compiling the program. ........................................................................................................................................... ..................................................................................................................................... [1] (b) Ishan shares the program with community members over the Internet, using Secure Socket Layer (SSL). (i) Explain how Ishan will know he is on a secure website. ........................................................................................................................................... ..................................................................................................................................... [1] (ii) Describe how an SSL connection is established. ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... ..................................................................................................................................... [5] © UCLES 2019 0478/11/O/N/19 [Turn over 8 www.dynamicpapers.com (c) The community publishes completed games on the Internet as freeware. Describe what is meant by freeware. ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ............................................................................................................................................. [4] (d) The program files for the games are compressed before they are published on the Internet. (i) Describe one benefit of compressing the program files. ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... ..................................................................................................................................... [2] (ii) State whether lossy or lossless compression should be used. ..................................................................................................................................... [1] © UCLES 2019 0478/11/O/N/19 9 7 www.dynamicpapers.com A factory manufactures plastic pipes. It uses logic circuits to control the manufacturing process. (a) Consider the logic gate: Input A Input B Output Complete the truth table for this logic gate. Input A Input B 0 0 0 1 1 0 1 1 Output [1] (b) Consider the truth table: Input A Input B Output 0 0 0 0 1 1 1 0 1 1 1 0 State the single logic gate that produces the given output. ............................................................................................................................................. [1] © UCLES 2019 0478/11/O/N/19 [Turn over www.dynamicpapers.com 10 (c) Plastic pipes of various sizes are manufactured by heating the plastic and using pressure. The manufacturing system uses sensors to measure the pressure (P), temperature (T) and speed (S) of production. The inputs to the manufacturing system are: Input P T S Binary value Condition 1 pressure is > 5 bar 0 pressure is <= 5 bar 1 temperature is > 200 degrees Celsius 0 temperature is <= 200 degrees Celsius 1 speed is > 1 metre per second 0 speed is <= 1 metre per second The system will sound an alarm (X) when certain conditions are detected. The alarm will sound when: Temperature is > 200 degrees Celsius and the pressure is <= 5 bar or Speed is > 1 metre per second and Temperature is <= 200 degrees Celsius Draw a logic circuit to represent the above alarm system. Logic gates used must have a maximum of two inputs. P T X S [5] © UCLES 2019 0478/11/O/N/19 11 www.dynamicpapers.com (d) Give two benefits of using sensors to monitor the manufacture of plastic pipes. 1 ................................................................................................................................................ ................................................................................................................................................... 2 ................................................................................................................................................ ................................................................................................................................................... [2] 8 Explain how an instruction is fetched in a Von Neumann model computer. .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .................................................................................................................................................... [6] 9 HTML can be used to create the structure and the presentation of web pages. (a) Describe what is meant by HTML structure. ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ............................................................................................................................................. [2] © UCLES 2019 0478/11/O/N/19 [Turn over 12 www.dynamicpapers.com (b) Gloria writes a paragraph as an answer to an examination question about accessing a website. Use the list given to complete Gloria’s answer by inserting the correct four missing terms. Not all terms will be used. • • • • • • • • browser cookies Hypertext Markup Language (HTML) hypertext transfer protocol (http) hypertext transfer protocol secure (https) Internet Protocol address (IP address) Media Access Control address (MAC address) web server The user enters the URL of the website. The ............................................................... uses the DNS server to look up the ............................................................... of the website. The browser sends a request to the ............................................................... to obtain the website files. The website files are sent as ............................................................... that is interpreted by the browser. [4] Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will be pleased to make amends at the earliest possible opportunity. To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cambridgeinternational.org after the live examination series. Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge. © UCLES 2019 0478/11/O/N/19 www.dynamicpapers.com Cambridge Assessment International Education Cambridge International General Certificate of Secondary Education COMPUTER SCIENCE 0478/11 Paper 1 October/November 2019 MARK SCHEME Maximum Mark: 75 Published This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the details of the discussions that took place at an Examiners’ meeting before marking began, which would have considered the acceptability of alternative answers. Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for Teachers. Cambridge International will not enter into discussions about these mark schemes. Cambridge International is publishing the mark schemes for the October/November 2019 series for most Cambridge IGCSE™, Cambridge International A and AS Level components and some Cambridge O Level components. This syllabus is regulated for use in England, Wales and Northern Ireland as a Cambridge International Level 1/Level 2 Certificate. This document consists of 12 printed pages. © UCLES 2019 [Turn over 0478/11 Cambridge IGCSE – Mark Scheme PUBLISHED Generic Marking Principles October/November 2019 www.dynamicpapers.com These general marking principles must be applied by all examiners when marking candidate answers. They should be applied alongside the specific content of the mark scheme or generic level descriptors for a question. Each question paper and mark scheme will also comply with these marking principles. GENERIC MARKING PRINCIPLE 1: Marks must be awarded in line with: • • • the specific content of the mark scheme or the generic level descriptors for the question the specific skills defined in the mark scheme or in the generic level descriptors for the question the standard of response required by a candidate as exemplified by the standardisation scripts. GENERIC MARKING PRINCIPLE 2: Marks awarded are always whole marks (not half marks, or other fractions). GENERIC MARKING PRINCIPLE 3: Marks must be awarded positively: • • • • • marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit is given for valid answers which go beyond the scope of the syllabus and mark scheme, referring to your Team Leader as appropriate marks are awarded when candidates clearly demonstrate what they know and can do marks are not deducted for errors marks are not deducted for omissions answers should only be judged on the quality of spelling, punctuation and grammar when these features are specifically assessed by the question as indicated by the mark scheme. The meaning, however, should be unambiguous. GENERIC MARKING PRINCIPLE 4: Rules must be applied consistently e.g. in situations where candidates have not followed instructions or in the application of generic level descriptors. © UCLES 2019 Page 2 of 12 0478/11 Cambridge IGCSE – Mark Scheme PUBLISHED October/November 2019 www.dynamicpapers.com GENERIC MARKING PRINCIPLE 5: Marks should be awarded using the full range of marks defined in the mark scheme for the question (however; the use of the full mark range may be limited according to the quality of the candidate responses seen). GENERIC MARKING PRINCIPLE 6: Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should not be awarded with grade thresholds or grade descriptors in mind. © UCLES 2019 Page 3 of 12 0478/11 Cambridge IGCSE – Mark Scheme PUBLISHED Question Answer 1(a) Printer Statement October/November 2019 www.dynamicpapers.com Marks 2 Can print in colour Inkjet printer Uses a charged drum to create the printed item Laser printer Uses powdered toner Creates output line by line using a print head One mark for correct lines from inkjet One mark for correct lines from laser 1(b) • 1(c) Two from: • Design is created on the computer / software / CAD • Material is loaded to cutter • Different types of material can be used • Uses lasers to cut material « • « that use infra-red • « that produces extreme heat • « that is focussed using a special lens • Can work on both the x,y and z axis © UCLES 2019 1 Laser Page 4 of 12 2 0478/11 Cambridge IGCSE – Mark Scheme PUBLISHED Question 2(a) Answer One mark for each correct denary value Binary October/November 2019 www.dynamicpapers.com Marks 3 Denary 0001001110 78 0110110111 439 1000000001 513 2(b) Two from: • Uses fewer characters // shorter • Easier to read / write / understand • Less likely to make mistakes // less error prone • Easier to debug 2 2(c) One mark for each correct hexadecimal value in correct order 2 B 5 3 © UCLES 2019 Page 5 of 12 0478/11 Cambridge IGCSE – Mark Scheme PUBLISHED Question October/November 2019 www.dynamicpapers.com Answer Marks 3(a) Three from: • Malicious software // type of malware • Tracks / records keypresses // keylogger • Sends data to third party • Collected data is analysed to obtain data 3 3(b) One mark for identified method, one mark for how it prevents spyware: 2 Drop-down boxes // onscreen / virtual keyboard • Means key logger cannot collect data Only requires part of the password • Hacker doesn’t get the full password Two-step verification // Two-factor authentication • Extra data is sent to device making it more difficult for hacker to obtain it • Data has to be entered into the same system // if attempted from a remote location, it will not be accepted Use a biometric device • The person's biological data (e.g. their fingerprint) is also required 3(c) Four from: • Monitors traffic coming into and out of the computer system • Checks that the traffic meets any criteria / rules set • Blocks any traffic that does not meet the criteria / rules set • Allows a set blacklist / whitelist // can block certain IP addresses • Can close certain ports 4 3(d) Two from: • Passwords // biometrics • Levels of access • Proxy servers • Physical security methods – e.g. PC’s in locked rooms, etc. 2 © UCLES 2019 Page 6 of 12 0478/11 Cambridge IGCSE – Mark Scheme PUBLISHED Question Answer October/November 2019 www.dynamicpapers.com Marks 4(a) One from: • Touch screen • Keyboard • Microphone • Mouse 1 4(b) One from: • Headphones • Speakers • Printer • Light / LED 1 4(c) One from: • HDD • SSD • USB drive 1 4(d) Four from: • QR code is scanned using a camera on a mobile device « • « and read / decoded using an application / software • Illuminator shone on code • Squares reflect light differently • Corners of code are used for orientation • Opens document with information // Directs to website with information • QR code can be saved for future reference 4 © UCLES 2019 Page 7 of 12 0478/11 Cambridge IGCSE – Mark Scheme PUBLISHED Question Answer 5(a) • • • • 5(b) One mark for correct byte (Byte) 2 // 01010100 Marks 4 Data is sent down a single wire « « one bit at a time Data is sent in both directions « « but only one direction at a time 4 Three from: • Added up / counted the 1s / 0s • Even parity used // 3 bytes are even • Byte 2 uses odd parity // 1 byte is odd © UCLES 2019 October/November 2019 www.dynamicpapers.com Page 8 of 12 0478/11 Cambridge IGCSE – Mark Scheme PUBLISHED Question Answer October/November 2019 www.dynamicpapers.com Marks 6(a)(i) One from: • Code will run without the need of an interpreter • (Object) Code is platform independent • Source code not available / cannot be modified 1 6(a)(ii) One from: • Source code not available / cannot be modified • Comments, etc. not visible • Future changes will require code to be recompiled 1 6(b)(i) One from: • Protocol is HTTPS • Padlock icon is locked • Can view website certificate 1 6(b)(ii) Five from: • Browser / client sends request to webserver to request identification • Web server sends its digital / security certificate • Browser authenticates certificate « • « if authentic connection, is established • Any data sent is encrypted « • « using public and private keys 5 Four from: • A type of software licence • Free of charge • Normally distributed without the source code • Can legally share / copy • Cannot legally modify code • Cannot resell 4 6(c) © UCLES 2019 Page 9 of 12 0478/11 Cambridge IGCSE – Mark Scheme PUBLISHED Question Answer October/November 2019 www.dynamicpapers.com Marks 6(d)(i) Two from: • File size is reduced « • « so it uses less storage space • « so faster transmission • « so quicker to download 2 6(d)(ii) • 1 © UCLES 2019 Lossless Page 10 of 12 0478/11 Cambridge IGCSE – Mark Scheme PUBLISHED Question Answer 7(a) Input A Input B Output 0 0 0 0 1 1 1 0 1 1 1 1 October/November 2019 www.dynamicpapers.com Marks 1 7(b) • 7(c) One mark for each correct logic gate with correct inputs 5 7(d) Two from: • Can work continuously • Avoids human error • It could be a dangerous environment and will avoid human risk • Detect errors instantly • Maintain consistent and correct conditions 2 © UCLES 2019 1 Exclusive OR / XOR / EOR Page 11 of 12 0478/11 Cambridge IGCSE – Mark Scheme PUBLISHED Question 8 Answer October/November 2019 www.dynamicpapers.com Marks Six from: • PC holds address of the instruction • The address held in PC is sent to MAR « • « using address bus • MAR goes to location in memory where instruction is stored • Instruction sent to MDR « • « using data bus • Instruction sent to CIR • Control unit sends signals to manage the process « • « using the control bus 6 9(a) Two from: • Layout of the webpage • e.g. where a paragraph is placed • Defined using tags 2 9(b) One mark for each correct term in the correct order: • browser • IP address • web server • HTML 4 © UCLES 2019 Page 12 of 12 www.dynamicpapers.com Cambridge Assessment International Education Cambridge International General Certificate of Secondary Education * 2 0 5 9 2 6 7 9 2 0 * 0478/13 COMPUTER SCIENCE October/November 2019 Paper 1 Theory 1 hour 45 minutes Candidates answer on the Question Paper. No Additional Materials are required. No calculators allowed. READ THESE INSTRUCTIONS FIRST Write your centre number, candidate number and name in the spaces at the top of this page. Write in dark blue or black pen. You may use an HB pencil for any diagrams, graphs or rough working. Do not use staples, paper clips, glue or correction fluid. DO NOT WRITE IN ANY BARCODES. Answer all questions. No marks will be awarded for using brand names of software packages or hardware. At the end of the examination, fasten all your work securely together. The number of marks is given in brackets [ ] at the end of each question or part question. The maximum number of marks is 75. This syllabus is regulated for use in England, Wales and Northern Ireland as a Cambridge International Level 1/Level 2 Certificate. This document consists of 12 printed pages. DC (PQ/TP) 173648/2 © UCLES 2019 [Turn over 2 1 www.dynamicpapers.com A library has a system that allows customers to check out the books that they want to borrow. Each book has a barcode that can be used to identify the book. (a) (i) Identify two input devices that may be used in the library’s system. Input device 1 .................................................................................................................... Input device 2 .................................................................................................................... [2] (ii) Identify two storage devices that may be used in the library’s system. Storage device 1 ............................................................................................................... Storage device 2 ............................................................................................................... [2] (iii) Identify two output devices that may be used in the library’s system. Output device 1 ................................................................................................................. Output device 2 ................................................................................................................. [2] (b) The data stored by the library is archived at the end of each day. The archive is held on a server in the library office. The data is encrypted with an 8-bit key. As some of the data is confidential, the library wants to make the encryption more secure. (i) State how the library could make the encryption more secure. ........................................................................................................................................... ..................................................................................................................................... [1] (ii) The term used to describe data before it is encrypted is plain text. State the term used to describe encrypted data. ..................................................................................................................................... [1] © UCLES 2019 0478/13/O/N/19 3 (iii) www.dynamicpapers.com The library’s archive system uses an error detection and correction system that combines a parity check with an automatic repeat request (ARQ). Describe how this system uses the parity check and ARQ. ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... ..................................................................................................................................... [6] (c) The library has a website that customers can use to search for a book. (i) The website has a background colour with the hexadecimal colour code #F92A10 The colour code is stored in two 12-bit binary registers. Show how the colour code would be stored in the registers. F92 A10 [6] © UCLES 2019 0478/13/O/N/19 [Turn over 4 (ii) www.dynamicpapers.com Videos on the library website show customers which books the library will soon have in stock. The library wants the file size of a video to be as small as possible. Identify and describe a method the library could use to reduce the file size of a video as much as possible. ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... ..................................................................................................................................... [4] (d) The library often holds events that introduce new authors. At the events, the library has a Liquid Crystal Display (LCD) screen that displays data, including an image and information about the author. Describe how an LCD screen operates to display this data. ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ............................................................................................................................................. [5] © UCLES 2019 0478/13/O/N/19 5 2 www.dynamicpapers.com A programmer uses a high-level language to write a computer program. (a) Four statements are given about high-level programming languages. Tick (3) to show if each statement is True or False. True (3) Statement False (3) High-level languages need to be translated into machine code to run on a computer High-level languages are written using mnemonic codes High-level languages are specific to the computer’s hardware High-level languages are portable languages [4] (b) Tick (3) to show which of the following is an example of a high-level language program. Example program Tick (3) 1011100000110000 0000011011100010 INP STA ONE INP STA TWO ADD ONE a = input() b = input() if a == b: print("Correct") else: print("Incorrect") [1] © UCLES 2019 0478/13/O/N/19 [Turn over 6 3 www.dynamicpapers.com Blair writes a paragraph about data transmission in her Computer Science examination. Use the list given to complete Blair’s paragraph by inserting the correct five missing terms. Not all terms will be used. Terms can be used more than once. • • • • • duplex half-duplex parallel serial simplex ....................................................................... data transmission is when data is transmitted a single bit at a time. ....................................................................... data transmission is when multiple bits of data are sent all at once. If a user wants to transmit data over a long distance, with the highest chance of accuracy, ....................................................................... data transmission should be used. If data needs to be transmitted in one direction only, for example from a computer to a printer, ....................................................................... data transmission should be used. If a user has a large amount of data to transmit and this needs to be done as quickly as possible ....................................................................... data transmission should be used. © UCLES 2019 0478/13/O/N/19 [5] 7 www.dynamicpapers.com Question 4 starts on page 8. © UCLES 2019 0478/13/O/N/19 [Turn over 8 4 www.dynamicpapers.com A factory that manufactures cleaning products has a system that monitors conditions throughout the manufacturing process. The inputs to the system are: Input A T P Binary value Condition 1 pH > 7 0 pH < = 7 1 Temperature < 35 °C 0 Temperature > = 35 °C 1 Pressure > = 80 % 0 Pressure < 80 % (a) The system will sound an alarm (X) when certain conditions are detected. The alarm will sound when: • The pressure > = 80 % and the temperature > = 35 °C or • The temperature < 35 °C and the pH > 7 Draw a logic circuit to represent the alarm system in the factory. Each logic gate must have a maximum of two inputs. A T X P [4] © UCLES 2019 0478/13/O/N/19 9 www.dynamicpapers.com (b) Complete the truth table for the given logic problem. A T P 0 0 0 0 0 1 0 1 0 0 1 1 1 0 0 1 0 1 1 1 0 1 1 1 Working space X [4] (c) A sensor and a microprocessor are used to monitor the pH of the cleaning products. The system records each reading that is taken. If the reading is greater than 7 a warning message is displayed on a monitor. Explain how the sensor and microprocessor are used in the system. ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ............................................................................................................................................. [6] © UCLES 2019 0478/13/O/N/19 [Turn over www.dynamicpapers.com 10 5 The contents of three binary registers have been transmitted from one computer to another. Odd parity has been used as an error detection method. The outcome after transmission is: • Register A and Register B have been transmitted correctly. • Register C has been transmitted incorrectly. Write the appropriate Parity bit for each register to show the given outcome. Parity bit Register A 0 1 0 0 0 1 1 Register B 0 0 0 0 1 1 1 Register C 0 0 0 0 0 1 1 [3] 6 Jesse is taking his Computer Science examination. He answers five questions about ethics. (a) For the first question, he writes the answer: “This type of software can be copied and shared without the permission of the owner.” State what Jesse is describing. ............................................................................................................................................. [1] (b) For the second question, he writes the answer: “With this type of software, the owner still retains the copyright for the software, but he gives away copies of it for free.” State what Jesse is describing. ............................................................................................................................................. [1] (c) For the third question, he writes the answer: “This type of software is often a trial version of the full software. To use the full version the user normally needs to pay a fee.” State what Jesse is describing. ............................................................................................................................................. [1] © UCLES 2019 0478/13/O/N/19 11 www.dynamicpapers.com (d) For the fourth question, he writes the answer: “This is when a person copies another person’s computer program and tries to claim it as his own.” State what Jesse is describing. ............................................................................................................................................. [1] (e) For the fifth question, he writes the answer: “This is the legal protection that a person can obtain, to provide protection against his work being stolen.” State what Jesse is describing. ............................................................................................................................................. [1] 7 The Von Neumann model for a computer system has several components that are used in the fetch-execute cycle. (a) One component is main memory. (i) Describe what is meant by main memory and how it is used in the Von Neumann model for a computer system. ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... ..................................................................................................................................... [3] (ii) State two other components in the Von Neumann model for a computer system. 1 ........................................................................................................................................ 2 ........................................................................................................................................ [2] © UCLES 2019 0478/13/O/N/19 [Turn over 12 www.dynamicpapers.com (b) Computer systems often use interrupts. Five statements are given about interrupts. Tick (3) to show if each statement is True or False. Statement True (3) False (3) Interrupts can be hardware based or software based Interrupts are handled by the operating system Interrupts allow a computer to multitask Interrupts work out which program to give priority to Interrupts are vital to a computer and it cannot function without them [5] 8 A company discovers malware on its network. Explain two ways that the malware could have been introduced to the company’s network. .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .................................................................................................................................................... [4] Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will be pleased to make amends at the earliest possible opportunity. To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cambridgeinternational.org after the live examination series. Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge. © UCLES 2019 0478/13/O/N/19 www.dynamicpapers.com Cambridge Assessment International Education Cambridge International General Certificate of Secondary Education COMPUTER SCIENCE 0478/13 Paper 1 October/November 2019 MARK SCHEME Maximum Mark: 75 Published This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the details of the discussions that took place at an Examiners’ meeting before marking began, which would have considered the acceptability of alternative answers. Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for Teachers. Cambridge International will not enter into discussions about these mark schemes. Cambridge International is publishing the mark schemes for the October/November 2019 series for most Cambridge IGCSE™, Cambridge International A and AS Level components and some Cambridge O Level components. This syllabus is regulated for use in England, Wales and Northern Ireland as a Cambridge International Level 1/Level 2 Certificate. This document consists of 14 printed pages. © UCLES 2019 [Turn over 0478/13 Cambridge IGCSE – Mark Scheme PUBLISHED October/November 2019 www.dynamicpapers.com Generic Marking Principles These general marking principles must be applied by all examiners when marking candidate answers. They should be applied alongside the specific content of the mark scheme or generic level descriptors for a question. Each question paper and mark scheme will also comply with these marking principles. GENERIC MARKING PRINCIPLE 1: Marks must be awarded in line with: • • • the specific content of the mark scheme or the generic level descriptors for the question the specific skills defined in the mark scheme or in the generic level descriptors for the question the standard of response required by a candidate as exemplified by the standardisation scripts. GENERIC MARKING PRINCIPLE 2: Marks awarded are always whole marks (not half marks, or other fractions). GENERIC MARKING PRINCIPLE 3: Marks must be awarded positively: • • • • • marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit is given for valid answers which go beyond the scope of the syllabus and mark scheme, referring to your Team Leader as appropriate marks are awarded when candidates clearly demonstrate what they know and can do marks are not deducted for errors marks are not deducted for omissions answers should only be judged on the quality of spelling, punctuation and grammar when these features are specifically assessed by the question as indicated by the mark scheme. The meaning, however, should be unambiguous. GENERIC MARKING PRINCIPLE 4: Rules must be applied consistently e.g. in situations where candidates have not followed instructions or in the application of generic level descriptors. © UCLES 2019 Page 2 of 14 0478/13 Cambridge IGCSE – Mark Scheme PUBLISHED October/November 2019 www.dynamicpapers.com GENERIC MARKING PRINCIPLE 5: Marks should be awarded using the full range of marks defined in the mark scheme for the question (however; the use of the full mark range may be limited according to the quality of the candidate responses seen). GENERIC MARKING PRINCIPLE 6: Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should not be awarded with grade thresholds or grade descriptors in mind. © UCLES 2019 Page 3 of 14 0478/13 Cambridge IGCSE – Mark Scheme PUBLISHED Question Answer October/November 2019 www.dynamicpapers.com Marks 1(a)(i) Two from: • 2D scanner • Touchscreen • Keypad/keyboard • Card reader • Mouse • Digital camera 2 1(a)(ii) Two from: • HDD • SSD • USB flash memory drive • SD card • Any optical 2 1(a)(iii) Two from: • Monitor/Touch screen • Speaker • Printer • LED // Light 2 1(b)(i) • Increase the length of the key // make key 12-bit, etc. 1 1(b)(ii) • Cypher text 1 © UCLES 2019 Page 4 of 14 0478/13 Cambridge IGCSE – Mark Scheme PUBLISHED Question 1(b)(iii) 1(c)(i) Answer If parity is correct no error is found An acknowledgement is sent that data is received correctly The next packet of data is transmitted • • • If incorrect parity is found an error has occurred A signal is sent back to request the data is resent The data is resent until data is received correctly/timeout occurs 1 1 1 1 1 1 mark 1 0 0 0 1 0 1 0 0 0 1 mark 0 1 6 0 1 mark 1 mark 1 mark © UCLES 2019 Marks Six from: • The system could use odd or even parity • A parity bit is added • The data is checked to see if it has incorrect/correct parity // by example • • • 0 1 0 0 0 1 mark Page 5 of 14 October/November 2019 www.dynamicpapers.com 0 6 0478/13 Cambridge IGCSE – Mark Scheme PUBLISHED Question 1(c)(ii) October/November 2019 www.dynamicpapers.com Answer One mark for identification: • Compression Marks 4 Three from e.g.: • Best compression would be lossy • Use compression algorithm • This would remove all the unnecessary data from the file // removes detail/sound that the human eye/ear may not see/hear • Reduce colour palette « • « so each pixel requires fewer bits • Reduce resolution • Only store what changes between frames // temporal redundancy 1(d) © UCLES 2019 Five from: • The display is made up of pixels « • « that are arranged together as a matrix • Each pixel has three filters, red, blue and green • Shades of colour are achieved by mixing red, blue and green • The screen is backlit • Light is shone through the liquid crystals • The liquid crystals can be made to turn solid or transparent/on or off « • « by changing the shape of the crystal Page 6 of 14 5 0478/13 Question 2(a) Answer Marks One mark for each correct row 4 True (9) Statement High-level languages need to be translated into machine code to run on a computer False (9) 9 High-level languages are written using mnemonic codes 9 High-level languages are specific to the computer’s hardware 9 9 High-level languages are portable languages © UCLES 2019 October/November 2019 www.dynamicpapers.com Cambridge IGCSE – Mark Scheme PUBLISHED Page 7 of 14 0478/13 Cambridge IGCSE – Mark Scheme PUBLISHED Question 2(b) Answer One mark for the correct tick Example program October/November 2019 www.dynamicpapers.com Marks 1 Tick (9) 1011100000110000 0000011011100010 INP STA ONE INP STA TWO ADD ONE a = input() b = input() if a == b: print("Correct") else: print("Incorrect") 9 Question 3 © UCLES 2019 Answer One mark for each correct term in the correct order • Serial • Parallel • Serial • Simplex • Parallel Marks 5 Page 8 of 14 0478/13 Cambridge IGCSE – Mark Scheme PUBLISHED Question 4(a) © UCLES 2019 Answer One mark for each correct logic gate with correct input(s) October/November 2019 www.dynamicpapers.com Marks 4 Page 9 of 14 0478/13 Cambridge IGCSE – Mark Scheme PUBLISHED Question 4(b) 4(c) © UCLES 2019 Answer October/November 2019 www.dynamicpapers.com Marks Four mark for 8 correct outputs Three marks for 6 or 7 correct outputs Two mark for 4 or 5 correct outputs One mark for 2 or 3 correct outputs 4 A T P Working space X 0 0 0 0 0 0 1 1 0 1 0 0 0 1 1 0 1 0 0 0 1 0 1 1 1 1 0 1 1 1 1 1 Six from: • Sensor sends a signal/reading/data to the microprocessor • Signal/reading/data is analogue and is converted to digital using ADC • Reading/data is stored in the system • Microprocessor compares data/reading to the pre-set value of 7 • If value is greater than 7 « • « a signal/data is sent by the microprocessor to display a warning message on a monitor • The process is continuous Page 10 of 14 6 0478/13 Question 5 October/November 2019 www.dynamicpapers.com Cambridge IGCSE – Mark Scheme PUBLISHED Answer Marks One mark for each correct parity bit 3 Parity bit Register A 0 0 1 0 0 0 1 1 Register B 0 0 0 0 0 1 1 1 Register C 0 0 0 0 0 0 1 1 Question Answer Marks 6(a) • Free software 1 6(b) • Freeware 1 6(c) • Shareware 1 6(d) • Plagiarism // Intellectual property theft 1 6(e) • Copyright 1 © UCLES 2019 Page 11 of 14 0478/13 Cambridge IGCSE – Mark Scheme PUBLISHED Question Answer October/November 2019 www.dynamicpapers.com Marks 7(a)(i) Three from: • RAM • Primary memory • Volatile memory • Holds currently in use data/instructions • Directly accessed by the CPU 3 7(a)(ii) Two from: • Arithmetic and logic unit (ALU) • Memory address register (MAR) • Memory data register (MDR) // Memory buffer register (MBR) • Accumulator (ACC) • Immediate Access Store (IAS) • Control Unit (CU) • Program counter (PC) • Current instruction register (CIR) • Address bus • Data bus • Control bus • Input device • Output device • Secondary storage device 2 © UCLES 2019 Page 12 of 14 0478/13 Question 7(b) Answer Marks One mark for each correct row 5 True (9) Statement Interrupts can be hardware based or software based 9 Interrupts are handled by the operating system 9 Interrupts allow a computer to multitask 9 False (9) 9 Interrupts work out which program to give priority to Interrupts are vital to a computer and it cannot function without them © UCLES 2019 October/November 2019 www.dynamicpapers.com Cambridge IGCSE – Mark Scheme PUBLISHED Page 13 of 14 9 0478/13 Cambridge IGCSE – Mark Scheme PUBLISHED Question 8 © UCLES 2019 Answer Four from: • A hacker could have hacked the network « • « and downloaded the malware onto the network October/November 2019 www.dynamicpapers.com Marks 4 • • Clicking a link/attachment/downloaded a file from an email/on a webpage « « the malware could have been embedded into the link/attachment/file • • Opening an infected software package « « this would trigger the malware to download onto the network • • Inserting an infected portable storage device « « when the drive is accessed the malware is downloaded to the network • • Firewall has been turned off « « so malware would not be detected/checked for when entering network • • Anti-malware has been turned off « « so malware is not detected/checked for when files are downloaded Page 14 of 14 www.dynamicpapers.com Cambridge IGCSE® *0123456789* 0478/01 COMPUTER SCIENCE Paper 1 Theory For examination from 2020 SPECIMEN PAPER 1 hour 45 minutes Candidates answer on the question paper. No additional materials are required. READ THESE INSTRUCTIONS FIRST Write your centre number, candidate number and name in the spaces at the top of this page. Write in dark blue or black pen. You may use an HB pencil for any diagrams, graphs or rough working. Do not use staples, paper clips, glue or correction fluid. DO NOT WRITE IN ANY BARCODES. Calculators must not be used in this paper. Answer all questions. No marks will be awarded for using brand names of software packages or hardware. At the end of the examination, fasten all your work securely together. The number of marks is given in brackets [ ] at the end of each question or part question. The maximum number of marks is 75. This document consists of 14 printed pages. © UCLES 2017 [Turn over 2 1 www.dynamicpapers.com A company selling CDs uses a unique 6-digit identification number for each CD title. The rightmost digit (position 1) is a check digit. For example, digit position identification number 6 5 4 3 2 1 3 0 6 1 4 9 check digit The validity of the number and check digit is calculated as follows: • • • • multiply each digit by its digit position add up the results of the multiplications divide the answer by 11 if the remainder is 0, the identification number and check digit are valid. (a) Show whether the following identification numbers are valid or not. You must show how you arrived at your answer. Identification number 1: 4 2 1 9 2 3 working: valid or not valid? Identification number 2: 8 2 0 1 5 6 working: valid or not valid? © UCLES 2017 [3] 0478/01/SP/20 3 www.dynamicpapers.com (b) Find the check digit for this identification number. 5 0 2 4 1 __ working: check digit: [2] (c) Describe, with examples, two different types of data entry errors that a check digit would detect. 1 2 [2] 2 Kamil is setting up a new computer system to record television programmes. He wants to be able to record, view and then erase programmes that he does not want to keep. He has chosen to use DVD-RAM as an optical storage medium. Explain to Kamil why it is better to use DVD-RAM rather than DVD+RW or DVD-RW. 1 2 [2] © UCLES 2017 0478/01/SP/20 [Turn over www.dynamicpapers.com 4 3 An alarm, Y, sends a signal (Y = 1) when certain fault conditions in a chemical process are detected. The inputs are: Input Binary value Condition 1 acidity > 5 0 acidity <= 5 1 temperature >= 120°C 0 temperature < 120°C 1 stirrer bar ON 0 stirrer bar OFF A T S The alarm, Y, returns a value of 1 if: either temperature >= 120°C AND stirrer bar is OFF or acidity > 5 AND temperature < 120°C (a) Draw the logic circuit for the above system using these logic gates. NOT AND OR A Y T S [5] © UCLES 2017 0478/01/SP/20 www.dynamicpapers.com 5 (b) Complete the truth table for this alarm system. A T S 0 0 0 0 0 1 0 1 0 0 1 1 1 0 0 1 0 1 1 1 0 1 1 1 Y [4] © UCLES 2017 0478/01/SP/20 [Turn over 6 4 www.dynamicpapers.com A digital alarm clock is controlled by a microprocessor. It uses the 24-hour clock system (i.e. 6 pm is 18:00). Each digit in a typical display is represented by a 4-digit binary code. For example: 0 0 0 0 1st digit (0) 1 0 0 0 2nd digit (8) 0 0 1 1 3rd digit (3) 0 1 0 1 4th digit (5) is represented by: (clock display) (a) What time is shown on the clock display if the 4-digit binary codes are: 0 0 0 1 0 1 1 0 0 1 0 0 1 0 0 1 (clock display) [2] (b) What would be stored in the 4-digit binary codes if the clock display time was: 1st digit 2nd digit 3rd digit 4th digit [4] © UCLES 2017 0478/01/SP/20 7 www.dynamicpapers.com (c) The clock alarm has been set at 08:00. Describe the actions of the microprocessor which enable the alarm to sound at 08:00. [2] 5 Bytes of data transferred using a serial cable are checked for errors at the receiving end using an even parity check. Can these bytes of data pass the even parity check? (a) 01010101 [1] (b) 11001000 [1] (c) How can any errors be corrected? [2] © UCLES 2017 0478/01/SP/20 [Turn over 8 6 www.dynamicpapers.com The conditions in a fish tank are being controlled using sensors and a microprocessor. To keep the fish healthy, the temperature must be at 25°C and the oxygen content needs to be 20 ppm (parts per million). The tank contains a heater and an oxygen inlet controlled by a valve. heater oxygen supply sensor A sensor B microprocessor (a) Name the two sensors used in this application. Sensor A Sensor B [2] (b) Describe how the sensors and the microprocessor are used to maintain the correct conditions in the fish tank. [4] (c) What safeguards are needed to stop the fish tank temperature rising too high? [1] © UCLES 2017 0478/01/SP/20 9 7 www.dynamicpapers.com Ahmed uses the Internet for some time and is puzzled by the terminology. (a) Draw a line to match each description to the appropriate technical term. authoring language used to create documents to be viewed on the World Wide Web Browser computer that responds to requests to provide information and services over the Internet HTML defines how messages are transmitted and formatted over the Internet MAC address numerical ID for each device on the Internet Internet Server software that enables users to access/view documents and other resources on the Internet IP address unique ID for a network interface card http [5] (b) Ahmed sees the message “Set your browser to accept cookies”. Explain why some websites make this request. [2] © UCLES 2017 0478/01/SP/20 [Turn over 10 8 www.dynamicpapers.com Computer memories are measured in terms of the number of bytes. (a) (i) What is meant by the term byte? [1] (ii) The number of bytes in a Gigabyte can be written as 2x What is the value of x? [1] (b) Flash memories and CD-RWs are used as backing media for computers. Give two differences between these two media. 1 2 [2] 9 Andrew sends a large document to a printer. (a) State the name for the area of memory used to store temporarily the data being sent to the printer. [1] (b) The printer runs out of paper during the printing job. A signal is sent back to the computer to stop temporarily its current task. Name this type of signal. [1] © UCLES 2017 0478/01/SP/20 11 www.dynamicpapers.com 10 In a simple symmetric encryption system, each letter of the alphabet is substituted with another. The plain text message: The quick brown fox jumps over the lazy dog. becomes the cypher text message: Zag towvs jumpy dmh coilr mngu zag bfke qmx. (a) (i) Decode this cypher text message. Agbbm Pmubq [2] (ii) Convert these words to cypher text. Computer Science [2] (b) Both the person who sends the message and the person who receives it need to know what the substitution key is, and they need to keep this secret. A copy of the substitution key has been sent using SSL transmission. (i) What is meant by SSL? [1] (ii) How does SSL keep the copy of the key secret during transmission? [1] © UCLES 2017 0478/01/SP/20 [Turn over 12 www.dynamicpapers.com 11 Five security or data loss issues are shown on the left-hand side. Five possible methods of data recovery or protection are shown on the right. Draw a line to match each definition/description of Issues to the most appropriate Methods of Data Recovery. Issues Methods of Data Recovery data loss caused by hard disk head crash anti-spyware software hacking into files and changing or deleting data anti-virus software introduction of software that self-replicates and can cause data loss back-up files reading of illegally accessed documents encryption software that logs/records all key presses on your computer without you knowing passwords and a firewall [4] © UCLES 2017 0478/01/SP/20 13 www.dynamicpapers.com 12 Look at these two pieces of code: A: CLC LDX loop: LDA ADC STA INX CPX BNE #0 A,X B,X C,X B: FOR Loop INPUT Sum = PRINT NEXT = 1 TO 4 Number1, Number2 Number1 + Number2 Sum #16 loop (a) Which of these pieces of code is written in a high-level language? [1] (b) Give one benefit of writing code in a high-level language. [1] (c) Give one benefit of writing code in a low-level language. [1] (d) High-level languages can be compiled or interpreted. Give two differences between a compiler and an interpreter. 1 2 [2] © UCLES 2017 0478/01/SP/20 [Turn over www.dynamicpapers.com 14 13 When a key is pressed on the keyboard, the computer stores the ASCII representation of the character typed into main memory. The ASCII representation for A is 65 (denary), for B is 66 (denary), etc. There are two letters stored in the following memory locations: Location 1 A Location 2 C (a) (i) Show the contents of Location 1 and Location 2 as binary using 8 bits. Location 1 Location 2 [2] (ii) Show the contents of Location 1 and Location 2 as hexadecimal. Location 1 Location 2 [2] (b) The following machine code instruction is stored in a location of main memory: 1 1 1 1 1 0 1 0 1 0 0 1 0 1 1 1 Convert this binary pattern into hexadecimal. [4] (c) Explain why a programmer would prefer to see the contents of the locations displayed as hexadecimal rather than binary, when debugging his program that reads the key presses. [2] Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will be pleased to make amends at the earliest possible opportunity. Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge. © UCLES 2017 0478/01/SP/20 www.dynamicpapers.com Cambridge IGCSE® 0478/01 COMPUTER SCIENCE Paper 1 Theory For examination from 2020 MARK SCHEME Maximum Mark: 75 Specimen This document consists of 8 printed pages. © UCLES 2017 [Turn over 2 1 www.dynamicpapers.com (a) 1 mark for the correct working in BOTH parts 1 mark for valid 1 mark for not valid Identification number 1: working = (4 × 6) + (2 × 5) + (1 × 4) + (9 × 3) + (2 × 2) + (3 × 1) = 24 + 10 + 4 + 27 + 4 + 3 = 72 ÷ 11 = 6 remainder 6 valid/not valid: NOT valid Identification number 2: working = (8 × 6) + (2 × 5) + (0 × 4) + (1 × 3) + (5 × 2) + (6 × 1) = 48 + 10 + 0 + 3 + 10 + 6 = 77 ÷ 11 = 7 remainder 0 valid/not valid: VALID [3] (b) 1 mark for correct working + 1 mark for check digit working = (5 × 6) + (0 × 5) + (2 × 4) + (4 × 3) + (1 × 2) = 30 + 0 + 8 + 12 + 2 = 52 need to add 3 to make the total 55 (i.e. exactly divisible by 11) check digit: 3 [2] (c) 1 mark for each description and example 2 – – 2 digits transposed (e.g. 280419 becomes 280149/two digits have been switched) incorrect digit (e.g. 280419 becomes 250419/one of the digits has been mistyped) [2] direct access because of concentric tracks can read and write at the same time because it has a read/write head [2] © UCLES 2017 0478/01/SM/20 www.dynamicpapers.com 3 3 (a) 1 mark for each logic gate correctly connected A AND NOT Y OR T AND S NOT [5] (b) A T S Y 0 0 0 0 0 0 1 0 0 1 0 1 0 1 1 0 1 0 0 1 1 0 1 1 1 1 0 1 1 1 1 0 } ] ] ] ] 1 mark 1 mark 1 mark 1 mark [4] 4 (a) 1 mark for hours; 1 mark for minutes 1 6 : 4 9 1 mark 1 mark [2] (b) 1 mark for each digit 0 0 0 1 © UCLES 2017 0 1 0 0 0 1 1 0 1 1 0 1 1st digit 2nd digit 3rd digit 4th digit [4] 0478/01/SM/20 [Turn over 4 5 (c) Any two from: – microprocessor compares present time with stored time – if the values are the same – sends signal to sound alarm [2] (a) Yes [1] (b) No [1] (c) – – 6 www.dynamicpapers.com re-reading the byte that was sent request that the byte is resent [2] (a) Only answers: – temperature (sensor) – oxygen (sensor) [2] (b) Any four from: – information from the sensors sent to microprocessor – the ADC converts the analogue data into digital form – if temperature < 25ºC OR temperature checked against stored value – ...microprocessor sends signal to heater/actuator/valve... – ...to switch on heater – if oxygen level < 20 ppm OR oxygen level checked against stored value – ...to open valve/oxygen supply – use of DAC between microprocessor and devices – sounds an alarm if system unable to respond – continuously monitors sensor inputs – any reference to feedback [4] (c) Any one from: – unsafe limit stored in memory – warning sound/signal if too high a value reached – fail safe switch off in case of a malfunction [1] © UCLES 2017 0478/01/SM/20 5 7 www.dynamicpapers.com (a) authoring language used to create documents to be viewed on the World Wide Web Browser computer that responds to requests to provide information and services over the Internet HTML defines how messages are transmitted and formatted over the Internet MAC address numerical ID for each device on the Internet Internet Server software that enables users to access/view documents and other resources on the Internet IP address unique ID for a network interface card http 5/6 matches – 5 marks 4 matches – 4 marks 3 matches – 3 marks 2 matches – 2 marks 1 match – 1 mark [5] (b) any two from: – to enable logon information to be kept on his computer – to provide pages customised for Ahmed the next time he logs on – to implement shopping carts and one-click purchasing – to be able to distinguish between new and repeat visitors to the website © UCLES 2017 0478/01/SM/20 [2] [Turn over 6 8 www.dynamicpapers.com (a) (i) Any one from: – unit of data/memory – 8 bits – used to represent a character (ii) 30 [1] [1] (b) Any two from: Flash memory – solid state memory – no formatting issues – plugs directly into the USB port – direct transfer of data CD-RW – optical media – slower access speed/flash memory has faster access speed – requires a separate drive – data needs to be burnt/finalised/finished (before being used on another device) 9 [2] (a) Any one from: – buffer – RAM [1] (b) – [1] interrupt 10 (a) 1 mark for each correct word (i) Hello World [2] (ii) Vmilozgu Rvwgyvg [2] (b) (i) Secure Socket Layer [1] (ii) the key itself is encrypted using strong encryption © UCLES 2017 0478/01/SM/20 [1] 7 www.dynamicpapers.com 11 data loss caused by hard disk head crash anti-spyware software hacking into files and changing or deleting data anti-virus software introduction of software that self-replicates and can cause data loss back-up files reading of illegally accessed documents encryption software that logs/records all key presses on your computer without you knowing passwords and a firewall 5/4 matches – 4 marks 3 matches – 3 marks 2 matches – 2 marks 1 match – 1 mark [4] 12 (a) code B [1] (b) Any one from: – no need to understand workings of a computer – easier to understand for programmer/closer to English – much easier to debug – much easier to test – one-to-many when writing commands – not machine-specific/portable [1] (c) Any one from: – can address memory addresses directly – no need for compilers/interpreters – shorter code/code requires less storage/RAM – can be written to run faster [1] © UCLES 2017 0478/01/SM/20 [Turn over www.dynamicpapers.com 8 (d) – – – – – compiler produces object code / interpreter doesn’t produce object code compiler translates whole program in one go / interpreter translates and executes line at a time compiler produces list of all errors / interpreter produces error message each time an error encountered compiler produces “stand alone code” / interpreter doesn’t produce “stand alone code” compilation process is slow but resultant code runs very quickly / interpreted code runs slowly [2] 13 (a) (i) Location 1 0 1 0 0 0 0 0 1 Location 2 0 1 0 0 0 0 1 1 [2] (ii) 41 43 [2] (b) FA97 [4] (c) – – [2] © UCLES 2017 easier to identify values easier to spot errors 0478/01/SM/20 www.dynamicpapers.com Cambridge IGCSE™ * 6 0 8 9 4 1 6 9 5 3 * COMPUTER SCIENCE 0478/12 February/March 2020 Paper 1 Theory 1 hour 45 minutes You must answer on the question paper. No additional materials are needed. INSTRUCTIONS ● Answer all questions. ● Use a black or dark blue pen. You may use an HB pencil for any diagrams or graphs. ● Write your name, centre number and candidate number in the boxes at the top of the page. ● Write your answer to each question in the space provided. ● Do not use an erasable pen or correction fluid. ● Do not write on any bar codes. ● Calculators must not be used in this paper. INFORMATION ● The total mark for this paper is 75. ● The number of marks for each question or part question is shown in brackets [ ]. ● No marks will be awarded for using brand names of software packages or hardware. This document has 12 pages. Blank pages are indicated. DC (CJ/CB) 186307/3 © UCLES 2020 [Turn over www.dynamicpapers.com 2 1 The Von Neumann model for a computer system uses components, such as registers and buses, in the fetch-execute cycle. (a) Draw a line to connect each component to its correct description. Component Description Control Bus Increments to point to the address of the next instruction to be fetched Program Counter (PC) Holds the result of a calculation. It is located within the Arithmetic Logic Unit (ALU) Memory Data Register (MDR) Carries signals to synchronise the fetch-execute cycle Accumulator (ACC) Temporary storage between the Central Processing Unit (CPU) and primary memory [3] (b) State two buses, other than the control bus, used in the Von Neumann model for a computer system. 1 ................................................................................................................................................ 2 ................................................................................................................................................ [2] 2 A school network is used to transmit and store data about students. (a) Different types and methods of transmission can be used to send data across the network. Three descriptions about data transmission are given. Tick (3) one Method and tick (3) one Type for each description. Method Serial (3) Description Parallel (3) Type Simplex (3) Halfduplex (3) Duplex (3) Data is sent down a single wire in a single direction only. Data is sent down multiple wires in both directions, at the same time. Data is sent down a single wire in both directions, but never at the same time. © UCLES 2020 0478/12/F/M/20 [3] www.dynamicpapers.com 3 (b) Parity bits are used to help detect errors in data transmission. A parity bit is added to each binary value before transmission. Three binary values are to be transmitted using even parity. (i) Complete the parity bit that would be added to each binary value for even parity. Binary value Parity bit 1 1 0 0 1 1 1 1 0 1 0 1 0 1 0 1 1 0 1 0 0 [3] (ii) A number of errors occurred during data transmission. State why a parity check may not detect transmission errors. ........................................................................................................................................... ..................................................................................................................................... [1] (c) Data is encrypted using 128-bit symmetric encryption before it is transmitted. (i) Explain what is meant by encryption. ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... ..................................................................................................................................... [2] (ii) State how the strength of the encryption can be improved. ........................................................................................................................................... ..................................................................................................................................... [1] © UCLES 2020 0478/12/F/M/20 [Turn over 4 www.dynamicpapers.com (d) Describe how the school could prevent the loss of stored data. ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ............................................................................................................................................. [6] 3 Priya studies music at school. She is buying a new computer to complete her school work at home. (a) Priya has a choice between an internal Hard Disk Drive (HDD) and an internal Solid State Drive (SSD) to store data. (i) Give one similarity between an HDD and an SSD. ........................................................................................................................................... ..................................................................................................................................... [1] (ii) Explain three differences between an HDD and an SSD. 1 ........................................................................................................................................ ........................................................................................................................................... ........................................................................................................................................... 2 ........................................................................................................................................ ........................................................................................................................................... ........................................................................................................................................... 3 ........................................................................................................................................ ........................................................................................................................................... ........................................................................................................................................... [3] © UCLES 2020 0478/12/F/M/20 5 www.dynamicpapers.com (b) Priya needs to transfer files between the school and her home computer. Identify one off-line storage device she could use to transport the files. ............................................................................................................................................. [1] (c) Priya is using sound editing software to record and edit different music tracks. (i) Identify two input devices she would use for this task. Device 1 ............................................................................................................................ Device 2 ............................................................................................................................ [2] (ii) Identify two output devices she would use for this task. Device 1 ............................................................................................................................ Device 2 ............................................................................................................................ [2] (d) Priya shares her sound files with other students. Before sharing the sound files, she compresses the files using lossless compression. Describe how lossless compression reduces the size of a sound file. ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ............................................................................................................................................. [2] (e) Priya currently uses MIDI files to store her music. Priya’s friends have asked her if they can have an MP3 version of the file. (i) Give two features of a MIDI file. 1 ........................................................................................................................................ ........................................................................................................................................... 2 ........................................................................................................................................ ........................................................................................................................................... [2] © UCLES 2020 0478/12/F/M/20 [Turn over 6 (ii) www.dynamicpapers.com Give two features of an MP3 file. 1 ........................................................................................................................................ ........................................................................................................................................... 2 ........................................................................................................................................ ........................................................................................................................................... [2] 4 Assemblers, compilers and interpreters are types of translators. Tick (3) to show which statements apply to each translator. Each statement may apply to more than one type of translator. Assembler (3) Statement Compiler (3) Interpreter (3) Translates low-level language to machine code Translates high-level language to machine code Produces error messages Translates high-level language one line at a time Produces an executable file [5] 5 Programmers can use denary and hexadecimal values. These values are stored in a computer system using binary. (a) Explain why binary is used to store data in a computer system. ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ............................................................................................................................................. [2] © UCLES 2020 0478/12/F/M/20 7 www.dynamicpapers.com (b) Complete the table to show how the denary value would be stored as binary in an 8-bit register. Denary value 8-bit register 129 56 [2] Working space ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... (c) Complete the table to show how the hexadecimal value 3A9 would be stored as binary in a 12-bit register. [3] (d) Identify two uses of hexadecimal values in computer science. 1 ................................................................................................................................................ 2 ................................................................................................................................................ [2] © UCLES 2020 0478/12/F/M/20 [Turn over 8 6 www.dynamicpapers.com (a) Complete the truth table for the given logic circuit. Do not attempt to simplify the logic circuit. A B X C A B C 0 0 0 0 0 1 0 1 0 0 1 1 1 0 0 1 0 1 1 1 0 1 1 1 Working space X [4] © UCLES 2020 0478/12/F/M/20 9 www.dynamicpapers.com (b) A water control system uses a switch and two pressure sensors. The outputs of the switch and sensors are shown in the table. Sensor or Switch Output of 1 Output of 0 Switch (S1) On Off Pressure Sensor (P1) >= 3 <3 Pressure Sensor (P2) >= 3 <3 Create a logic circuit that will produce an output (X) of 1 when: The switch S1 is on and either P1 is less than 3 or P2 is less than 3, but not both. All logic gates used must have a maximum of two inputs. S1 P1 X P2 [4] © UCLES 2020 0478/12/F/M/20 [Turn over 10 7 www.dynamicpapers.com A room has an automatic lighting system. Electric lights are automatically turned on when a person enters the room and the natural light level in the room is 10 or less. Explain how sensors and a microprocessor are used to control the electric lights in the room. .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .................................................................................................................................................... [7] © UCLES 2020 0478/12/F/M/20 11 8 www.dynamicpapers.com A student website provides research support and software downloads. (a) Students use a browser to access the web pages. Explain the role of a browser in this process. ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ............................................................................................................................................. [5] (b) The website owners are worried about a denial of service (DoS) attack. Explain the term denial of service attack. ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ............................................................................................................................................. [3] (c) The website owners are also concerned about the ethical issues of copyright and plagiarism. (i) State what is meant by the term copyright. ........................................................................................................................................... ..................................................................................................................................... [1] (ii) State what is meant by the term plagiarism. ........................................................................................................................................... ..................................................................................................................................... [1] © UCLES 2020 0478/12/F/M/20 12 www.dynamicpapers.com BLANK PAGE Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will be pleased to make amends at the earliest possible opportunity. To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cambridgeinternational.org after the live examination series. Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge. © UCLES 2020 0478/12/F/M/20 www.dynamicpapers.com Cambridge IGCSE™ COMPUTER SCIENCE 0478/12 Paper 1 March 2020 MARK SCHEME Maximum Mark: 75 Published This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the details of the discussions that took place at an Examiners’ meeting before marking began, which would have considered the acceptability of alternative answers. Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for Teachers. Cambridge International will not enter into discussions about these mark schemes. Cambridge International is publishing the mark schemes for the March 2020 series for most Cambridge IGCSE™, Cambridge International A and AS Level components and some Cambridge O Level components. This document consists of 14 printed pages. © UCLES 2020 [Turn over 0478/12 Cambridge IGCSE – Mark Scheme PUBLISHED Generic Marking Principles March 2020 www.dynamicpapers.com These general marking principles must be applied by all examiners when marking candidate answers. They should be applied alongside the specific content of the mark scheme or generic level descriptors for a question. Each question paper and mark scheme will also comply with these marking principles. GENERIC MARKING PRINCIPLE 1: Marks must be awarded in line with: • • • the specific content of the mark scheme or the generic level descriptors for the question the specific skills defined in the mark scheme or in the generic level descriptors for the question the standard of response required by a candidate as exemplified by the standardisation scripts. GENERIC MARKING PRINCIPLE 2: Marks awarded are always whole marks (not half marks, or other fractions). GENERIC MARKING PRINCIPLE 3: Marks must be awarded positively: • • • • • marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit is given for valid answers which go beyond the scope of the syllabus and mark scheme, referring to your Team Leader as appropriate marks are awarded when candidates clearly demonstrate what they know and can do marks are not deducted for errors marks are not deducted for omissions answers should only be judged on the quality of spelling, punctuation and grammar when these features are specifically assessed by the question as indicated by the mark scheme. The meaning, however, should be unambiguous. GENERIC MARKING PRINCIPLE 4: Rules must be applied consistently e.g. in situations where candidates have not followed instructions or in the application of generic level descriptors. © UCLES 2020 Page 2 of 14 0478/12 Cambridge IGCSE – Mark Scheme PUBLISHED March 2020 www.dynamicpapers.com GENERIC MARKING PRINCIPLE 5: Marks should be awarded using the full range of marks defined in the mark scheme for the question (however; the use of the full mark range may be limited according to the quality of the candidate responses seen). GENERIC MARKING PRINCIPLE 6: Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should not be awarded with grade thresholds or grade descriptors in mind. © UCLES 2020 Page 3 of 14 0478/12 Cambridge IGCSE – Mark Scheme PUBLISHED Question 1(a) Answer Component Description Control Bus Increments to point to the address of the next instruction to be fetched Program Counter (PC) Holds the result of a calculation. It is located within the Arithmetic Logic Unit (ALU) Memory Data Register (MDR) Carries signals to synchronise the fetch-execute cycle Accumulator (ACC) Temporary storage between the Central Processing (CPU) and primary memory March 2020 www.dynamicpapers.com Mark 3 1 mark for 1 correct line 2 marks for 2 correct lines 3 marks for 3/4 correct lines 1(b) © UCLES 2020 Any two from: • Address bus • Data bus 2 Page 4 of 14 0478/12 Question 2(a) March 2020 www.dynamicpapers.com Cambridge IGCSE – Mark Scheme PUBLISHED Answer Mark 1 mark per each correct row: 3 Method Description Serial () Data is sent down a single wire in a single direction only. Parallel () Data is sent down multiple wires in both directions, at the same time. Simplex () © UCLES 2020 Duplex () 1 mark for each correct parity bit: 3 Binary Value 2(b)(ii) Halfduplex () Data is sent down a single wire in both directions, but never at the same time. 2(b)(i) Type Parity Bit 1 1 0 0 1 1 1 1 1 0 1 0 1 0 1 0 0 1 1 0 1 0 0 1 Any one from: • Transposition error // bits are interchanged • Bits still add up to even number • Even number of errors has occurred 1 Page 5 of 14 0478/12 Cambridge IGCSE – Mark Scheme PUBLISHED Question Answer March 2020 www.dynamicpapers.com Mark 2(c)(i) Any two from: • Scrambles data • … making it meaningless/unintelligible • Uses an algorithm / key • Data / plain text is changed to cipher text 2 2(c)(ii) Any one from: • Increase the length of the key // use more than 128 bits • Uses a more complex encryption algorithm 1 © UCLES 2020 Page 6 of 14 0478/12 Cambridge IGCSE – Mark Scheme PUBLISHED Question 2(d) © UCLES 2020 Answer Any six from (max four for identification of method only): March 2020 www.dynamicpapers.com Mark 6 • • Backups … if data is lost can be replaced • • Install antivirus // Anti malware … detects/deletes viruses that could corrupt/delete data • • Install firewall … helps prevent hackers gaining access and deleting/corrupting data • • • Password / Biometrics Two factor authentication // two-step verification … helps prevent unauthorised access and the deletion/corruption of data • • Access rights … helps prevent users accessing data they should not see and deleting it • • Network/usage policy … gives users guidance on data use // by example • • • Surge protection // Uninterrupted power supply (UPS) … prevents loss of data that has not been saved … prevents damage to hardware (that stores data) • • Physical method // by example … helps prevent unauthorised access and the deletion/corruption of data Page 7 of 14 0478/12 Cambridge IGCSE – Mark Scheme PUBLISHED Question March 2020 www.dynamicpapers.com Answer Mark 3(a)(i) Any one from: • They are both non-volatile • They are both secondary storage // Both not directly accessed by the CPU • They both have a high capacity of storage • Both have read and write abilities 1 3(a)(ii) Any three from: • HDD has moving parts but SSD does not • HDD uses magnetic storage whereas SSD uses flash memory • HDD is slower to access data than SSD // HDD has greater latency than SSD • HDD will create noise/heat, whereas SSD runs quieter/cooler • HDD has higher power consumption than SSD • HDD have greater longevity/more read-write cycles whereas SDD has lower longevity/limited number of read-write cycles • HDD larger in physical size/heavier than SSD • HDD is normally cheaper for the same capacity of storage as SSD • HDD is available in a larger storage capacity than SSD 3 Any one from: • USB flash memory drive • External HDD/SSD • SD Card • CD / DVD / Blu-ray 1 3(c)(i) Any two from: • Keyboard • Mouse • Microphone • Touchscreen 2 3(c)(ii) Any two from: • Monitor / Screen • Speakers • Headphones • Printer 2 3(b) © UCLES 2020 Page 8 of 14 0478/12 Cambridge IGCSE – Mark Scheme PUBLISHED Question 3(d) March 2020 www.dynamicpapers.com Answer Any two from: • Uses a compression algorithm • Does not permanently remove any data • Repeated patterns of notes are identified … • … and are grouped, with an index Mark 2 NOTE: Other possible methods of lossless compression of sound can be credited 3(e)(i) Any two from: • Stores the notes played and not the sound • Contains instructions/commands for digital instruments // Is recorded / played on a digital instrument e.g. synthesiser • Stores data about notes e.g. pitch byte (Note: Two examples can be awarded) • Can be a compressed format • Can edit individual notes 2 3(e)(ii) Any two from: • Contains actual sound • Contains samples of the sound wave • Contains metadata // by example • Uses lossy compression • Recorded using microphone // Is recorded/played on an MP3 recorder/player 2 © UCLES 2020 Page 9 of 14 0478/12 March 2020 www.dynamicpapers.com Cambridge IGCSE – Mark Scheme PUBLISHED Question Answer 4 Mark Assembler Compiler Interpreter () () () Statement Translates low-level language to machine code Translates high-level language to machine code Produces error messages () () Translates high-level language one line at a time Produces an executable file () 5 1 mark per each correct row: NOTE: tick shown in brackets () is optional Question Answer Mark 5(a) Any two from: • Computer consist of transistors / logic circuits • … that can only store/process data in two states / as high-low / on-off / 1 and 0 2 5(b) 1 mark per each correct 8-bit binary value: 2 © UCLES 2020 Denary Value 8-bit binary register 129 10000001 56 00111000 Page 10 of 14 0478/12 Question 5(c) Answer 0 1 1 mark © UCLES 2020 Mark 1 mark per each correct conversion: 0 5(d) March 2020 www.dynamicpapers.com Cambridge IGCSE – Mark Scheme PUBLISHED 1 1 3 0 1 0 1 0 0 1 1 mark 1 mark Any two from: • Represent colours in HTML // HTML colour codes • MAC address • Assembly Language • Error messages • IP address • ASCII values • URL • Memory dump • Memory locations 2 Page 11 of 14 0478/12 Question 6(a) Answer Working space Mark A B C 0 0 0 0 0 0 1 0 0 1 0 0 0 1 1 1 1 0 0 1 1 0 1 1 1 1 0 0 1 1 1 1 4 marks for 8 correct outputs 3 marks for 6/7 correct outputs 2 marks for 4/5 correct outputs 1 mark for 2/3 correct outputs © UCLES 2020 March 2020 www.dynamicpapers.com Cambridge IGCSE – Mark Scheme PUBLISHED Page 12 of 14 X 4 0478/12 Cambridge IGCSE – Mark Scheme PUBLISHED Question 6(b) March 2020 www.dynamicpapers.com Answer Mark 4 1 mark for each correct logic gate: NOTE: Can also award 4 marks to a circuit that shows X = (P1 XOR P2) AND (S1) Question 7 © UCLES 2020 Answer Any seven from: • Uses light sensor and Infrared / Motion / Pressure sensor • Sensors send data to the microprocessor • Data is converted from analogue to digital (using ADC) • Microprocessor compares both values to stored values • If motion value is out of range/in range, light value is checked // If light value is <= 10, motion value is checked • If light value is <= 10 lights are turned on // If motion value is out of range/in range lights are turned on … • … by sending a signal to actuator • Lights remain on for set period (and then turn off) // If motion is in range/out of range or light is > 10 then signal sent to turn lights off • Process repeats / is continuous Page 13 of 14 Mark 7 0478/12 Cambridge IGCSE – Mark Scheme PUBLISHED Question March 2020 www.dynamicpapers.com Answer Mark 8(a) Any five from: • Sends the URL of the website • … to a DNS to find the IP address • Connects to the webserver (using the IP address) … • … using HTTP / HTTPS • Renders/Translates the HTML • Runs active/client-side scripts built into webpages • Manages SSL/TLS certificate process • Stores/retrieves cookies 5 8(b) Any three from: • Webserver is sent multiple requests // Requests flood the webserver … • … at the same time • Webserver crashes / runs slow • Designed to prevent access to e.g. a website // Stops legitimate requests being processed/serviced 3 8(c)(i) • 1 8(c)(ii) Any one from: • To claim other’s work as your own • To use other people’s work without consent / acknowledgement • Theft of intellectual property © UCLES 2020 A law/legislation that requires permission to use intellectual property / other people’s work Page 14 of 14 1 www.dynamicpapers.com Cambridge IGCSE™ * 9 1 1 9 7 5 8 2 3 8 * COMPUTER SCIENCE 0478/12 May/June 2020 Paper 1 Theory 1 hour 45 minutes You must answer on the question paper. No additional materials are needed. INSTRUCTIONS ● Answer all questions. ● Use a black or dark blue pen. You may use an HB pencil for any diagrams or graphs. ● Write your name, centre number and candidate number in the boxes at the top of the page. ● Write your answer to each question in the space provided. ● Do not use an erasable pen or correction fluid. ● Do not write on any bar codes. ● Calculators must not be used in this paper. INFORMATION ● The total mark for this paper is 75. ● The number of marks for each question or part question is shown in brackets [ ]. ● No marks will be awarded for using brand names of software packages or hardware. This document has 12 pages. Blank pages are indicated. DC (CE/SW) 189019/3 © UCLES 2020 [Turn over 2 1 www.dynamicpapers.com A Von Neumann model for a computer system has a central processing unit (CPU) that makes use of registers. (a) Identify three registers that may be used. Register 1 ................................................................................................................................. Register 2 ................................................................................................................................. Register 3 ................................................................................................................................. [3] (b) The CPU is responsible for processing instructions. One stage of processing instructions is the decode stage. (i) Identify the two other stages of processing instructions. Stage 1 .............................................................................................................................. Stage 2 .............................................................................................................................. [2] (ii) Identify the component of the CPU that is responsible for decoding instructions. ..................................................................................................................................... [1] 2 Both an interpreter and a compiler can be used when writing a program in a high-level language. (a) Explain why a programmer would make use of both an interpreter and a compiler. ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ............................................................................................................................................. [4] © UCLES 2020 0478/12/M/J/20 3 www.dynamicpapers.com (b) Give three reasons why a programmer would choose to write a program in a high-level language, instead of a low-level language. Reason 1 .................................................................................................................................. ................................................................................................................................................... Reason 2 .................................................................................................................................. ................................................................................................................................................... Reason 3 .................................................................................................................................. ................................................................................................................................................... [3] 3 A company collects and stores data about its customers. The data is stored on a server in the company’s office. The data is transmitted to cloud storage to create a back-up. The data is encrypted using symmetric encryption before it is sent to the cloud storage. (a) Describe how the data is encrypted. ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ............................................................................................................................................. [4] (b) Give three other methods that can be used to secure the data in the office. Method 1 ................................................................................................................................... ................................................................................................................................................... Method 2 ................................................................................................................................... ................................................................................................................................................... Method 3 ................................................................................................................................... ................................................................................................................................................... [3] © UCLES 2020 0478/12/M/J/20 [Turn over www.dynamicpapers.com 4 4 (a) Identify the name and draw the single logic gate that can replace the given logic circuits. (i) A X B Name of gate: …………………………… Drawing of gate: [2] (ii) A X B Name of gate: …………………………… Drawing of gate: [2] (b) Complete the truth table for the given logic statement: X = (((A OR C) AND (NOT A AND NOT C)) XOR B) A B C 0 0 0 0 0 1 0 1 0 0 1 1 1 0 0 1 0 1 1 1 0 1 1 1 Working space X [4] © UCLES 2020 0478/12/M/J/20 5 5 www.dynamicpapers.com Meena uses a browser to research information for her business. (a) Give three functions of a browser. 1 ................................................................................................................................................ 2 ................................................................................................................................................ 3 ................................................................................................................................................ [3] (b) Meena buys products for her business using the Internet. The Transport Layer Security (TLS) protocol is used for transferring data when she buys products. One layer of the TLS protocol is the handshake layer. (i) Describe the purpose of the handshake layer. ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... ..................................................................................................................................... [2] (ii) Identify the other layer of the TLS protocol. ..................................................................................................................................... [1] (iii) Identify another protocol that can be used to transfer data securely. ..................................................................................................................................... [1] (c) Meena visits a website to buy products for her business. The browser uses a small file to store the details of the products she views. This allows the website to display advertisements for other products she may like. The small file also stores her log-in details. Give the name of this type of file. ............................................................................................................................................. [1] © UCLES 2020 0478/12/M/J/20 [Turn over 6 6 www.dynamicpapers.com Six statements are given about touch screen technology. Tick (3) to show if the statement applies to Capacitive or Resistive touch screen technology. Capacitive (3) Statement Resistive (3) Needs pressure to be applied to create a circuit May not register a touch if the user is wearing gloves More commonly used in smartphones More responsive to a touch Needs an electrical field to be changed to register a touch Cheaper to manufacture [6] © UCLES 2020 0478/12/M/J/20 7 7 www.dynamicpapers.com (a) Give the denary value of each of the three 12-bit binary values. (i) 000000001100 ..................................................................................................................................... [1] (ii) 000011000110 ..................................................................................................................................... [1] (iii) 010011000001 ..................................................................................................................................... [1] Working space ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... (b) 12-bit binary values can also be represented as hexadecimal values. Give the hexadecimal value of the 12-bit binary value. 000011101001 ............................................................................................................................................. [3] © UCLES 2020 0478/12/M/J/20 [Turn over 8 8 www.dynamicpapers.com Leonard has a new laser printer to print letters for his business. Leonard connects his printer to his computer using the USB port. (a) Give three benefits of using the USB port to connect the printer to the computer. Benefit 1 ................................................................................................................................... ................................................................................................................................................... Benefit 2 ................................................................................................................................... ................................................................................................................................................... Benefit 3 ................................................................................................................................... ................................................................................................................................................... [3] (b) State two benefits and one drawback of Leonard using a laser printer, instead of an inkjet printer, to print the letters. Benefit 1 ................................................................................................................................... ................................................................................................................................................... Benefit 2 ................................................................................................................................... ................................................................................................................................................... Drawback .................................................................................................................................. ................................................................................................................................................... [3] (c) An interrupt signal is sent from the printer to the computer. (i) Give two examples of when a printer would generate an interrupt signal. Example 1 ......................................................................................................................... Example 2 ......................................................................................................................... [2] (ii) Many devices send interrupt signals. Identify the software in the computer that will receive and manage all interrupt signals. ..................................................................................................................................... [1] © UCLES 2020 0478/12/M/J/20 9 9 www.dynamicpapers.com (a) Six statements are given about storage devices. Tick (3) to show if the statement applies to hard disk drive (HDD) storage or solid state drive (SSD) storage. Some statements can apply to both. Statement HDD (3) SSD (3) It has a limited number of read/write cycles It uses magnetic properties to store data It has moving parts It is non-volatile storage It can be used as an external storage device to back up data It uses flash memory to store data [6] (b) Optical storage is another type of storage. Give two examples of optical storage. Example 1 ................................................................................................................................. Example 2 ................................................................................................................................. [2] © UCLES 2020 0478/12/M/J/20 [Turn over 10 www.dynamicpapers.com 10 Uma is concerned about risks that she may encounter when using the Internet. Two of the risks she is concerned about are phishing and pharming. (a) Give one similarity and two differences between phishing and pharming. Similarity ................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... Difference 1 .............................................................................................................................. ................................................................................................................................................... ................................................................................................................................................... Difference 2 .............................................................................................................................. ................................................................................................................................................... ................................................................................................................................................... [3] (b) Identify two other risks that Uma could encounter when using the Internet. Risk 1 ........................................................................................................................................ Risk 2 ........................................................................................................................................ [2] © UCLES 2020 0478/12/M/J/20 11 www.dynamicpapers.com (c) Uma uses a firewall to secure the data on her computer. (i) Uma tells her friend that a firewall can only be software-based. Tick (3) to show whether Uma is Correct or Incorrect. Correct Incorrect (ii) [1] Describe how the firewall helps to keep Uma’s data secure. ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... ..................................................................................................................................... [4] © UCLES 2020 0478/12/M/J/20 12 www.dynamicpapers.com BLANK PAGE Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will be pleased to make amends at the earliest possible opportunity. To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cambridgeinternational.org after the live examination series. Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge. © UCLES 2020 0478/12/M/J/20 www.dynamicpapers.com Cambridge IGCSE™ COMPUTER SCIENCE 0478/12 Paper 1 May/June 2020 MARK SCHEME Maximum Mark: 75 Published Students did not sit exam papers in the June 2020 series due to the Covid-19 global pandemic. This mark scheme is published to support teachers and students and should be read together with the question paper. It shows the requirements of the exam. The answer column of the mark scheme shows the proposed basis on which Examiners would award marks for this exam. Where appropriate, this column also provides the most likely acceptable alternative responses expected from students. Examiners usually review the mark scheme after they have seen student responses and update the mark scheme if appropriate. In the June series, Examiners were unable to consider the acceptability of alternative responses, as there were no student responses to consider. Mark schemes should usually be read together with the Principal Examiner Report for Teachers. However, because students did not sit exam papers, there is no Principal Examiner Report for Teachers for the June 2020 series. Cambridge International will not enter into discussions about these mark schemes. Cambridge International is publishing the mark schemes for the June 2020 series for most Cambridge IGCSE™ and Cambridge International A & AS Level components, and some Cambridge O Level components. This document consists of 10 printed pages. © UCLES 2020 [Turn over 0478/12 Cambridge IGCSE – Mark Scheme PUBLISHED Generic Marking Principles May/June 2020 www.dynamicpapers.com These general marking principles must be applied by all examiners when marking candidate answers. They should be applied alongside the specific content of the mark scheme or generic level descriptors for a question. Each question paper and mark scheme will also comply with these marking principles. GENERIC MARKING PRINCIPLE 1: Marks must be awarded in line with: • • • the specific content of the mark scheme or the generic level descriptors for the question the specific skills defined in the mark scheme or in the generic level descriptors for the question the standard of response required by a candidate as exemplified by the standardisation scripts. GENERIC MARKING PRINCIPLE 2: Marks awarded are always whole marks (not half marks, or other fractions). GENERIC MARKING PRINCIPLE 3: Marks must be awarded positively: • • • • • marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit is given for valid answers which go beyond the scope of the syllabus and mark scheme, referring to your Team Leader as appropriate marks are awarded when candidates clearly demonstrate what they know and can do marks are not deducted for errors marks are not deducted for omissions answers should only be judged on the quality of spelling, punctuation and grammar when these features are specifically assessed by the question as indicated by the mark scheme. The meaning, however, should be unambiguous. GENERIC MARKING PRINCIPLE 4: Rules must be applied consistently e.g. in situations where candidates have not followed instructions or in the application of generic level descriptors. © UCLES 2020 Page 2 of 10 0478/12 Cambridge IGCSE – Mark Scheme PUBLISHED May/June 2020 www.dynamicpapers.com GENERIC MARKING PRINCIPLE 5: Marks should be awarded using the full range of marks defined in the mark scheme for the question (however; the use of the full mark range may be limited according to the quality of the candidate responses seen). GENERIC MARKING PRINCIPLE 6: Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should not be awarded with grade thresholds or grade descriptors in mind. © UCLES 2020 Page 3 of 10 0478/12 Cambridge IGCSE – Mark Scheme PUBLISHED Question 1(a) Answer Any three from: − MAR − MDR // MBR − PC // IAR // NIR // SCR − ACC − CIR // IR − IAS May/June 2020 www.dynamicpapers.com Marks 3 1(b)(i) − − Fetch Execute 2 1(b)(ii) − Control unit 1 Question Answer Marks 2(a) Any four from: − To translate the high-level language into low-level language − Interpreter used whilst writing the program − Interpreter used to debug code line by line − Compiler used when program completed − Compiler used to create separate executable file (so compiler no longer needed) − If it runs first time in a compiler there are no syntax errors 4 2(b) Any three from: − Easier to understand // Don’t know assembly code − Easier to debug − Easier to maintain − Portable − Knowledge of manipulating memory locations/registers not required − Can use an IDE − Greater range of languages 3 © UCLES 2020 Page 4 of 10 0478/12 Cambridge IGCSE – Mark Scheme PUBLISHED Question Answer May/June 2020 www.dynamicpapers.com Marks 3(a) Any four from: − Encryption key is used − Encryption algorithm is used − Encryption key / algorithm is applied to plain text − … to convert it into cypher text − Same key is used to encrypt and decrypt the text 4 3(b) Any three from: − Firewall − Password − Proxy server − Physical methods (by example e.g. CCTV, Locks) − Access rights − Asymmetric encryption − Disconnect from network 3 Question Answer Marks 4(a)(i) − NAND 2 4(a)(ii) − NOR 2 © UCLES 2020 Page 5 of 10 0478/12 Question 4(b) May/June 2020 www.dynamicpapers.com Cambridge IGCSE – Mark Scheme PUBLISHED Answer Working space Marks A B C X 0 0 0 0 0 0 1 0 0 1 0 1 0 1 1 1 1 0 0 0 1 0 1 0 1 1 0 1 1 1 1 1 4 4 marks for 8 correct outputs 3 marks for 6 or 7 correct outputs 2 marks for 4 or 5 correct outputs 1 mark for 2 or 3 correct outputs Question 5(a) © UCLES 2020 Answer Any three from: − Convert HTML code − Display web pages − Check if a website is secure − Request web pages from a web server − Send URL/domain name − Runs active script − Store history/favourites/bookmarks − Create tabs Marks 3 Page 6 of 10 0478/12 May/June 2020 www.dynamicpapers.com Cambridge IGCSE – Mark Scheme PUBLISHED Question Answer Marks 5(b)(i) − − Carries out authentication of server and client Handles encryption algorithms / keys 2 5(b)(ii) − Record layer 1 5(b)(iii) 5(c) Any one from: − SSL − HTTPS − 1 1 Cookies Question Answer 6 Marks Capacitive () Statement Needs pressure to be applied to create a circuit May not register a touch if the user is wearing gloves More commonly used in smartphones More responsive to a touch Needs an electrical field to be changed to register a touch Cheaper to manufacture One mark per correct tick © UCLES 2020 Resistive () Page 7 of 10 6 0478/12 Cambridge IGCSE – Mark Scheme PUBLISHED Question Answer May/June 2020 www.dynamicpapers.com Marks 7(a)(i) − 12 (ignore leading zeros) 1 7(a)(ii) − 198 (ignore leading zeros) 1 7(a)(iii) − 1217 7(b) 1 One mark per each correct hex value in correct order − 0E9 Question 3 Answer Marks 8(a) Any three from: − It is a universal standard − It can’t be inserted the wrong way around − Supports different transmission speeds − Automatically detects if correct driver installed 3 8(b) Two marks for benefits, one mark for drawback Benefits: − Faster speed of printing − Can print duplex / on both sides − Many letters can be printed from one toner cartridge − Can print in high volumes Drawback − Toner cartridge more expensive to buy − More time to warm-up − Larger footprint 3 © UCLES 2020 Page 8 of 10 0478/12 Question 8(c)(i) May/June 2020 www.dynamicpapers.com Cambridge IGCSE – Mark Scheme PUBLISHED Answer Marks 2 Any two from: − Paper jam − Out of paper − Out of toner/ink − Buffer full − Awaiting input − Print complete − Printer ready Award any other valid example 8(c)(ii) Any one from: − Operating system − Interrupt handler − Interrupt service routine Question 1 Answer 9(a) Marks HDD () Statement It has a limited number of read/write cycles It uses magnetic properties to store data It has moving parts It is non-volatile storage It can be used as an external storage device to back-up data It uses flash memory to store data © UCLES 2020 SSD () Page 9 of 10 6 0478/12 Cambridge IGCSE – Mark Scheme PUBLISHED Question 9(b) Answer Any two from: − CD (drive) − DVD (drive) − Blu-ray (drive) Question 10(a) May/June 2020 www.dynamicpapers.com Marks 2 Answer One mark for similarity, two marks for differences Similarity: − Both are designed to steal personal data − They both pose as a real company/person Differences: − Pharming uses malicious code installed on hard drive − Phishing is in form of an email − Phishing requires use to follow a link / open an attachment Marks 3 10(b) − − Virus Malware 2 10(c)(i) − Incorrect 1 10(c)(ii) © UCLES 2020 Any four from: − Can help prevent hacking − Can monitor incoming and outgoing traffic − Can set criteria / rules are set for traffic − Can check whether traffic meets / defies criteria rules − Can rejects any traffic that does not meet / defies criteria Page 10 of 10 4 www.dynamicpapers.com Cambridge IGCSE™ * 4 1 2 4 5 5 1 0 3 7 * COMPUTER SCIENCE 0478/13 May/June 2020 Paper 1 Theory 1 hour 45 minutes You must answer on the question paper. No additional materials are needed. INSTRUCTIONS ● Answer all questions. ● Use a black or dark blue pen. You may use an HB pencil for any diagrams or graphs. ● Write your name, centre number and candidate number in the boxes at the top of the page. ● Write your answer to each question in the space provided. ● Do not use an erasable pen or correction fluid. ● Do not write on any bar codes. ● Calculators must not be used in this paper. INFORMATION ● The total mark for this paper is 75. ● The number of marks for each question or part question is shown in brackets [ ]. ● No marks will be awarded for using brand names of software packages or hardware. This document has 12 pages. Blank pages are indicated. DC (JC/CT) 186484/3 © UCLES 2020 [Turn over 2 1 www.dynamicpapers.com Pradeep is reading hexadecimal values for a project he is working on. (a) The first three hexadecimal values he reads are 15, 102 and A9. Give the denary values for the three hexadecimal values. 15 .............................................................................................................................................. 102 ............................................................................................................................................ A9 ............................................................................................................................................. [3] Working space ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... (b) Pradeep has two 8-bit binary values that he needs to convert to hexadecimal values for his project. Give the hexadecimal values for the two 8-bit binary values. 01010000 .................................................................................................................................. 00111101 .................................................................................................................................. [4] © UCLES 2020 0478/13/M/J/20 www.dynamicpapers.com 3 2 (a) Six hardware devices are shown. Tick (✓) to show if each hardware device is an Input, Output or Storage device. Hardware device Input (✓) Output (✓) Storage (✓) Solid state drive (SSD) Sensor Headphones Microphone USB flash drive Actuator [6] (b) Genevieve writes a paragraph about a barcode reader. Using the list given, complete the paragraph. Not all terms in the list need to be used. • • • • • • • • • actuators binary black input microprocessors output sensors storage white A barcode reader is an ............................................... device. It shines a light at the barcode and the light is reflected back. The ............................................... bars in the barcode reflect less light than the ............................................... bars. ............................................... are used to capture the amount of reflected light and the different reflections are converted to ............................................... values. © UCLES 2020 0478/13/M/J/20 [5] [Turn over 4 3 www.dynamicpapers.com Thomas has an online business that sells homemade furniture. He has a web server that hosts his website for his business. (a) Describe the role of a web browser in requesting and displaying the web pages for the website. ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ............................................................................................................................................. [3] (b) Thomas is worried about a denial of service (DoS) attack on his web server. Describe what happens in a denial of service attack. ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ............................................................................................................................................. [3] © UCLES 2020 0478/13/M/J/20 5 4 www.dynamicpapers.com The table shows four definitions. Complete the table giving the missing Term for each definition. Term Definition A data transmission method that sends data one bit at a time, down a single wire An address given to a device on a network. The address is assigned by the network The software used to render HTML and display a web page An address given to a device at the manufacturing stage that can be used to identify the device on a network [4] © UCLES 2020 0478/13/M/J/20 [Turn over 6 5 www.dynamicpapers.com (a) A clothing shop uses a barcode reader at the checkout. The checkout is linked to a stock control system. The system monitors stock levels and automatically keeps them above a minimum level. Explain how the stock control system automatically keeps the stock levels above a minimum level. ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ............................................................................................................................................. [4] (b) The software for the stock control system is stored on a central computer. The computer uses random access memory (RAM), read only memory (ROM) and a hard disk drive (HDD). The computer is a Von Neumann model computer system with a central processing unit (CPU). (i) State the purpose of the RAM, ROM and HDD in the central computer. RAM .................................................................................................................................. ........................................................................................................................................... ROM .................................................................................................................................. ........................................................................................................................................... HDD .................................................................................................................................. ........................................................................................................................................... [3] (ii) Identify four components that are part of the CPU. Component 1 ..................................................................................................................... Component 2 ..................................................................................................................... Component 3 ..................................................................................................................... Component 4 ..................................................................................................................... [4] © UCLES 2020 0478/13/M/J/20 7 6 www.dynamicpapers.com Consider the given logic statement: X = (((A XOR B) AND C) OR NOT C) (a) Draw a logic circuit to match the given logic statement. All logic gates must have a maximum of two inputs. Do not attempt to simplify the logic statement. A B X C [4] (b) Complete the truth table for the given logic statement. A B C 0 0 0 0 0 1 0 1 0 0 1 1 1 0 0 1 0 1 1 1 0 1 1 1 Working space X [4] © UCLES 2020 0478/13/M/J/20 [Turn over 8 7 www.dynamicpapers.com Edie uses a firewall to help prevent her children from accessing websites that she does not want them to see. (a) Describe how the firewall helps prevent her children from accessing these websites. ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ............................................................................................................................................. [4] (b) Edie is concerned that her children may download a virus when accessing websites. State what is meant by a virus and explain what could happen if a virus was downloaded. ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ............................................................................................................................................. [3] (c) Edie explains to her children how to identify if a website is secure. (i) Give two ways that her children can identify if a website is secure. 1 ........................................................................................................................................ 2 ........................................................................................................................................ [2] © UCLES 2020 0478/13/M/J/20 9 (ii) www.dynamicpapers.com Describe how a browser checks that a website is secure. ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... ..................................................................................................................................... [4] 8 Six statements are given about printers. Tick (✓) to show whether the statement applies to a 3D printer, an Inkjet printer or a Laser printer. Some statements apply to more than one printer. 3D (✓) Statement Inkjet (✓) Laser (✓) Uses a moving print head Uses liquid ink Produces output using materials such as plastic and resin Uses piezoelectric or thermal technology Uses a rotating drum to transfer the image to the paper Uses layer upon layer of material to create the output [6] © UCLES 2020 0478/13/M/J/20 [Turn over 10 9 www.dynamicpapers.com Four 7-bit binary values are being transmitted from one computer to another. An odd parity check is being used to check for errors in the binary values. Write the correct Parity bit for each 7-bit binary value to make sure it meets odd parity. Parity bit 7-bit binary value ..................... 0000011 ..................... 1000000 ..................... 0111111 ..................... 1010101 [4] 10 Clive has a laptop computer that he uses for his business. He enters a username and password to log in to his laptop. Clive is worried about spyware being used to find out his username and password. (a) Describe how spyware could be used to find out Clive’s username and password. ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ............................................................................................................................................. [4] (b) The threat of spyware makes Clive concerned about typing a password to log in to his laptop. Give an example of how Clive could log in securely without typing a password. ............................................................................................................................................. [1] © UCLES 2020 0478/13/M/J/20 11 BLANK PAGE © UCLES 2020 0478/13/M/J/20 www.dynamicpapers.com 12 www.dynamicpapers.com BLANK PAGE Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will be pleased to make amends at the earliest possible opportunity. To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cambridgeinternational.org after the live examination series. Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge. © UCLES 2020 0478/13/M/J/20 www.dynamicpapers.com Cambridge IGCSE™ COMPUTER SCIENCE 0478/13 Paper 1 May/June 2020 MARK SCHEME Maximum Mark: 75 Published Students did not sit exam papers in the June 2020 series due to the Covid-19 global pandemic. This mark scheme is published to support teachers and students and should be read together with the question paper. It shows the requirements of the exam. The answer column of the mark scheme shows the proposed basis on which Examiners would award marks for this exam. Where appropriate, this column also provides the most likely acceptable alternative responses expected from students. Examiners usually review the mark scheme after they have seen student responses and update the mark scheme if appropriate. In the June series, Examiners were unable to consider the acceptability of alternative responses, as there were no student responses to consider. Mark schemes should usually be read together with the Principal Examiner Report for Teachers. However, because students did not sit exam papers, there is no Principal Examiner Report for Teachers for the June 2020 series. Cambridge International will not enter into discussions about these mark schemes. Cambridge International is publishing the mark schemes for the June 2020 series for most Cambridge IGCSE™ and Cambridge International A & AS Level components, and some Cambridge O Level components. This document consists of 10 printed pages. © UCLES 2020 [Turn over 0478/13 Cambridge IGCSE – Mark Scheme PUBLISHED Generic Marking Principles May/June 2020 www.dynamicpapers.com These general marking principles must be applied by all examiners when marking candidate answers. They should be applied alongside the specific content of the mark scheme or generic level descriptors for a question. Each question paper and mark scheme will also comply with these marking principles. GENERIC MARKING PRINCIPLE 1: Marks must be awarded in line with: • • • the specific content of the mark scheme or the generic level descriptors for the question the specific skills defined in the mark scheme or in the generic level descriptors for the question the standard of response required by a candidate as exemplified by the standardisation scripts. GENERIC MARKING PRINCIPLE 2: Marks awarded are always whole marks (not half marks, or other fractions). GENERIC MARKING PRINCIPLE 3: Marks must be awarded positively: • • • • • marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit is given for valid answers which go beyond the scope of the syllabus and mark scheme, referring to your Team Leader as appropriate marks are awarded when candidates clearly demonstrate what they know and can do marks are not deducted for errors marks are not deducted for omissions answers should only be judged on the quality of spelling, punctuation and grammar when these features are specifically assessed by the question as indicated by the mark scheme. The meaning, however, should be unambiguous. GENERIC MARKING PRINCIPLE 4: Rules must be applied consistently e.g. in situations where candidates have not followed instructions or in the application of generic level descriptors. © UCLES 2020 Page 2 of 10 0478/13 Cambridge IGCSE – Mark Scheme PUBLISHED May/June 2020 www.dynamicpapers.com GENERIC MARKING PRINCIPLE 5: Marks should be awarded using the full range of marks defined in the mark scheme for the question (however; the use of the full mark range may be limited according to the quality of the candidate responses seen). GENERIC MARKING PRINCIPLE 6: Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should not be awarded with grade thresholds or grade descriptors in mind. © UCLES 2020 Page 3 of 10 0478/13 Question 1(a) 1(b) May/June 2020 www.dynamicpapers.com Cambridge IGCSE – Mark Scheme PUBLISHED Answer − − − Marks 3 21 258 169 1 mark for each correct hex value − 50 − 3D 4 Question Answer 2(a) Marks Input () Hardware device Output () Solid state drive (SSD) Sensor Headphones Microphone USB flash drive Actuator One mark for each correct tick © UCLES 2020 Storage () Page 4 of 10 6 0478/13 Cambridge IGCSE – Mark Scheme PUBLISHED Question 2(b) Answer − − − − − May/June 2020 www.dynamicpapers.com Marks 5 Input Black White Sensors Binary One mark for each correct term in the correct place Question Answer Marks 3(a) Any three from: − Sends request to webserver − Receives web pages back from webserver − Converts HTML to display web page − Manages protocols 3 3(b) Any three from: − Many requests are sent from a computer − Requests are sent to the webserver − The webserver becomes flooded with traffic − The webserver cannot handle the requests / fails − The website can no longer be accessed − Attack maybe distributed 3 Question 4 © UCLES 2020 Answer − − − − Marks 4 Serial (ignore any ref to simplex etc.) IP (address) Browser MAC (address) Page 5 of 10 0478/13 Cambridge IGCSE – Mark Scheme PUBLISHED Question 5(a) 5(b) 5(c) © UCLES 2020 Answer Any four from: − Stock control system has a database of stock − Each product has a (unique) barcode − Barcode is scanned, and product looked up in database − Stock levels for product are reduced (by 1) − Stock is checked against minimum level − If stock at/below minimum level an order is placed − When stock is re-ordered flag is reset − − − It has RAM to store the data / programs / by example currently in use It has ROM to permanently store the boot up instructions It has HDD to store the stock database / software / OS / by example Any four from: − MAR − MDR − PC − ALU − CU − ACC − CIR − Buses − Registers May/June 2020 www.dynamicpapers.com Marks 4 3 4 Page 6 of 10 0478/13 May/June 2020 www.dynamicpapers.com Cambridge IGCSE – Mark Scheme PUBLISHED Question Answer Marks 4 6(a) A B X C One mark for each correct gate. © UCLES 2020 Page 7 of 10 0478/13 Cambridge IGCSE – Mark Scheme PUBLISHED Question 6(b) Question May/June 2020 www.dynamicpapers.com Answer Working space Marks A B C 0 0 0 1 0 0 1 0 0 1 0 1 0 1 1 1 1 0 0 1 1 0 1 1 1 1 0 1 1 1 1 0 Answer X 4 Marks 7(a) Any four from: − Examines outgoing traffic to check what is being requested − Examines incoming traffic to check the content of what is being received − Sets rules/criteria for websites that can/cannot be accessed // creates a blacklist − Check if traffic meets/does not meet rules/criteria − If it does/does not, access to website granted/denied 4 7(b) Any three from: − Software that can replicate itself − It could cause the computer to crash / run slow / generate errors − It could delete/damage files − It could fill up the storage space − It could stop the hardware being able to communicate − It could spread to other devices on the network 3 © UCLES 2020 Page 8 of 10 0478/13 May/June 2020 www.dynamicpapers.com Cambridge IGCSE – Mark Scheme PUBLISHED Question Answer Marks 7(c)(i) Any two from: − Locked padlock − HTTPS − View the certificate 2 7(c)(ii) Any four from: − requests web server to identify itself/view the (SSL) certificate − receives a copy of the (SSL) certificate, sent from the webserver − checks if (SSL) certificate is authentic/trustworthy − sends signal back to webserver that the certificate is authentic/trustworthy − starts to transmit data once connection is established as secure 4 Question Answer 8 Statement Uses a moving print head Marks 3D () Inkjet () Uses liquid ink Produces output using materials such as plastic and resin Uses piezoelectric or thermal technology () Uses layer upon layer of material to create the output One mark per each correct row. Page 9 of 10 Uses a rotating drum to transfer the image to the paper © UCLES 2020 Laser () 6 0478/13 Cambridge IGCSE – Mark Scheme PUBLISHED Question 9 Answer − − − − 10(a) 10(b) © UCLES 2020 Answer Any four from: − Example of spyware e.g. Keylogger is used − Spyware is downloaded without knowledge (by example) − Spyware records key presses / screen clicks / screen activity − Data is relayed back to third party − Data is analysed // Patterns in data could reveal log-in details … − … details can then be used to log into the laptop (remotely) − − Marks 4 1 0 1 1 Question May/June 2020 www.dynamicpapers.com Marks 4 1 Biometric device Two step authentication Page 10 of 10 www.dynamicpapers.com Cambridge IGCSE™ * 4 1 9 2 4 0 4 4 3 3 * COMPUTER SCIENCE 0478/11 October/November 2020 Paper 1 Theory 1 hour 45 minutes You must answer on the question paper. No additional materials are needed. INSTRUCTIONS ● Answer all questions. ● Use a black or dark blue pen. You may use an HB pencil for any diagrams or graphs. ● Write your name, centre number and candidate number in the boxes at the top of the page. ● Write your answer to each question in the space provided. ● Do not use an erasable pen or correction fluid. ● Do not write on any bar codes. ● Calculators must not be used in this paper. INFORMATION ● The total mark for this paper is 75. ● The number of marks for each question or part question is shown in brackets [ ]. ● No marks will be awarded for using brand names of software packages or hardware. This document has 12 pages. Blank pages are indicated. DC (LK) 186555/3 © UCLES 2020 [Turn over www.dynamicpapers.com 2 1 Six devices are shown. Tick (3) to show if each device is an Input, Output or Storage device. Input (3) Device Output Storage (3) (3) Keyboard Sensor 3D cutter 2D scanner Microphone Hard disk drive (HDD) [6] 2 Ron is attending a music concert. He has bought three tickets. Each ticket number is displayed as a hexadecimal number. (a) Complete the table to show the 12-bit binary values and the Denary values for each Hexadecimal ticket number. Hexadecimal ticket number 12-bit binary value Denary value 028 1A9 20C [6] Working space .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... © UCLES 2020 0478/11/O/N/20 3 www.dynamicpapers.com (b) Each ticket also has a QR code. The QR code is scanned at the entrance to the venue. A person can only enter the venue with a valid QR code that allows entry. When a person enters, a count is incremented to show how many people have entered the venue. Explain how the system scans the QR code, checks if a person can enter and counts how many people have entered. ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ............................................................................................................................................. [7] 3 Transport Layer Security (TLS) protocol is used to secure the transmission of data over the Internet. (a) Identify the two layers in the TLS protocol. Layer 1 ...................................................................................................................................... Layer 2 ...................................................................................................................................... [2] © UCLES 2020 0478/11/O/N/20 [Turn over 4 www.dynamicpapers.com (b) The following paragraph explains how data is sent securely using the TLS protocol. Use the terms to complete the paragraph. Not all terms may need to be used. • • • • • • • • • authentic binary browser certificate internet service provider signal web page web server website The browser requests the .................................................................... to identify itself by providing its .................................................................... . This is sent and a check is performed to see if it is .................................................................... . If it is, the ................................................................... sends a ................................................................... back to the web server and data transmission begins. [5] (c) Identify one other protocol that can be used to secure data transmission over the Internet. ............................................................................................................................................. [1] © UCLES 2020 0478/11/O/N/20 5 www.dynamicpapers.com Question 4 starts on page 6. © UCLES 2020 0478/11/O/N/20 [Turn over 6 4 www.dynamicpapers.com Consider the given logic statement: X = ((NOT (A NAND B)) OR (B NOR C)) (a) Draw a logic circuit to represent the given logic statement. All logic gates must have a maximum of two inputs. Do not attempt to simplify the logic statement. A B X C [4] (b) Complete the truth table for the given logic statement. A B C 0 0 0 0 0 1 0 1 0 0 1 1 1 0 0 1 0 1 1 1 0 1 1 1 Working space X [4] © UCLES 2020 0478/11/O/N/20 www.dynamicpapers.com 7 (c) The logic statement given has four different logic gates. Identify two other logic gates and complete a truth table for each. Logic gate ...................................... Truth table A B 0 0 0 1 1 0 1 1 Logic gate ...................................... X Truth table A B 0 0 0 1 1 0 1 1 X [4] 5 Luke is creating a website for his t-shirt design business. (a) He is using HTML to create the website. HTML can be separated into structure and presentation. (i) Give two examples of HTML structure. Example 1 ......................................................................................................................... Example 2 ......................................................................................................................... [2] (ii) Give two examples of HTML presentation. Example 1 ......................................................................................................................... Example 2 ......................................................................................................................... [2] © UCLES 2020 0478/11/O/N/20 [Turn over 8 www.dynamicpapers.com (b) Luke is concerned that his web server may be hacked or subjected to a denial of service (DoS) attack. State two security methods that Luke could use to help protect the web server from hacking or a DoS attack. Method 1 ................................................................................................................................... Method 2 ................................................................................................................................... [2] 6 A Von Neumann model for a computer system contains several integrated circuits (IC). (a) Parallel data transmission is used in an IC. (i) Describe how data is transmitted using parallel data transmission. ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... ..................................................................................................................................... [2] (ii) Give one benefit of using parallel, rather than serial, data transmission. ........................................................................................................................................... ..................................................................................................................................... [1] (b) The computer has a central processing unit (CPU). (i) Identify the bus that carries signals around the CPU to control the components. ..................................................................................................................................... [1] (ii) Identify the register built into the arithmetic logic unit (ALU). ..................................................................................................................................... [1] © UCLES 2020 0478/11/O/N/20 9 (iii) www.dynamicpapers.com Four statements about a Von Neumann model for a computer system are shown. Tick (3) to show if each statement is True or False. True (3) Statement False (3) Data and instructions are stored in the same memory unit The control unit manages operations within the CPU Data and instructions can be fetched into the CPU at the same time The control unit is responsible for decoding an instruction [4] 7 Nina is recording some music tracks that she has written. She is researching whether she should record them in MIDI or MP3 format. Explain what is meant by MIDI and MP3 format. MIDI .................................................................................................................................................. .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... MP3 .................................................................................................................................................. .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... [4] © UCLES 2020 0478/11/O/N/20 [Turn over 10 8 www.dynamicpapers.com Matthew is buying a new television with a display that uses LED technology. (a) Explain what is meant by LED technology. ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ............................................................................................................................................. [3] (b) State three benefits of LED technology. Benefit 1 ................................................................................................................................... ................................................................................................................................................... Benefit 2 ................................................................................................................................... ................................................................................................................................................... Benefit 3 ................................................................................................................................... ................................................................................................................................................... [3] (c) Identify one other technology that could have been used for the display. ............................................................................................................................................. [1] 9 Victoria is entering data into a computer system. The data will be transmitted to cloud storage. (a) An even parity check is used to check for errors in the binary values after transmission. For each of the 7-bit binary values, write the Parity bit that makes sure even parity is met. © UCLES 2020 7-bit binary value Parity bit 1100010 ...................... 1001011 ...................... 0100010 ...................... 0010111 ...................... 0478/11/O/N/20 [4] 11 www.dynamicpapers.com (b) Identify two other error checking methods that could be used to check the binary values are correct after transmission. Method 1 ................................................................................................................................... Method 2 ................................................................................................................................... [2] (c) A check digit is used to check whether data is correct when entered into the system. Describe how a check digit can be used to make sure the data entered is correct. ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ............................................................................................................................................. [4] © UCLES 2020 0478/11/O/N/20 12 www.dynamicpapers.com BLANK PAGE Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will be pleased to make amends at the earliest possible opportunity. To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cambridgeinternational.org after the live examination series. Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge. © UCLES 2020 0478/11/O/N/20 www.dynamicpapers.com Cambridge IGCSE™ COMPUTER SCIENCE 0478/11 Paper 1 October/November 2020 MARK SCHEME Maximum Mark: 75 Published This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the details of the discussions that took place at an Examiners’ meeting before marking began, which would have considered the acceptability of alternative answers. Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for Teachers. Cambridge International will not enter into discussions about these mark schemes. Cambridge International is publishing the mark schemes for the October/November 2020 series for most Cambridge IGCSE™, Cambridge International A and AS Level and Cambridge Pre-U components, and some Cambridge O Level components. This document consists of 11 printed pages. © UCLES 2020 [Turn over 0478/11 Cambridge IGCSE – Mark Scheme PUBLISHED Generic Marking Principles October/November 2020 www.dynamicpapers.com These general marking principles must be applied by all examiners when marking candidate answers. They should be applied alongside the specific content of the mark scheme or generic level descriptors for a question. Each question paper and mark scheme will also comply with these marking principles. GENERIC MARKING PRINCIPLE 1: Marks must be awarded in line with: • • • the specific content of the mark scheme or the generic level descriptors for the question the specific skills defined in the mark scheme or in the generic level descriptors for the question the standard of response required by a candidate as exemplified by the standardisation scripts. GENERIC MARKING PRINCIPLE 2: Marks awarded are always whole marks (not half marks, or other fractions). GENERIC MARKING PRINCIPLE 3: Marks must be awarded positively: • • • • • marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit is given for valid answers which go beyond the scope of the syllabus and mark scheme, referring to your Team Leader as appropriate marks are awarded when candidates clearly demonstrate what they know and can do marks are not deducted for errors marks are not deducted for omissions answers should only be judged on the quality of spelling, punctuation and grammar when these features are specifically assessed by the question as indicated by the mark scheme. The meaning, however, should be unambiguous. GENERIC MARKING PRINCIPLE 4: Rules must be applied consistently, e.g. in situations where candidates have not followed instructions or in the application of generic level descriptors. © UCLES 2020 Page 2 of 11 0478/11 Cambridge IGCSE – Mark Scheme PUBLISHED October/November 2020 www.dynamicpapers.com GENERIC MARKING PRINCIPLE 5: Marks should be awarded using the full range of marks defined in the mark scheme for the question (however; the use of the full mark range may be limited according to the quality of the candidate responses seen). GENERIC MARKING PRINCIPLE 6: Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should not be awarded with grade thresholds or grade descriptors in mind. © UCLES 2020 Page 3 of 11 0478/11 Cambridge IGCSE – Mark Scheme PUBLISHED Question 1 Answer Input () Keyboard Sensor 6 Output () Storage () 3D Cutter 2D Scanner Microphone Hard disk drive (HDD) Question 2(a) Answer Marks One mark for each correct binary conversion One mark for each correct denary conversion Hexadecimal ticket number © UCLES 2020 Marks One mark per each correct row: Device October/November 2020 www.dynamicpapers.com 12-bit binary value 6 Denary value 028 0000 0010 1000 40 1A9 0001 1010 1001 425 20C 0010 0000 1100 524 Page 4 of 11 0478/11 Cambridge IGCSE – Mark Scheme PUBLISHED Question 2(b) Answer Seven from: − Camera captures code // Laser/light shone on code − Black squares reflect different light to white − Corner squares are used for alignment − Pattern converted to digital data // by example − (Digital) data sent to microprocessor − There is a database of valid QR codes − Data compared to stored values/valid QR codes … − … If data matches entry is granted is raised − … If data matches count is incremented − … If data does not match, entry is denied Question − − Handshake Record 3(b) − − − − − Web server Certificate Authentic Browser Signal 3(c) Any one from: − SSL − HTTPS © UCLES 2020 Marks 7 Answer 3(a) October/November 2020 www.dynamicpapers.com Marks 2 5 1 Page 5 of 11 0478/11 Cambridge IGCSE – Mark Scheme PUBLISHED Question Answer 4(a) Marks 4 One mark for each correct gate with correct input © UCLES 2020 October/November 2020 www.dynamicpapers.com Page 6 of 11 0478/11 Cambridge IGCSE – Mark Scheme PUBLISHED Question 4(b) © UCLES 2020 Answer October/November 2020 www.dynamicpapers.com Marks 4 Four marks for 8 correct outputs Three marks for 6/7 correct outputs Two marks for 4/5 correct outputs One mark for 2/3 correct outputs Working space A B C X 0 0 0 1 0 0 1 0 0 1 0 0 0 1 1 0 1 0 0 1 1 0 1 0 1 1 0 1 1 1 1 1 Page 7 of 11 0478/11 Cambridge IGCSE – Mark Scheme PUBLISHED Question 4(c) Answer One mark for the correct gate and one mark for the correct truth table − − October/November 2020 www.dynamicpapers.com Marks 4 AND A B X 0 0 0 0 1 0 1 0 0 1 1 1 A B X 0 0 0 0 1 1 1 0 1 1 1 0 XOR Question Answer Marks 5(a)(i) − Two valid examples of Structure e.g. where text is placed, margins of page 2 5(a)(ii) − Two valid examples of Presentation e.g. font size, font colour 2 5(b) − − Firewall Proxy server 2 © UCLES 2020 Page 8 of 11 0478/11 Cambridge IGCSE – Mark Scheme PUBLISHED Question October/November 2020 www.dynamicpapers.com Answer Marks 6(a)(i) − − Uses multiple wires Sends multiple bits of data at a time 2 6(a)(ii) − Faster transmission speed 1 6(b)(i) − Control (bus) 1 6(b)(ii) − Accumulator (ACC) 1 6(b)(iii) True () Statement Data and instructions are stored in the same memory unit The control unit manages operations within the CPU Data and instructions can be fetched into the CPU at the same time The control unit is responsible for decoding an instruction © UCLES 2020 Page 9 of 11 False () 4 0478/11 Cambridge IGCSE – Mark Scheme PUBLISHED Question 7 Answer Four from (Max two per format): October/November 2020 www.dynamicpapers.com Marks 4 MIDI − Musical Instrument Digital Interface (file) − Stores a set of commands/instructions (for how the sound should be played) − Does not store the actual sounds − Data in the file has been recorded using digital instruments // produced by synthesizer − Specifies pitch of the note // specifies the note to be played − Specifies when each note plays and stops playing // Specifies key on/off − Specifies duration of the note − Specifies volume of the note − Specifies the tempo − Specifies the type of instrument − Individual notes can be edited MP3 − MP3 is a format for digital audio − MP3 is an actual recording of the sound − MP3 is a (lossy) compression format − Recorded using a microphone Question 8(a) Answer Marks Any three from: − Light emitting diodes (technology) − The display is made up of pixels − … that are arranged together as a matrix − … each is formed of three LEDs/filters − Shades of colour are achieved by mixing red, blue and green − The screen can be back-lit/edge-lit 3 NOTE: Use of liquid crystals with LED technology can also be awarded © UCLES 2020 Page 10 of 11 0478/11 Cambridge IGCSE – Mark Scheme PUBLISHED Question Answer October/November 2020 www.dynamicpapers.com Marks 8(b) Any three from: − Energy efficient // low power consumption − Long lasting // longevity − Focussed beam // less light strays from beam − Brighter/vivid colours − High resolution − No flicker − Display is thinner − Mercury free technology // environmentally friendly − Fewer pixel failure − Increased viewing in sunlight 3 8(c) − 1 LCD Question Answer Marks 9(a) − − − − 9(b) Two from: − Checksum − Automatic repeat request // ARQ 2 9(c) Any four from: − Data is input with check digit − A calculation is performed on the (inputted) data // by example − The calculated digit is compared to a stored value − If it matches, the data entered is correct − If it does not match, the data entered is incorrect 4 © UCLES 2020 4 1 0 0 0 Page 11 of 11 www.dynamicpapers.com Cambridge IGCSE™ * 1 8 6 8 6 1 8 8 1 5 * COMPUTER SCIENCE 0478/12 October/November 2020 Paper 1 Theory 1 hour 45 minutes You must answer on the question paper. No additional materials are needed. INSTRUCTIONS ● Answer all questions. ● Use a black or dark blue pen. You may use an HB pencil for any diagrams or graphs. ● Write your name, centre number and candidate number in the boxes at the top of the page. ● Write your answer to each question in the space provided. ● Do not use an erasable pen or correction fluid. ● Do not write on any bar codes. ● Calculators must not be used in this paper. INFORMATION ● The total mark for this paper is 75. ● The number of marks for each question or part question is shown in brackets [ ]. ● No marks will be awarded for using brand names of software packages or hardware. This document has 12 pages. Blank pages are indicated. DC (LK) 186556/2 © UCLES 2020 [Turn over 2 1 www.dynamicpapers.com Tina is creating a website for charity events. She uses HTML to create the website. (a) State what is meant by HTML. ................................................................................................................................................... ............................................................................................................................................. [1] (b) She uses the hexadecimal colour code #43B7F0 as the background colour for her website. (i) State whether background colour is an example of structure or presentation, in the website. ..................................................................................................................................... [1] (ii) The hexadecimal colour code #43B7F0 is stored in three 8-bit registers. Give the 8-bit binary values for each part of the hexadecimal code. 43 B7 F0 [6] (c) Tina uses a microphone to record a welcome message for her website. (i) State whether the microphone is an input or output device. ..................................................................................................................................... [1] © UCLES 2020 0478/12/O/N/20 3 (ii) www.dynamicpapers.com She wants to compress the recording to make sure that the file is as small as possible for the website. Identify which type of compression she should use and describe how this would compress the file for the website. Type of compression ......................................................................................................... Description ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... ..................................................................................................................................... [4] (iii) Give two benefits of compressing the file for the website. Benefit 1 ............................................................................................................................ ........................................................................................................................................... Benefit 2 ............................................................................................................................ ........................................................................................................................................... [2] © UCLES 2020 0478/12/O/N/20 [Turn over 4 www.dynamicpapers.com (d) Tina will use the TLS protocol in her website when selling tickets to people for different charity events. This makes sure that their personal data is transmitted securely. (i) Identify the two layers that are present in the TLS protocol. Layer 1 .............................................................................................................................. Layer 2 .............................................................................................................................. [2] (ii) Explain how data is sent securely using the TLS protocol. ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... ..................................................................................................................................... [6] © UCLES 2020 0478/12/O/N/20 www.dynamicpapers.com 5 (e) Tina is concerned about security threats to her web server. (i) Identify three security threats to her web server that Tina might be concerned about. 1 ........................................................................................................................................ 2 ........................................................................................................................................ 3 ........................................................................................................................................ [3] (ii) Tina installs a proxy server to help protect her website from security threats. Describe how the proxy server will help protect the website. ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... ..................................................................................................................................... [4] 2 Four 7-bit binary values are transmitted from one computer to another. A parity bit was added to each binary value creating 8-bit binary values. All the binary values have been transmitted correctly. (a) Tick (✓) to show whether an Even or an Odd parity check has been used for each binary value. 8-bit binary value Even (✓) Odd (✓) 11111111 01100110 01111011 10000000 [4] © UCLES 2020 0478/12/O/N/20 [Turn over 6 www.dynamicpapers.com (b) The data will also be checked using a checksum. Describe how a checksum can be used to check that the data has been transmitted correctly. ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ............................................................................................................................................. [5] 3 Alessandro has some important data stored on his computer. He is concerned about accidental damage to his data. (a) (i) Identify three ways that the data could be accidentally damaged. 1 ........................................................................................................................................ 2 ........................................................................................................................................ 3 ........................................................................................................................................ [3] (ii) State what Alessandro could do to make sure that he can retrieve his data if it is accidentally damaged. ..................................................................................................................................... [1] © UCLES 2020 0478/12/O/N/20 7 www.dynamicpapers.com (b) Alessandro uses an SSD to store his data. Describe what is meant by an SSD and how it operates to store data. ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ............................................................................................................................................. [4] (c) Alessandro also uses off-line storage to store his data. Three examples of off-line storage are Blu-ray, CD and DVD. Six statements are given about off-line storage. Tick (✓) to show if each statement applies to Blu-ray, CD, or DVD. Some statements apply to more than one example of off-line storage. Blu-ray (✓) Statement CD (✓) DVD (✓) A type of optical storage Has the largest storage capacity Can be dual layer Read using a red laser Has the smallest storage capacity Stores data in a spiral track [6] © UCLES 2020 0478/12/O/N/20 [Turn over 8 4 www.dynamicpapers.com Consider the logic statement: X = (((A NAND B) NOR (B AND C)) OR C) (a) Draw a logic circuit to match the given logic statement. All logic gates must have a maximum of two inputs. Do not attempt to simplify the logic statement. A B X C [4] (b) Complete the truth table for the given logic statement. A B C 0 0 0 0 0 1 0 1 0 0 1 1 1 0 0 1 0 1 1 1 0 1 1 1 Working space X [4] © UCLES 2020 0478/12/O/N/20 9 5 www.dynamicpapers.com Tammy is buying a new computer that has an LED display. (a) Five statements about LED displays are given. Tick (✓) to show if each statement is True or False. Statement True (✓) False (✓) It is a flat panel display It creates images using red, green and blue diodes It is not very energy efficient and gives off heat It can be used in mobile devices such as smartphones and tablets It is a front-lit display [5] © UCLES 2020 0478/12/O/N/20 [Turn over 10 www.dynamicpapers.com (b) Tammy connects the computer to her home network. The computer has a MAC address and an IP address. A paragraph is given about MAC addresses and IP addresses. Complete the paragraph using the list of terms given. Not all terms need to be used. • • • • • • • • • • compiled computer control dynamic identify packet principal protocol similar unique A MAC address is a media access …………………………………………………….. address. A network device has a ……………………………………………………… MAC address that can help ………………………………………………. the device in the network. An IP address is an Internet ………………………………………… address. An IP address can be static or …………………………………………… . [5] (c) Tammy uses a browser when accessing the Internet. Describe the role of the browser. ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ............................................................................................................................................. [4] © UCLES 2020 0478/12/O/N/20 11 BLANK PAGE © UCLES 2020 0478/12/O/N/20 www.dynamicpapers.com 12 www.dynamicpapers.com BLANK PAGE Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will be pleased to make amends at the earliest possible opportunity. To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cambridgeinternational.org after the live examination series. Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge. © UCLES 2020 0478/12/O/N/20 www.dynamicpapers.com Cambridge IGCSE™ COMPUTER SCIENCE 0478/12 Paper 1 October/November 2020 MARK SCHEME Maximum Mark: 75 Published This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the details of the discussions that took place at an Examiners’ meeting before marking began, which would have considered the acceptability of alternative answers. Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for Teachers. Cambridge International will not enter into discussions about these mark schemes. Cambridge International is publishing the mark schemes for the October/November 2020 series for most Cambridge IGCSE™, Cambridge International A and AS Level and Cambridge Pre-U components, and some Cambridge O Level components. This document consists of 13 printed pages. © UCLES 2020 [Turn over 0478/12 Cambridge IGCSE – Mark Scheme PUBLISHED Generic Marking Principles October/November 2020 www.dynamicpapers.com These general marking principles must be applied by all examiners when marking candidate answers. They should be applied alongside the specific content of the mark scheme or generic level descriptors for a question. Each question paper and mark scheme will also comply with these marking principles. GENERIC MARKING PRINCIPLE 1: Marks must be awarded in line with: • • • the specific content of the mark scheme or the generic level descriptors for the question the specific skills defined in the mark scheme or in the generic level descriptors for the question the standard of response required by a candidate as exemplified by the standardisation scripts. GENERIC MARKING PRINCIPLE 2: Marks awarded are always whole marks (not half marks, or other fractions). GENERIC MARKING PRINCIPLE 3: Marks must be awarded positively: • • • • • marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit is given for valid answers which go beyond the scope of the syllabus and mark scheme, referring to your Team Leader as appropriate marks are awarded when candidates clearly demonstrate what they know and can do marks are not deducted for errors marks are not deducted for omissions answers should only be judged on the quality of spelling, punctuation and grammar when these features are specifically assessed by the question as indicated by the mark scheme. The meaning, however, should be unambiguous. GENERIC MARKING PRINCIPLE 4: Rules must be applied consistently, e.g. in situations where candidates have not followed instructions or in the application of generic level descriptors. © UCLES 2020 Page 2 of 13 0478/12 Cambridge IGCSE – Mark Scheme PUBLISHED October/November 2020 www.dynamicpapers.com GENERIC MARKING PRINCIPLE 5: Marks should be awarded using the full range of marks defined in the mark scheme for the question (however; the use of the full mark range may be limited according to the quality of the candidate responses seen). GENERIC MARKING PRINCIPLE 6: Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should not be awarded with grade thresholds or grade descriptors in mind. © UCLES 2020 Page 3 of 13 0478/12 Cambridge IGCSE – Mark Scheme PUBLISHED Question 1(a) Answer October/November 2020 www.dynamicpapers.com Marks Any one from: − Hypertext Mark-up Language − Web authoring language // language used to write/create websites/web pages 1 1(b)(i) − 1 1(b)(ii) One mark per each nibble: 1(c)(i) © UCLES 2020 Presentation 6 43 0 1 0 0 0 0 1 1 B7 1 0 1 1 0 1 1 1 F0 1 1 1 1 0 0 0 0 − 1 Input Page 4 of 13 0478/12 Cambridge IGCSE – Mark Scheme PUBLISHED Question 1(c)(ii) October/November 2020 www.dynamicpapers.com Answer One from: − Lossy (compression) Marks 4 Any three from: − A (compression) algorithm is used − Removes redundant/unnecessary data from the file − Removes sounds that cannot be heard by the human ear/background noise − Reduces sample rate − Reduces sample resolution − Data is permanently removed // original file cannot be re-instated − Perceptual music shaping is used NOTE: If lossless given, marks can be awarded for a correct description of lossless as follow through. Any three from (lossless): − A (compression) algorithm is used − Repeating patterns are identified − … are replaced with a value − … and indexed − No data is permanently removed // original file can be re-instated − Suitable example of a lossless algorithm 1(c)(iii) Any two from: − Quicker for her to upload − Quicker for users to download − Won’t slow website down as much when loading − Takes up less storage space 2 1(d)(i) − − 2 © UCLES 2020 Handshake (layer) Record (layer) Page 5 of 13 0478/12 Cambridge IGCSE – Mark Scheme PUBLISHED Question October/November 2020 www.dynamicpapers.com Answer Marks 1(d)(ii) Any six from: − Client/browser requests secure connection to server − Client/browser requests the server to identify itself − Server provides a digital certificate − Client/browser validates the certificate − Client/browser send signal back to server (to begin transmission) − Session caching can be used − A session key is generated − Encryption method is agreed // data is encrypted 6 1(e)(i) Any three from: − Hacking − Denial of service (DoS) attack − Virus − Malware 3 NOTE: Three different type of malware can be awarded 1(e)(ii) © UCLES 2020 Any four from: − Acts as a firewall − Monitor/filters/examines incoming and outgoing traffic − Rules/criteria for traffic can be set // blacklist/whitelist set − Blocks any traffic that does not meet criteria … − … and can send a warning message to the user − Stop the website failing in a DoS attack // DoS attack hits the proxy server and not the webserver Page 6 of 13 4 0478/12 Cambridge IGCSE – Mark Scheme PUBLISHED Question 2(a) Answer One mark for each correct row: 8-bit binary value Even () 11111111 01100110 01111011 10000000 2(b) © UCLES 2020 October/November 2020 www.dynamicpapers.com Marks 4 Odd () Any five from: − A value is calculated from the data − The value is calculated using an algorithm // by example − The value is appended to the data to be transmitted − Value is recalculated after transmission − Values are compared − If the values match the data is correct // if the values do not match the data is incorrect Page 7 of 13 5 0478/12 Cambridge IGCSE – Mark Scheme PUBLISHED Question 3(a)(i) October/November 2020 www.dynamicpapers.com Answer Any three from: − Loss of power/electricity − Spillage of liquids − Flood − Fire − Human error − Hardware failure − Software failure Marks 3 NOTE: Three different types of human error can be awarded e.g. accidental deletion, not saving data, incorrect shutdown procedure 3(a)(ii) 3(b) − 1 Create a backup Max three from: − Solid state drive − Non-volatile − Secondary storage − Flash memory − Has no mechanical/moving parts − Uses transistors − … and cells that are laid out in a grid − Uses control gates and floating gates − Can be NAND/NOR (technology) − Use EEPROM technology 4 Max two from: − Stores data by flashing it onto the chips − Data stored by controlling the flow of electrons through/using transistors/chips/gates − The electric current reaches the control gate and flows through to the floating gate to be stored − When data is stored the transistor is converted from 1 to 0 © UCLES 2020 Page 8 of 13 0478/12 Cambridge IGCSE – Mark Scheme PUBLISHED Question 3(c) Answer One mark for each correct row: CD () DVD () A type of optical storage Has the largest storage capacity Can be dual layer © UCLES 2020 Read using a red laser Has the smallest storage capacity Stores data in a spiral track Marks 6 Blu-ray () Statement October/November 2020 www.dynamicpapers.com Page 9 of 13 0478/12 Cambridge IGCSE – Mark Scheme PUBLISHED Question 4(a) © UCLES 2020 Answer One mark for each correct logic gate with correct input: October/November 2020 www.dynamicpapers.com Marks 4 Page 10 of 13 0478/12 Cambridge IGCSE – Mark Scheme PUBLISHED Question 4(b) © UCLES 2020 Answer October/November 2020 www.dynamicpapers.com Marks Four marks for 8 correct outputs Three marks for 6/7 correct outputs Two marks for 4/5 correct outputs One mark for 2/3 correct outputs 4 A B C Working space X 0 0 0 0 0 0 1 1 0 1 0 0 0 1 1 1 1 0 0 0 1 0 1 1 1 1 0 1 1 1 1 1 Page 11 of 13 0478/12 Question 5(a) Answer Marks One mark for each correct row: 5 True () Statement It is a flat panel display It creates images using red, green and blue diodes It is also used in mobile devices such as smartphones and tablets It is a front-lit display © UCLES 2020 False () It is not very energy efficient and gives off heat 5(b) October/November 2020 www.dynamicpapers.com Cambridge IGCSE – Mark Scheme PUBLISHED One mark for each correct term in the correct place: − Control − Unique − Identify − Protocol − Dynamic 5 Page 12 of 13 0478/12 Question 5(c) © UCLES 2020 Cambridge IGCSE – Mark Scheme PUBLISHED Answer Any four from: − Allows user to view web pages − Renders HTML − Allows user to bookmark/favourite web pages − Provides navigation features − Allows (multiple) tabs − Stores cookies − Records history of pages visited − Has a homepage − Runs active script − Allows files to be downloaded from website/internet − Sends a request to the IP address/web server (to obtain the contents of a web page) − Sends URL to DNS − Manages HTTP/HTTPS protocol Page 13 of 13 October/November 2020 www.dynamicpapers.com Marks 4 www.dynamicpapers.com Cambridge IGCSE™ * 6 3 5 3 6 1 2 9 0 4 * COMPUTER SCIENCE 0478/13 October/November 2020 Paper 1 Theory 1 hour 45 minutes You must answer on the question paper. No additional materials are needed. INSTRUCTIONS ● Answer all questions. ● Use a black or dark blue pen. You may use an HB pencil for any diagrams or graphs. ● Write your name, centre number and candidate number in the boxes at the top of the page. ● Write your answer to each question in the space provided. ● Do not use an erasable pen or correction fluid. ● Do not write on any bar codes. ● Calculators must not be used in this paper. INFORMATION ● The total mark for this paper is 75. ● The number of marks for each question or part question is shown in brackets [ ]. ● No marks will be awarded for using brand names of software packages or hardware. This document has 12 pages. Blank pages are indicated. DC (PQ) 186557/2 © UCLES 2020 [Turn over 2 1 www.dynamicpapers.com Five hardware devices are given. Tick (3) to show if each device is an Input, Output or Storage device. Device Input (3) Output (3) Storage (3) Solid state drive (SSD) Headphones 2D cutter LCD projector Microphone [5] 2 Paige has a computer that has a central processing unit (CPU) based on the Von Neumann model for a computer system. (a) Identify the component within the CPU that controls the flow of data. ............................................................................................................................................. [1] (b) Identify the component within the CPU where calculations are carried out. ............................................................................................................................................. [1] (c) Identify the component within the CPU that stores the address of the next instruction to be processed. ............................................................................................................................................. [1] (d) Identify the register within the CPU that holds an instruction that has been fetched from memory. ............................................................................................................................................. [1] (e) Identify the register within the CPU that holds data that has been fetched from memory. ............................................................................................................................................. [1] © UCLES 2020 0478/13/O/N/20 www.dynamicpapers.com 3 3 (a) Four denary to 8-bit binary conversions are given. Tick (3) to show if each denary to 8-bit binary conversion is Correct or Incorrect. Denary Binary Conversion 145 10010001 179 10110101 11 00010011 100 01100010 Correct (3) Incorrect (3) [4] (b) Convert the 12-bit binary number into hexadecimal. 1 1 0 0 0 1 0 0 0 0 0 0 ............................................................................................................................................. [3] 4 Eugene has a web server that stores his online shopping website. Customers access the website using a browser. (a) Describe how the webpages are requested and displayed on the customer’s computer. ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ............................................................................................................................................. [4] (b) State three online security threats to Eugene’s web server. Threat 1 .................................................................................................................................... Threat 2 .................................................................................................................................... Threat 3 .................................................................................................................................... [3] © UCLES 2020 0478/13/O/N/20 [Turn over 4 5 www.dynamicpapers.com Arjun uses a scanner to create digital versions of some printed documents. The scanner is attached to his computer using a USB connection. (a) Tick (3) to show if the USB connection uses Parallel or Serial data transmission. Describe your chosen method of data transmission. Parallel Serial Description ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... [3] (b) Give three benefits of a USB connection. Benefit 1 ................................................................................................................................... ................................................................................................................................................... Benefit 2 ................................................................................................................................... ................................................................................................................................................... Benefit 3 ................................................................................................................................... ................................................................................................................................................... [3] (c) Arjun uses the Internet to send the digital documents to his friend. He wants to make sure the documents are sent securely. Identify two protocols that can be used to transfer data securely. Protocol 1 ................................................................................................................................. Protocol 2 ................................................................................................................................. [2] © UCLES 2020 0478/13/O/N/20 5 6 www.dynamicpapers.com Elsa writes a paragraph in an examination about encryption. There are several terms missing from the paragraph. Complete the paragraph using the list of given terms. Not all terms may need to be used. Some terms may be used more than once. • • • • • • • • algorithm alphanumeric cookie cypher key padlock plain word processed The data is encrypted using a ....................................................................... . This is an ....................................................................... that is used to scramble the data. The data before encryption is known as ....................................................................... text. When the data has been encrypted it is known as ....................................................................... text. To read the encrypted data it needs to be decrypted using a ....................................................................... . © UCLES 2020 0478/13/O/N/20 [5] [Turn over www.dynamicpapers.com 6 7 Four 7-bit binary values are transmitted from one computer to another. A parity bit was added to each binary value creating 8-bit binary values. All the binary values have been transmitted correctly. (a) Tick (3) to show whether an Even or an Odd parity check has been used for each binary value. 8-bit binary value Even (3) Odd (3) 10000001 10000010 00101001 00101000 [4] (b) A parity check may not always detect errors that have occurred in data transmission. State why a parity check may not detect data transmission errors. ............................................................................................................................................. [1] (c) Give one other error checking method that could be used to check for errors in data transmission. ............................................................................................................................................. [1] © UCLES 2020 0478/13/O/N/20 7 8 www.dynamicpapers.com Edith is buying a new computer monitor that displays images using LCD technology. (a) Explain what is meant by LCD technology. ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ............................................................................................................................................. [3] (b) State three benefits of LCD technology. Benefit 1 ................................................................................................................................... ................................................................................................................................................... Benefit 2 ................................................................................................................................... ................................................................................................................................................... Benefit 3 ................................................................................................................................... ................................................................................................................................................... [3] 9 Elle uses both CDs and DVDs to store her school projects. (a) Give three similarities between a CD and a DVD. 1 ................................................................................................................................................ ................................................................................................................................................... 2 ................................................................................................................................................ ................................................................................................................................................... 3 ................................................................................................................................................ ................................................................................................................................................... [3] (b) State one difference between a CD and a DVD. ................................................................................................................................................... ............................................................................................................................................. [1] © UCLES 2020 0478/13/O/N/20 [Turn over 8 www.dynamicpapers.com 10 Consider the following logic statement: X = ((B AND NOT A) XOR (A OR C)) (a) Draw a logic circuit to match the given logic statement. All logic gates must have a maximum of two inputs. Do not attempt to simplify the logic statement. A B X C [4] (b) Complete the truth table for the given logic statement. A B C 0 0 0 0 0 1 0 1 0 0 1 1 1 0 0 1 0 1 1 1 0 1 1 1 Working space X [4] © UCLES 2020 0478/13/O/N/20 9 11 www.dynamicpapers.com A theme park has a game where a player tries to run from the start to the finish without getting wet. The system for the game uses sensors and a microprocessor to spray water at a player as they run past each sensor. Describe how the sensors and the microprocessor are used in this system. .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .................................................................................................................................................... [6] 12 Warner says that he has a very good Internet Service Provider (ISP) that provides several services. Five statements about ISPs are given. Tick (3) to show if each statement is True or False. True (3) Statement False (3) Provides access to the Internet for customers Can determine the maximum bandwidth available for customers Monitors the volume of data downloaded by customers Can provide an IP address for the customer Stores the content for all web pages available on the Internet [5] © UCLES 2020 0478/13/O/N/20 [Turn over 10 www.dynamicpapers.com 13 Phishing and pharming are two security issues a user should be aware of when using the Internet. (a) State one similarity between phishing and pharming. ................................................................................................................................................... ............................................................................................................................................. [1] (b) Explain two differences between phishing and pharming. Difference 1 ............................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... Difference 2 .............................................................................................................................. ................................................................................................................................................... ................................................................................................................................................... [2] © UCLES 2020 0478/13/O/N/20 11 BLANK PAGE © UCLES 2020 0478/13/O/N/20 www.dynamicpapers.com 12 www.dynamicpapers.com BLANK PAGE Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will be pleased to make amends at the earliest possible opportunity. To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cambridgeinternational.org after the live examination series. Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge. © UCLES 2020 0478/13/O/N/20 www.dynamicpapers.com Cambridge IGCSE™ COMPUTER SCIENCE 0478/13 Paper 1 October/November 2020 MARK SCHEME Maximum Mark: 75 Published This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the details of the discussions that took place at an Examiners’ meeting before marking began, which would have considered the acceptability of alternative answers. Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for Teachers. Cambridge International will not enter into discussions about these mark schemes. Cambridge International is publishing the mark schemes for the October/November 2020 series for most Cambridge IGCSE™, Cambridge International A and AS Level and Cambridge Pre-U components, and some Cambridge O Level components. This document consists of 13 printed pages. © UCLES 2020 [Turn over 0478/13 Cambridge IGCSE – Mark Scheme PUBLISHED Generic Marking Principles October/November 2020 www.dynamicpapers.com These general marking principles must be applied by all examiners when marking candidate answers. They should be applied alongside the specific content of the mark scheme or generic level descriptors for a question. Each question paper and mark scheme will also comply with these marking principles. GENERIC MARKING PRINCIPLE 1: Marks must be awarded in line with: • • • the specific content of the mark scheme or the generic level descriptors for the question the specific skills defined in the mark scheme or in the generic level descriptors for the question the standard of response required by a candidate as exemplified by the standardisation scripts. GENERIC MARKING PRINCIPLE 2: Marks awarded are always whole marks (not half marks, or other fractions). GENERIC MARKING PRINCIPLE 3: Marks must be awarded positively: • • • • • marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit is given for valid answers which go beyond the scope of the syllabus and mark scheme, referring to your Team Leader as appropriate marks are awarded when candidates clearly demonstrate what they know and can do marks are not deducted for errors marks are not deducted for omissions answers should only be judged on the quality of spelling, punctuation and grammar when these features are specifically assessed by the question as indicated by the mark scheme. The meaning, however, should be unambiguous. GENERIC MARKING PRINCIPLE 4: Rules must be applied consistently, e.g. in situations where candidates have not followed instructions or in the application of generic level descriptors. © UCLES 2020 Page 2 of 13 0478/13 Cambridge IGCSE – Mark Scheme PUBLISHED October/November 2020 www.dynamicpapers.com GENERIC MARKING PRINCIPLE 5: Marks should be awarded using the full range of marks defined in the mark scheme for the question (however; the use of the full mark range may be limited according to the quality of the candidate responses seen). GENERIC MARKING PRINCIPLE 6: Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should not be awarded with grade thresholds or grade descriptors in mind. © UCLES 2020 Page 3 of 13 0478/13 Cambridge IGCSE – Mark Scheme PUBLISHED Question 1 Answer One mark for each correct row: Device Input () Marks 5 Output () Storage () Solid state drive (SSD) Headphones 2D cutter LCD projector Microphone October/November 2020 www.dynamicpapers.com Question Answer Marks 2(a) − Control unit // CU 1 2(b) − Arithmetic logic unit // ALU 1 2(c) − Program counter // memory address register // PC // MAR 1 2(d) − Memory data register // current instruction register // MDR // CIR 1 2(e) − Memory data register // MDR 1 © UCLES 2020 Page 4 of 13 0478/13 Cambridge IGCSE – Mark Scheme PUBLISHED Question 3(a) 3(b) Question 4(a) © UCLES 2020 October/November 2020 www.dynamicpapers.com Answer One mark per each correct row: Marks 4 Denary Binary Conversion Correct () Incorrect () 145 10010001 179 10110101 11 00010011 100 01100010 One mark for each correct conversion in the correct order: − C − 4 − 0 Answer Any four from: − Browsers sends URL to DNS − … using HTTP − DNS finds matching IP addresses for URL − … and sends IP address to web browser − Web browser sends request to IP address/web server for web pages − Web pages are sent from web server to browser − Browser renders HTML to display web pages − Any security certificates are exchanged/authenticated // SSL/HTTPS is used to secure the data − … encrypting any data sent Page 5 of 13 3 Marks 4 0478/13 Cambridge IGCSE – Mark Scheme PUBLISHED Question 4(b) Answer Any three from: − Hacking − Denial of service (DoS) − Malware − Virus October/November 2020 www.dynamicpapers.com Marks 3 NOTE: three suitable types of malware can be awarded Question 5(a) Answer One mark for correct tick, two marks for description − Serial − − Bits sent one at a time Single wire Marks 3 If parallel given, no mark for parallel, but follow through for correct description of parallel: − − 5(b) © UCLES 2020 Multiple bits sent at a time Multiple wires Any three from: − Universal connection // industry standard − Can only be inserted one way − Backward compatible − Auto configures // automatically recognised devices − Can power devices − Fast data transfer speed − Inexpensive to purchase/manufacture Page 6 of 13 3 0478/13 Cambridge IGCSE – Mark Scheme PUBLISHED Question 5(c) Answer Any two from: − TLS − SSL − HTTPS Answer − − − − − Answer One mark for each correct row: 8-bit binary value Even () 10000001 10000010 7(b) © UCLES 2020 Marks 4 Odd () 00101001 00101000 Marks 5 Key // Algorithm Algorithm // Key (must be opposite of first one) Plain Cypher Key // Algorithm Question 7(a) Marks 2 Question 6 October/November 2020 www.dynamicpapers.com Any one from: − Transposition error − When bits still add up to odd/even number − Even number of incorrect bits 1 Page 7 of 13 0478/13 Cambridge IGCSE – Mark Scheme PUBLISHED Question 7(c) Answer Any one from: − ARQ − Checksum Question October/November 2020 www.dynamicpapers.com Marks 1 Answer Marks 8(a) Any three from: − Liquid crystal display − The display is made of pixels − … arranged in a matrix − Uses a flat panel display − Backlit display − … with CCFLs/LEDs − Uses light-modulating properties of liquid crystals − Crystals can be turned between opaque and transparent (to allow light to pass) − Colours created using RGB 3 8(b) Any three from: − Low power consumption − Runs at cool temperature − Do not suffer image burn − Do not suffer flicker issues − Bright image/colours − High resolution image − Cheaper to purchase than e.g. LED screen 3 © UCLES 2020 Page 8 of 13 0478/13 Cambridge IGCSE – Mark Scheme PUBLISHED Question Answer October/November 2020 www.dynamicpapers.com Marks 9(a) Any three from: − Both need a red laser to read/write data − Both are spun to be read − Both use spiral tracks for data − Both are optical storage − Both are off-line storage // both non-volatile − Both use pits and lands to store data 3 9(b) Any one from: − DVD can be dual layer, but CD can only be single − DVD has higher storage capacity − DVD has a shorter wavelength laser − DVD are spun faster − DVDs have a higher data transfer rate 1 © UCLES 2020 Page 9 of 13 0478/13 Question 10(a) © UCLES 2020 Cambridge IGCSE – Mark Scheme PUBLISHED Answer One mark for each correct logic gate with the correct input: Page 10 of 13 October/November 2020 www.dynamicpapers.com Marks 4 0478/13 Cambridge IGCSE – Mark Scheme PUBLISHED Question 10(b) 11 © UCLES 2020 Answer October/November 2020 www.dynamicpapers.com Marks 4 Four marks for 8 correct outputs Three marks for 6/7 correct outputs Two marks for 4/5 correct outputs One mark for 2/3 correct outputs Working space A B C X 0 0 0 0 0 0 1 1 0 1 0 1 0 1 1 0 1 0 0 1 1 0 1 1 1 1 0 1 1 1 1 1 Six from: − Suitable sensor used e.g. motion sensor/pressure sensor − (Analogue) data is converted to digital (using ADC) − Sensor sends data to microprocessor − Data compared to stored data … − … if value outside range/within range water is sprayed − … signal sent to actuator to spray water − … if value within range/outside range no action taken − Continuous loop Page 11 of 13 6 0478/13 Question 12 Answer Marks One mark for each correct row: 5 True () Statement Provides access to the Internet for customers Can determine the maximum bandwidth available for customers Monitors the volume of data downloaded by customers Can provide an IP address for the customer Stores the content for all web pages available on the Internet © UCLES 2020 October/November 2020 www.dynamicpapers.com Cambridge IGCSE – Mark Scheme PUBLISHED Page 12 of 13 False () 0478/13 Cambridge IGCSE – Mark Scheme PUBLISHED Question Answer October/November 2020 www.dynamicpapers.com Marks 13(a) Any one from: − Both are designed to steal/collect personal data − Both pretend to be a real company − Both use fake websites 1 13(b) − − 2 © UCLES 2020 Phishing involves use of an email whereas pharming involves installing malicious code Phishing involves clicking a link or an attachment whereas pharming creates a redirection Page 13 of 13 www.dynamicpapers.com Cambridge IGCSE™ * 0 8 0 3 7 2 8 9 4 0 * COMPUTER SCIENCE 0478/12 February/March 2021 Paper 1 Theory 1 hour 45 minutes You must answer on the question paper. No additional materials are needed. INSTRUCTIONS ● Answer all questions. ● Use a black or dark blue pen. You may use an HB pencil for any diagrams or graphs. ● Write your name, centre number and candidate number in the boxes at the top of the page. ● Write your answer to each question in the space provided. ● Do not use an erasable pen or correction fluid. ● Do not write on any bar codes. ● Calculators must not be used in this paper. INFORMATION ● The total mark for this paper is 75. ● The number of marks for each question or part question is shown in brackets [ ]. ● No marks will be awarded for using brand names of software packages or hardware. This document has 16 pages. Any blank pages are indicated. DC (PQ/SG) 202679/4 © UCLES 2021 [Turn over 2 1 www.dynamicpapers.com A hockey club records the number of people that watch each match. An 8-bit binary register is used to store this value. (a) 46 people watch the first match and 171 people watch the second match. Show how the registers would store these denary values as 8-bit binary. Denary value 8-bit binary 46 171 [2] Working space ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... (b) Give the largest denary value that can be stored in the 8-bit binary register. ............................................................................................................................................. [1] (c) The hockey club wants to increase the number of people that can watch each match to 2000. The 8-bit binary register may no longer be able to store the value. Give the smallest number of bits that can be used to store the denary value 2000. ............................................................................................................................................. [1] Working space ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... © UCLES 2021 0478/12/F/M/21 3 www.dynamicpapers.com (d) Electronic data about the final score for the match is transmitted to a central computer 30 kilometres away, using serial transmission. (i) Explain why serial transmission is more appropriate than parallel transmission in this scenario. ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... ..................................................................................................................................... [3] (ii) The data transmission is also half-duplex. Describe half-duplex data transmission. ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... ..................................................................................................................................... [2] (iii) The data transmission uses checksums. Describe how checksums are used to detect errors in data transmission. ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... ..................................................................................................................................... [3] © UCLES 2021 0478/12/F/M/21 [Turn over 4 2 www.dynamicpapers.com Gurdeep takes high definition photographs using a digital camera. She has set up a website where users can view thumbnails of her photographs. A thumbnail is a small version of the high definition photograph. (a) Gurdeep compresses the high definition photographs to create the thumbnails. She uses lossy compression. Describe how lossy compression creates the thumbnails. ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ............................................................................................................................................. [3] (b) Gurdeep sets up a web server to host her website. She reads about an Internet Protocol (IP) address, a Media Access Control (MAC) address and a Uniform Resource Locator (URL). Draw a line to connect each term to the correct example. Term Example IP address 192.168.0.255 MAC address https://www.cambridgeinternational.org URL 00:15:E9:2B:99:3C [2] © UCLES 2021 0478/12/F/M/21 5 www.dynamicpapers.com (c) Users can buy the high definition photographs from the website. When a user buys a high definition photograph, a Secure Socket Layer (SSL) connection is created. (i) Give one benefit of using an SSL connection. ........................................................................................................................................... ..................................................................................................................................... [1] (ii) Explain how the SSL connection is created. ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... ..................................................................................................................................... [4] © UCLES 2021 0478/12/F/M/21 [Turn over 6 3 www.dynamicpapers.com The given table shows the name or description of four devices. The table is incomplete. Complete the missing device names and descriptions. Device name Description ................................................... Uses either thermal bubble or piezoelectric technology ............................................................................................... Actuator ............................................................................................... ............................................................................................... ............................................................................................... ................................................... Uses thousands of tiny mirrors that can move very quickly to create an image ............................................................................................... Mouse ............................................................................................... ............................................................................................... ............................................................................................... [4] © UCLES 2021 0478/12/F/M/21 7 4 www.dynamicpapers.com A supermarket sells many products. Each product has a barcode. (a) Explain how the barcode is read at the supermarket checkout and how the price of the product is found. ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ............................................................................................................................................. [6] (b) The supermarket stores data using a Solid State Drive (SSD). (i) Explain how an SSD stores data. ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... ..................................................................................................................................... [3] (ii) One advantage of an SSD rather than a Hard Disk Drive (HDD) is that it has no moving parts, so it is more durable. State one other advantage of the supermarket using SSD rather than HDD. ........................................................................................................................................... ..................................................................................................................................... [1] © UCLES 2021 0478/12/F/M/21 [Turn over www.dynamicpapers.com 8 5 Computers use logic gates. (a) State the single logic gate that produces each truth table. Truth table Logic gate A B Output 0 0 1 0 1 1 1 0 1 1 1 0 A B Output 0 0 0 0 1 1 1 0 1 1 1 0 A B Output 0 0 1 0 1 0 1 0 0 1 1 0 ................................................................................... ................................................................................... ................................................................................... [3] (b) An aeroplane has a warning system that monitors the height of the aeroplane above the ground, whether the aeroplane is ascending or descending, and the speed of the aeroplane. © UCLES 2021 Input Binary value Condition Height (H) 1 Height is less than 500 metres 0 Height is greater than or equal to 500 metres Ascending or Descending (A) 1 Aeroplane is ascending or in level flight 0 Aeroplane is descending Speed (S) 1 Speed is less than or equal to 470 knots 0 Speed is greater than 470 knots 0478/12/F/M/21 9 www.dynamicpapers.com The warning system will produce an output of 1 that will sound an alarm (W) when either of these conditions apply: Height is less than 500 metres and the aeroplane is descending or The aeroplane is descending and speed is greater than 470 knots Draw a logic circuit to represent the warning system. H A W S [5] © UCLES 2021 0478/12/F/M/21 [Turn over 10 6 www.dynamicpapers.com Hacking is one type of Internet risk used to obtain personal data that is stored on a computer. (a) Explain how a firewall can help prevent hacking. ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ............................................................................................................................................. [4] (b) Identify and describe two other types of internet risk that are used to obtain personal data. Internet risk 1 ............................................................................................................................ Description ................................................................................................................................ ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... Internet risk 2 ............................................................................................................................ Description ................................................................................................................................ ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... [6] © UCLES 2021 0478/12/F/M/21 11 7 www.dynamicpapers.com Adeel has used a high-level language to program a mobile application. (a) Describe what is meant by a high-level language. ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ............................................................................................................................................. [2] (b) Adeel uses an interpreter while developing and testing the application. Adeel uses a compiler when the application is ready to be shared with others. Compare the features of interpreters and compilers. ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ............................................................................................................................................. [4] (c) Adeel is considering distributing his application as free software or shareware. Explain the difference between free software and shareware. ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ............................................................................................................................................. [5] © UCLES 2021 0478/12/F/M/21 [Turn over 12 www.dynamicpapers.com (d) Adeel is concerned about his application being plagiarised. Define the term plagiarism. ................................................................................................................................................... ............................................................................................................................................. [1] (e) Adeel copyrights his application. State why Adeel copyrights his application. ................................................................................................................................................... ............................................................................................................................................. [1] © UCLES 2021 0478/12/F/M/21 13 8 www.dynamicpapers.com The Von Neumann model, for a computer system, uses the stored program concept. (a) Describe what is meant by the stored program concept. ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ............................................................................................................................................. [2] (b) The fetch-execute cycle of a Von Neumann model, for a computer system, uses registers and buses. (i) Describe the role of the Program Counter. ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... ..................................................................................................................................... [2] (ii) Describe the role of the Control Bus. ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... ..................................................................................................................................... [2] (c) Computers based on the Von Neumann model, for a computer system, use interrupts. Explain why interrupts are needed. ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ............................................................................................................................................. [2] © UCLES 2021 0478/12/F/M/21 14 BLANK PAGE © UCLES 2021 0478/12/F/M/21 www.dynamicpapers.com 15 BLANK PAGE © UCLES 2021 0478/12/F/M/21 www.dynamicpapers.com 16 www.dynamicpapers.com BLANK PAGE Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will be pleased to make amends at the earliest possible opportunity. To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cambridgeinternational.org after the live examination series. Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge. © UCLES 2021 0478/12/F/M/21 www.dynamicpapers.com Cambridge IGCSE™ COMPUTER SCIENCE 0478/12 Paper 1 March 2021 MARK SCHEME Maximum Mark: 75 Published This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the details of the discussions that took place at an Examiners’ meeting before marking began, which would have considered the acceptability of alternative answers. Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for Teachers. Cambridge International will not enter into discussions about these mark schemes. Cambridge International is publishing the mark schemes for the March 2021 series for most Cambridge IGCSE™, Cambridge International A and AS Level components and some Cambridge O Level components. This document consists of 10 printed pages. © UCLES 2021 [Turn over 0478/12 Cambridge IGCSE – Mark Scheme March 2021 www.dynamicpapers.com PUBLISHED Generic Marking Principles These general marking principles must be applied by all examiners when marking candidate answers. They should be applied alongside the specific content of the mark scheme or generic level descriptors for a question. Each question paper and mark scheme will also comply with these marking principles. GENERIC MARKING PRINCIPLE 1: Marks must be awarded in line with: • • • the specific content of the mark scheme or the generic level descriptors for the question the specific skills defined in the mark scheme or in the generic level descriptors for the question the standard of response required by a candidate as exemplified by the standardisation scripts. GENERIC MARKING PRINCIPLE 2: Marks awarded are always whole marks (not half marks, or other fractions). GENERIC MARKING PRINCIPLE 3: Marks must be awarded positively: • • • • • marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit is given for valid answers which go beyond the scope of the syllabus and mark scheme, referring to your Team Leader as appropriate marks are awarded when candidates clearly demonstrate what they know and can do marks are not deducted for errors marks are not deducted for omissions answers should only be judged on the quality of spelling, punctuation and grammar when these features are specifically assessed by the question as indicated by the mark scheme. The meaning, however, should be unambiguous. GENERIC MARKING PRINCIPLE 4: Rules must be applied consistently, e.g. in situations where candidates have not followed instructions or in the application of generic level descriptors. GENERIC MARKING PRINCIPLE 5: Marks should be awarded using the full range of marks defined in the mark scheme for the question (however; the use of the full mark range may be limited according to the quality of the candidate responses seen). GENERIC MARKING PRINCIPLE 6: Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should not be awarded with grade thresholds or grade descriptors in mind. © UCLES 2021 Page 2 of 10 Cambridge IGCSE – Mark Scheme March 2021 www.dynamicpapers.com PUBLISHED 0478/12 Question 1(a) Answer Marks 1 mark each 2 Denary Value 8-bit binary 46 0 0 1 0 1 1 1 0 171 1 0 1 0 1 0 1 1 1(b) − 255 1 1(c) − 11 1 1(d)(i) Any three from: − More accurate/reliable/efficient over long distances − Less chance of interference / cross talk − …that will skew / distort the data // less likely to get errors − Data will arrive in order − Serial is cheaper to purchase/install/maintain 3 1(d)(ii) − − 2 1(d)(iii) Any three from: − Calculates a value from the bits/data (to be transferred) // by example/description − Value is appended to the bits/data − Value is transferred with the bits/data − Receiver recalculates the checksum − If both values are different error is detected // if both values are the same the transmission is successful Question 2(a) © UCLES 2021 Transmission in both directions … …not at the same time // asynchronous Answer Any three from: − A compression algorithm is used − Data will be lost/deleted permanently // original file cannot be recreated − Reduce the range of colours used / colour depth / bits per pixel − Reduce the number of pixels / image resolution removes data that will not be noticed by the user // removes unnecessary data Page 3 of 10 3 Marks 3 Cambridge IGCSE – Mark Scheme March 2021 www.dynamicpapers.com PUBLISHED 0478/12 Question 2(b) Answer 1 mark for 1 line, 2 marks for 3 lines Term Marks 2 Details IP address 192.168.0.255 MAC address https://www.cambridgeinternational.org URL 00:15:E9:2B:99:3C 2(c)(i) − 2(c)(ii) Four from: − Uses (digital) certificates − ….requested from web server by browser/client // browser/client asks web server to identify itself − Server send SSL/digital signature to browser/client − Client and server agree on encryption method to use − … that contains the server's public key − Browser checks authenticity of certificate… − … then session key is generated − … the transaction will begin // sends signal to server to start transmission © UCLES 2021 Data if intercepted cannot be understood // Data is encrypted // Data is scrambled // uses keys to encode/decode data Page 4 of 10 1 4 Cambridge IGCSE – Mark Scheme March 2021 www.dynamicpapers.com PUBLISHED 0478/12 Question 3 Answer One mark for each device/description Description Inkjet Printer Uses either thermal bubble or piezoelectric technology − DLP//Projector Mouse − − 4(a) Operated by signals to cause a physical movement Controls the movement of a machine // by example Uses thousands of tiny mirrors that can move very quickly to create an image − Question 4 Name of device Actuator Uses rolling ball / optical sensor / laser to detect motion // by example Movement echoed on screen // moves curser/pointer (on screen) Has scroll wheel / Buttons to allow data input // by example Answer Six from Max four from: − Scanned using a barcode reader − Shines (red) laser/light − Light is reflected back // white lines reflect light // black lines reflect less light − Sensors/photoelectric cells detect the light − Different reflections/bars give different binary/digital values // (pattern) converted to binary/digital values − Microprocessor interprets the data − Uses check digit error checking Max three from: − Database stores data/barcodes/products/prices − Barcode/value/key transmitted to database/system // Searches for barcode/value/key in the database/system… − … price is returned/found © UCLES 2021 Marks Page 5 of 10 Marks 6 0478/12 Question Cambridge IGCSE – Mark Scheme March 2021 www.dynamicpapers.com PUBLISHED Answer Marks 4(b)(i) Max three from: − Flash storage − Uses transistors/controls gates/floating gates − Can be NAND/NOR technology // Can use flip-flops − Stores data by flashing it onto the chips/device − Controlling/using the flow of electrons through/using transistors/chips/gates − The electric current reaches the control gate and flows through to the floating gate to be stored − When data is stored the transistor is converted from 1 to 0 / 0 to 1 3 4(b)(ii) Max one from: − Faster read/write operation − Produces less heat // needs less cooling − Less susceptible to interference/magnets − Less power consumption 1 © UCLES 2021 Page 6 of 10 Cambridge IGCSE – Mark Scheme March 2021 www.dynamicpapers.com PUBLISHED 0478/12 Question Answer 5(a) © UCLES 2021 Truth table Marks 3 Logic gate A B Output 0 0 1 0 1 1 1 0 1 1 1 0 A B Output 0 0 0 0 1 1 1 0 1 1 1 0 A B Output 0 0 1 0 1 0 1 0 0 1 1 0 NAND [1] XOR / Exclusive OR [1] NOR [1] Page 7 of 10 Cambridge IGCSE – Mark Scheme March 2021 www.dynamicpapers.com PUBLISHED 0478/12 Question 5(b) Answer One mark for each logic gates with correct inputs − − − − − Question Marks 5 NOT A NOT S H AND NOT A NOT A AND NOT S Final OR Answer Marks 6(a) Any four from: − Monitors incoming and outgoing traffic − Allows the setting of criteria/blacklist/whitelist/by example − Blocks access to signals that do not meet requirements/criteria/blacklist/whitelist … − … sends signal to warn the user − Restrict access to specific applications − Blocks entry/exit by specific ports 4 6(b) One mark for risk, two marks for description 6 © UCLES 2021 − − − Phishing Legitimate looking email sent to user Clicking on link/attachment takes user to fake website − − − Pharming Software is installed on user’s computer Redirects (correct URL) to different/fraudulent website − − − − Spyware (accept keylogger but do not award for MP3) Software is installed on user’s computer Records key strokes // keylogger Transmits data to third part for analysis Page 8 of 10 Cambridge IGCSE – Mark Scheme March 2021 www.dynamicpapers.com PUBLISHED 0478/12 Question Answer 7(a) Any two from: − Makes use of words // close to human language − Machine independent // portable − Problem / logic focussed − Needs to be translated/interpreter/compiled (to low-level for processing by computer) // needs converting to machine code 2 7(b) Four from Max 2 for only giving compiler/interpreter features 4 7(c) − − Both translate high level / source code to machine code Both generate error diagnostics/messages // identify errors − − Interpreter translates one line at a time // checks one line and then runs it Compiler translates whole code in one go // checks all code and then runs it − − − Interpreter stops when meets an error …and then allows you to continue running from where you stopped // correct errors in real-time Compiler provides list of all errors − − Interpreter does not produce an executable file Compiler produces an executable file Any five from: − Free software is distributed with the source code − …whereas shareware is not distributed with the source code Marks 5 − − Free software allows modification of the application …whereas shareware cannot be modified − Shareware normally allows a trial period for the end user // shareware has limited features to start with − − Free software is often available free of charge …whereas shareware normally has a charge after trial period // shareware has charge to access all features // shareware makes you sign-up/register after trial period // shareware makes you sign-up/register to access all features 7(d) − Claiming another person's work as your own 1 7(e) − To identify legal ownership // to claim ownership // protect intellectual property 1 © UCLES 2021 Page 9 of 10 Cambridge IGCSE – Mark Scheme March 2021 www.dynamicpapers.com PUBLISHED 0478/12 Question Answer Marks 8(a) − − Instructions and data stored in the same/main memory Instructions fetched and executed in order / one after another / in sequence 2 8(b)(i) − − Holds the address … … of next / current instruction 2 8(b)(ii) Any two from: − Carries / transfers control signals/instructions // carries/transfers commands … − … from CPU/CU to components // from devices to CPU/CU − To synchronise the FE cycle 2 8(c) Any two from: − To identify that the processor's attention is required // to stop the current process/task − To allow multitasking − To allow for efficient processing // prioritising actions − To allow for efficient use of hardware − To allow time-sensitive requests to be dealt with − To avoid the need to poll devices 2 © UCLES 2021 Page 10 of 10 www.dynamicpapers.com Cambridge IGCSE™ * 3 0 5 1 9 9 1 3 9 5 * COMPUTER SCIENCE 0478/11 May/June 2021 Paper 1 Theory 1 hour 45 minutes You must answer on the question paper. No additional materials are needed. INSTRUCTIONS ● Answer all questions. ● Use a black or dark blue pen. You may use an HB pencil for any diagrams or graphs. ● Write your name, centre number and candidate number in the boxes at the top of the page. ● Write your answer to each question in the space provided. ● Do not use an erasable pen or correction fluid. ● Do not write on any bar codes. ● Calculators must not be used in this paper. INFORMATION ● The total mark for this paper is 75. ● The number of marks for each question or part question is shown in brackets [ ]. ● No marks will be awarded for using brand names of software packages or hardware. This document has 16 pages. Any blank pages are indicated. DC (LK/SG) 202678/4 © UCLES 2021 [Turn over 2 1 www.dynamicpapers.com Benedict has a computer that is assigned an Internet Protocol (IP) address. The IP address is: 198.167.214.0 The IP address is represented as denary values. (a) Convert the denary values 167 and 214 from the IP address to 8-bit binary. 167 214 Working space ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... [2] (b) Benedict’s computer is also assigned a Media Access Control (MAC) address. (i) Identify one similarity between an IP address and a MAC address. ........................................................................................................................................... ..................................................................................................................................... [1] (ii) Identify two differences between an IP address and a MAC address. Difference 1 ....................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... Difference 2 ....................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... [2] © UCLES 2021 0478/11/M/J/21 3 2 www.dynamicpapers.com Julia inputs personal data into her computer. She stores three copies of the data using a hard disk drive (HDD), a solid state drive (SSD) and a USB flash memory drive. (a) Identify three devices Julia can use to input personal data into her computer. Device 1 .................................................................................................................................... Device 2 .................................................................................................................................... Device 3 .................................................................................................................................... [3] (b) Six statements are shown about HDDs, SSDs and USB flash memory drives. Tick (✓) to show which statements apply to each type of storage. Some statements can apply to more than one type of storage. Statement HDD (✓) SSD (✓) USB flash memory drive (✓) it has no moving parts it is non-volatile it can use NAND gates to store data it uses magnetic properties to store data it has the smallest physical size it has the slowest read/write speeds [6] © UCLES 2021 0478/11/M/J/21 [Turn over 4 www.dynamicpapers.com (c) Julia uses a USB connection to transfer data onto her USB flash memory drive. (i) One benefit of using a USB connection is that it is a universal connection. State two other benefits of using a USB connection. Benefit 1 ............................................................................................................................ ........................................................................................................................................... Benefit 2 ............................................................................................................................ ........................................................................................................................................... [2] (ii) Identify the type of data transmission used in a USB connection. ..................................................................................................................................... [1] © UCLES 2021 0478/11/M/J/21 5 3 www.dynamicpapers.com A firewall can be used to help keep the data secure that is stored on a computer. (a) The given paragraph describes how the firewall operates to help keep the data secure. Complete the paragraph using the most appropriate terms from the given list. Not all of the terms on the list need to be used. • • • • • • • • • • • • Accept Criteria Hacking Input Network Outgoing Output Processor Reject Software Store Storage A firewall can be ............................................ or hardware based. It monitors traffic between the computer and the ............................................ The user sets ............................................ for the traffic. The firewall will .............................................. or ............................................ the traffic based on this. It can help prevent ............................................ and malicious software that could be a threat to the security of the data. [6] (b) Identify three other methods that could be used to keep the data secure. Method 1 ................................................................................................................................... Method 2 ................................................................................................................................... Method 3 ................................................................................................................................... [3] © UCLES 2021 0478/11/M/J/21 [Turn over 6 4 www.dynamicpapers.com Two internet risks are phishing and pharming. Describe what is meant by phishing and pharming. Phishing ........................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... Pharming .......................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... [6] © UCLES 2021 0478/11/M/J/21 7 5 www.dynamicpapers.com Jamelia has a greenhouse that she uses to grow fruit and vegetables. She needs to make sure the temperature in the greenhouse stays between 25 °C and 30 °C (inclusive). A system that has a temperature sensor and a microprocessor is used to maintain the temperature in the greenhouse. The system will: • • open a window and turn a heater off if it gets too hot close a window and turn a heater on if it gets too cold. Describe how the system uses the temperature sensor and the microprocessor to maintain the temperature in the greenhouse. .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .................................................................................................................................................... [8] © UCLES 2021 0478/11/M/J/21 [Turn over 8 6 www.dynamicpapers.com Consider the logic statement: X = (((A AND B) OR (C AND NOT B)) XOR NOT C) (a) Draw a logic circuit to represent the given logic statement. Do not attempt to simplify the statement. All logic gates must have a maximum of two inputs. A B X C [6] © UCLES 2021 0478/11/M/J/21 www.dynamicpapers.com 9 (b) Consider the completed truth table for the given logic statement. Row number A B C 1 0 0 0 0 2 0 0 1 1 3 0 1 0 0 4 0 1 1 1 5 1 0 0 0 6 1 0 1 1 7 1 1 0 0 8 1 1 1 1 Working space X There are four errors in the truth table in the output (X) column. Identify the four incorrect outputs. Write the row number to identify each incorrect output. Row ........................ Row ........................ Row ........................ Row ........................ © UCLES 2021 [4] 0478/11/M/J/21 [Turn over 10 7 www.dynamicpapers.com A music company has a website that allows users to stream music. The music is stored in sound files. (a) The sound files are compressed using lossless compression. (i) Describe how the sound files are compressed using lossless compression. ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... ..................................................................................................................................... [4] (ii) State one reason why the music company would compress the sound files using lossless, rather than lossy, compression. ........................................................................................................................................... ..................................................................................................................................... [1] (iii) Give one benefit, to the user, of the music company compressing the sound files. ........................................................................................................................................... ..................................................................................................................................... [1] (iv) Give one drawback of the music company using lossless, rather than lossy, compression for the sound files. ........................................................................................................................................... ..................................................................................................................................... [2] © UCLES 2021 0478/11/M/J/21 11 www.dynamicpapers.com (b) Describe how the web pages for the website are requested and displayed on a user’s computer. ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ............................................................................................................................................. [4] (c) The web server that hosts the website suffers a denial of service (DoS) attack. Explain why this will prevent users from accessing the website. ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ............................................................................................................................................. [2] © UCLES 2021 0478/11/M/J/21 [Turn over www.dynamicpapers.com 12 8 Four 7-bit binary values are transmitted from one computer to another. A parity bit is added to each binary value creating 8-bit binary values. All the binary values are transmitted and received correctly. (a) Identify whether each 8-bit binary value has been sent using odd or even parity by writing odd or even in the type of parity column. 8-bit binary value Type of parity 01100100 10010001 00000011 10110010 [4] (b) An error may not be detected when using a parity check. Identify why an error may not be detected. ................................................................................................................................................... ............................................................................................................................................. [1] (c) The data is sent using parallel half-duplex data transmission. (i) Describe how data is sent using parallel half-duplex data transmission. ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... ..................................................................................................................................... [4] (ii) State two drawbacks of using parallel data transmission. Drawback 1 ....................................................................................................................... ........................................................................................................................................... Drawback 2 ....................................................................................................................... ........................................................................................................................................... [2] © UCLES 2021 0478/11/M/J/21 13 BLANK PAGE © UCLES 2021 0478/11/M/J/21 www.dynamicpapers.com 14 BLANK PAGE © UCLES 2021 0478/11/M/J/21 www.dynamicpapers.com 15 BLANK PAGE © UCLES 2021 0478/11/M/J/21 www.dynamicpapers.com 16 www.dynamicpapers.com BLANK PAGE Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will be pleased to make amends at the earliest possible opportunity. To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cambridgeinternational.org after the live examination series. Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge. © UCLES 2021 0478/11/M/J/21 www.dynamicpapers.com Cambridge IGCSE™ COMPUTER SCIENCE 0478/11 Paper 1 May/June 2021 MARK SCHEME Maximum Mark: 75 Published This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the details of the discussions that took place at an Examiners’ meeting before marking began, which would have considered the acceptability of alternative answers. Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for Teachers. Cambridge International will not enter into discussions about these mark schemes. Cambridge International is publishing the mark schemes for the May/June 2021 series for most Cambridge IGCSE™, Cambridge International A and AS Level components and some Cambridge O Level components. This document consists of 8 printed pages. © UCLES 2021 [Turn over 0478/11 Cambridge IGCSE – Mark Scheme May/June 2021 www.dynamicpapers.com PUBLISHED Generic Marking Principles These general marking principles must be applied by all examiners when marking candidate answers. They should be applied alongside the specific content of the mark scheme or generic level descriptors for a question. Each question paper and mark scheme will also comply with these marking principles. GENERIC MARKING PRINCIPLE 1: Marks must be awarded in line with: • • • the specific content of the mark scheme or the generic level descriptors for the question the specific skills defined in the mark scheme or in the generic level descriptors for the question the standard of response required by a candidate as exemplified by the standardisation scripts. GENERIC MARKING PRINCIPLE 2: Marks awarded are always whole marks (not half marks, or other fractions). GENERIC MARKING PRINCIPLE 3: Marks must be awarded positively: • • • • • marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit is given for valid answers which go beyond the scope of the syllabus and mark scheme, referring to your Team Leader as appropriate marks are awarded when candidates clearly demonstrate what they know and can do marks are not deducted for errors marks are not deducted for omissions answers should only be judged on the quality of spelling, punctuation and grammar when these features are specifically assessed by the question as indicated by the mark scheme. The meaning, however, should be unambiguous. GENERIC MARKING PRINCIPLE 4: Rules must be applied consistently, e.g. in situations where candidates have not followed instructions or in the application of generic level descriptors. GENERIC MARKING PRINCIPLE 5: Marks should be awarded using the full range of marks defined in the mark scheme for the question (however; the use of the full mark range may be limited according to the quality of the candidate responses seen). GENERIC MARKING PRINCIPLE 6: Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should not be awarded with grade thresholds or grade descriptors in mind. © UCLES 2021 Page 2 of 8 0478/11 Cambridge IGCSE – Mark Scheme May/June 2021 www.dynamicpapers.com PUBLISHED Please note the following further points: The words in bold in the mark scheme are important text that needs to be present, or some notion of it needs to be present. It does not have to be the exact word, but something close to the meaning. If a word is underlined, this exact word must be present. A single forward slash means this is an alternative word. A double forward slash means that this is an alternative mark point. Ellipsis (…) on the end of one-mark point and the start of the next means that the candidate cannot get the second mark point without being awarded the first one. If a MP has ellipsis at the beginning, but there is no ellipsis on the MP before it, then this is just a follow-on sentence and can be awarded without the previous mark point. © UCLES 2021 Page 3 of 8 Cambridge IGCSE – Mark Scheme May/June 2021 www.dynamicpapers.com PUBLISHED 0478/11 Question 1(a) Answer One mark per each correct register. Marks 2 1 0 1 0 0 1 1 1 1 1 0 1 0 1 1 0 1(b)(i) Any one from: − Both addresses can be used to identify a computer/device − Both are unique − Both can be represented as hexadecimal − Both addresses do not change if IP address is static 1 1(b)(ii) Any two from: − An IP address is assigned by the network/router/ISP, A MAC address is assigned by the manufacturer − An IP address can be changed (if dynamic), MAC address cannot be changed − IP address has 4/8 groups of values, MAC address has 6 groups/pairs of values − IP address is 32-bit/128-bit, MAC address is 48-bit − IP address does not contain serial number/manufacturer number, MAC address does − IP(v4) address is denary and MAC address is hexadecimal 2 Question Answer 2(a) © UCLES 2021 Any three from: − Keyboard − Mouse − Microphone − Keypad − Touchscreen − Touchpad Marks 3 Page 4 of 8 Cambridge IGCSE – Mark Scheme May/June 2021 www.dynamicpapers.com PUBLISHED 0478/11 Question 2(b) Answer Marks One mark for each correct row. 6 Statement HDD () it has no moving parts it is non-volatile it can use NAND gates to store data it uses magnetic properties to store data SSD () USB flash memory drive () it has the smallest physical size it has the slowest read/write speeds 2(c)(i) Any two from: − It cannot be inserted incorrectly − Supports different transmission speeds − High speed transmission − Automatically detected (not connected) // automatically downloads drivers − Powers the device (for data transfer) − Backward compatible 2 2(c)(ii) − 1 Question 3(a) © UCLES 2021 Serial Answer One mark per each correct term in the correct order. − Software − Network − Criteria − Accept // reject − Reject // accept − Hacking Page 5 of 8 Marks 6 Cambridge IGCSE – Mark Scheme May/June 2021 www.dynamicpapers.com PUBLISHED 0478/11 Question 3(b) Answer Any three from: − Password − Biometrics (device) − Encryption − Physical methods (e.g. locks) − Two-factor authentication // Two-step verification − Anti-viruses Question 4 Answer Marks 3 Marks 6 Any six from: Phishing − Legitimate looking email sent to user − encourages user to click a link that directs user to a fake website − User encouraged to enter personal details into a fake website // designed to obtain personal details from a user Pharming − Malicious code/malware is downloaded/installed // software downloaded without users' knowledge − … that re-directs user to fake website (when legitimate URL entered) − User encouraged to enter personal details into a fake website // designed to obtain personal details from a user Question 5 © UCLES 2021 Answer Eight from: − Sensor send data/readings/signal to microprocessor − Data is converted from analogue to digital (using ADC) − Microprocessor compares/checks data to stored values/range of values … − … If data is greater than 30 / above the range microprocessor sends signal to open window and to turn heater off − … If data is below 25 the microprocessor sends signal to turn on heater and to close window − … If data is between 25 and 30 / within the range no action taken − Actuator is used to operate heater/window − Whole process is continuous Page 6 of 8 Marks 8 Cambridge IGCSE – Mark Scheme May/June 2021 www.dynamicpapers.com PUBLISHED 0478/11 Question Answer Marks 6(a) One mark per each correct logic gate, with correct input: 6 6(b) − − − − 4 Question 7(a)(i) Row 1 Row 3 Row 4 Row 5 Answer Four from: − (Compression) algorithm is used − No data will be removed // original file can be restored − Example of type of algorithm that would be used e.g. RLE − Repeated patterns in the music are identified − … and indexed Marks 4 NOTE: If another lossless method is described, marks can be awarded. 7(a)(ii) Any one from: − To provide the highest quality of music file (that compression will allow) − The user is able to listen to the original sound file − No loss of quality for the sound file provided 1 7(a)(iii) Any one from: − Allow for quicker streaming speed − Would not require as much bandwidth (to stream) − Does not need as much RAM − Smoother listening experience // less lag − Will not use as much of data allowance 1 © UCLES 2021 Page 7 of 8 Cambridge IGCSE – Mark Scheme May/June 2021 www.dynamicpapers.com PUBLISHED 0478/11 Question 7(a)(iv) Answer Marks Two from: − Streaming speed may be slower − … and may affect listening experience // buffering may occur − User may need more bandwidth to stream − … that could be more expensive − It would be a larger file size − … so may take longer to upload − … so will take up more storage space … − … on webserver 2 7(b) Any four from: − Browser sends URL to DNS − … using HTTP/HTTPS − IP address is found on DNS − DNS returns IP address to the browser − Browser sends request to web server/IP address − Web server sends web pages back to browser − Browser interprets/renders the HTML (to display web pages) − Security certificates exchanged 4 7(c) Two from: − Web server has been flooded with traffic // web server has been sent many requests at once − … so, server is brought to a halt / crashes 2 Question Answer Marks 8(a) − − − − 8(b) Any one from: − there is a transposition of bits − it does not check the order of the bits (just the sum of 1s/0s) − even number of bits change − incorrect bits still add up to correct parity 1 8(c)(i) Four from: − Multiple bits are sent at the same time − Uses multiple wires − Data is sent in both directions … − … but only one direction at a time 4 8(c)(ii) Any two from: − Bits may arrive skewed − More expensive to setup/manufacture/purchase cable − Limited distance − More prone to interference/error 2 © UCLES 2021 4 Odd Odd Even Even Page 8 of 8 www.dynamicpapers.com Cambridge IGCSE™ * 1 8 7 5 9 9 1 1 3 6 * COMPUTER SCIENCE 0478/12 May/June 2021 Paper 1 Theory 1 hour 45 minutes You must answer on the question paper. No additional materials are needed. INSTRUCTIONS ● Answer all questions. ● Use a black or dark blue pen. You may use an HB pencil for any diagrams or graphs. ● Write your name, centre number and candidate number in the boxes at the top of the page. ● Write your answer to each question in the space provided. ● Do not use an erasable pen or correction fluid. ● Do not write on any bar codes. ● Calculators must not be used in this paper. INFORMATION ● The total mark for this paper is 75. ● The number of marks for each question or part question is shown in brackets [ ]. ● No marks will be awarded for using brand names of software packages or hardware. This document has 12 pages. Any blank pages are indicated. DC (DH/SG) 202677/4 © UCLES 2021 [Turn over 2 1 www.dynamicpapers.com A denary value can be converted into hexadecimal and binary. (a) Complete the table to show the hexadecimal and 8-bit binary values of the given denary values. Denary Hexadecimal 8-bit binary 49 123 200 [6] Working space ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... (b) Give two benefits, to users, of converting binary values to hexadecimal. Benefit 1 .................................................................................................................................... ................................................................................................................................................... Benefit 2 .................................................................................................................................... ................................................................................................................................................... [2] (c) Hexadecimal is used to represent Hypertext Markup Language (HTML) colour codes in computer science. Identify three other ways that hexadecimal is used in computer science. 1 ................................................................................................................................................ 2 ................................................................................................................................................ 3 ................................................................................................................................................ [3] © UCLES 2021 0478/12/M/J/21 www.dynamicpapers.com 3 2 Data storage can be magnetic, solid state or optical. (a) Six statements are given about data storage. Tick (3) to show if the statement applies to magnetic, solid state or optical storage. Some statements may apply to more than one type of storage. Magnetic (3) Statement Solid state (3) Optical (3) no moving parts are used to store data pits and lands are used to store data data is stored on platters flash memory is used to store data parts are rotated to store data data can be stored permanently [6] (b) (i) Give one example of magnetic storage. ..................................................................................................................................... [1] (ii) Give one example of optical storage. ..................................................................................................................................... [1] (iii) Identify which type of storage would be the most suitable for use in a web server and justify your choice. Type of storage .................................................................................................................. Justification ........................................................................................................................ ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... [3] (c) Describe the operation of USB flash memory and how it stores data. ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ............................................................................................................................................. [3] © UCLES 2021 0478/12/M/J/21 [Turn over 4 3 www.dynamicpapers.com Consider the logic statement: X = ((((NOT A AND B) OR C) AND B) NOR (B OR C)) (a) Draw a logic circuit to represent the given logic statement. Do not attempt to simplify the statement. All logic gates must have a maximum of two inputs. A B X C [6] © UCLES 2021 0478/12/M/J/21 5 www.dynamicpapers.com (b) Consider the completed truth table for the given logic statement. Row number A B C 1 0 0 0 1 2 0 0 1 1 3 0 1 0 1 4 0 1 1 0 5 1 0 0 1 6 1 0 1 0 7 1 1 0 1 8 1 1 1 1 Working space X There are four errors in the truth table in the output (X) column. Identify the four incorrect outputs. Write the row number to identify each incorrect output. Row ....................... Row ....................... Row ....................... Row ....................... © UCLES 2021 [4] 0478/12/M/J/21 [Turn over www.dynamicpapers.com 6 4 Three types of Internet security risk are virus, spyware and denial of service (DoS) attack. (a) Six statements are given about Internet security risks. Tick (3) to show whether the statement applies to virus, spyware or denial of service. Some statements may apply to more than one Internet security risk. Statement Virus (3) Spyware (3) Denial of service (3) captures all data entered using a keyboard can be installed onto a web server prevents access to a website is malicious code on a computer is self-replicating damages the files on a user’s hard drive [6] (b) Identify three other types of Internet security risks. 1 ................................................................................................................................................ 2 ................................................................................................................................................ 3 ................................................................................................................................................ [3] (c) Some Internet security risks can maliciously damage data. Data can also be damaged accidentally. State three ways that data could be accidentally damaged. 1 ................................................................................................................................................ 2 ................................................................................................................................................ 3 ................................................................................................................................................ [3] © UCLES 2021 0478/12/M/J/21 7 5 www.dynamicpapers.com A security light system is used by a factory. The light only comes on when it is dark and when movement is detected. The light will stay on for 1 minute before switching off. Sensors and a microprocessor are used to control the security light system. (a) Identify two sensors that would be used in the security light system. Sensor 1 ................................................................................................................................... Sensor 2 ................................................................................................................................... [2] (b) Describe how the sensors and the microprocessor control the security light system. ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ............................................................................................................................................. [8] © UCLES 2021 0478/12/M/J/21 [Turn over 8 6 www.dynamicpapers.com Cookies can be used to store a user’s personal data and online browsing habits. (a) A cookie could be used to automatically enter a user’s payment details when the user makes a purchase online. Describe how cookies can be used to store and automatically enter a user’s payment details. ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ............................................................................................................................................. [3] (b) Explain why a user may be concerned about their personal data and online browsing habits being stored in cookies. ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ............................................................................................................................................. [4] © UCLES 2021 0478/12/M/J/21 9 7 www.dynamicpapers.com Jolene uses HTML to create a website. She separates the HTML into structure and presentation. (a) (i) Give one example of HTML structure. ..................................................................................................................................... [1] (ii) Give two examples of HTML presentation. 1 ........................................................................................................................................ 2 ........................................................................................................................................ [2] (b) Explain why Jolene separates the HTML into structure and presentation. ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ............................................................................................................................................. [2] 8 A keyboard is a type of input device that can be used to enter data into a computer. Complete the paragraph that describes one method of operation for a keyboard, using the most appropriate terms from the given list. Not all terms in the list need to be used. • • • • • • • • • • • • Binary Breaks Calculated Character Circuit Current Information Network Press Processor Signal Switch A keyboard has a key matrix underneath the keys. When a key is pressed, it presses a ............................................. that completes a ............................................. . This allows ............................................. to flow. The location of the key pressed is ............................................. . The location of the key pressed is compared to a ............................................. map to find the ............................................. value for the key that has been pressed. © UCLES 2021 [6] 0478/12/M/J/21 10 BLANK PAGE © UCLES 2021 0478/12/M/J/21 www.dynamicpapers.com 11 BLANK PAGE © UCLES 2021 0478/12/M/J/21 www.dynamicpapers.com 12 www.dynamicpapers.com BLANK PAGE Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will be pleased to make amends at the earliest possible opportunity. To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cambridgeinternational.org after the live examination series. Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge. © UCLES 2021 0478/12/M/J/21 www.dynamicpapers.com Cambridge IGCSE™ COMPUTER SCIENCE 0478/12 Paper 1 May/June 2021 MARK SCHEME Maximum Mark: 75 Published This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the details of the discussions that took place at an Examiners’ meeting before marking began, which would have considered the acceptability of alternative answers. Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for Teachers. Cambridge International will not enter into discussions about these mark schemes. Cambridge International is publishing the mark schemes for the May/June 2021 series for most Cambridge IGCSE™, Cambridge International A and AS Level components and some Cambridge O Level components. This document consists of 8 printed pages. © UCLES 2021 [Turn over 0478/12 Cambridge IGCSE – Mark Scheme May/June 2021 www.dynamicpapers.com PUBLISHED Generic Marking Principles These general marking principles must be applied by all examiners when marking candidate answers. They should be applied alongside the specific content of the mark scheme or generic level descriptors for a question. Each question paper and mark scheme will also comply with these marking principles. GENERIC MARKING PRINCIPLE 1: Marks must be awarded in line with: • • • the specific content of the mark scheme or the generic level descriptors for the question the specific skills defined in the mark scheme or in the generic level descriptors for the question the standard of response required by a candidate as exemplified by the standardisation scripts. GENERIC MARKING PRINCIPLE 2: Marks awarded are always whole marks (not half marks, or other fractions). GENERIC MARKING PRINCIPLE 3: Marks must be awarded positively: • • • • • marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit is given for valid answers which go beyond the scope of the syllabus and mark scheme, referring to your Team Leader as appropriate marks are awarded when candidates clearly demonstrate what they know and can do marks are not deducted for errors marks are not deducted for omissions answers should only be judged on the quality of spelling, punctuation and grammar when these features are specifically assessed by the question as indicated by the mark scheme. The meaning, however, should be unambiguous. GENERIC MARKING PRINCIPLE 4: Rules must be applied consistently, e.g. in situations where candidates have not followed instructions or in the application of generic level descriptors. GENERIC MARKING PRINCIPLE 5: Marks should be awarded using the full range of marks defined in the mark scheme for the question (however; the use of the full mark range may be limited according to the quality of the candidate responses seen). GENERIC MARKING PRINCIPLE 6: Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should not be awarded with grade thresholds or grade descriptors in mind. © UCLES 2021 Page 2 of 8 0478/12 Cambridge IGCSE – Mark Scheme May/June 2021 www.dynamicpapers.com PUBLISHED Please note the following further points: The words in bold in the mark scheme are important text that needs to be present, or some notion of it needs to be present. It does not have to be the exact word, but something close to the meaning. If a word is underlined, this exact word must be present. A single forward slash means this is an alternative word. A double forward slash means that this is an alternative mark point. Ellipsis (…) on the end of one-mark point and the start of the next means that the candidate cannot get the second mark point without being awarded the first one. If a MP has ellipsis at the beginning, but there is no ellipsis on the MP before it, then this is just a follow-on sentence and can be awarded without the previous mark point. © UCLES 2021 Page 3 of 8 Cambridge IGCSE – Mark Scheme May/June 2021 www.dynamicpapers.com PUBLISHED 0478/12 Question 1(a) Answer Marks One mark per each correct binary value. One mark per each correct hex value. Denary Hexadecimal 8-bit binary 49 31 00110001 123 7B 01111011 200 C8 11001000 6 1(b) Any two from: − Easier/quicker to read/write/understand − Easier/quicker to identify errors/debug − Takes up less screen/display space − Less chance of making an error 2 1(c) Any three from: − MAC address − URL − Assembly language − Error codes // error messages − IP addresses − Locations in memory − Memory dumps 3 Question 2(a) Answer Marks One mark per each correct row. 6 Magnetic () Statement Solid state () no moving parts are used to store data pits and lands are used to store data data is stored on platters flash memory is used to store data 2(b)(i) © UCLES 2021 Optical () parts are rotated to store data data can be stored permanently Any one from: − Hard disk drive // HDD − Magnetic tape 1 Page 4 of 8 Cambridge IGCSE – Mark Scheme May/June 2021 www.dynamicpapers.com PUBLISHED 0478/12 Question Answer Marks 2(b)(ii) Any one from: − CD − DVD − Blu-ray disk 1 2(b)(iii) One for type of storage, two for matching justification from: − Magnetic // HDD − (Web server) is likely to receive many requests a day − (Web server) will likely need to store a lot of data and magnetic is high capacity − Magnetic is cheaper to buy for storage per unit than solid state − Magnetic is capable of more of read/write requests over time // has more longevity // SSD has more limited number of read/write requests (before it is no longer usable) − No requirement for it to be portable, so moving parts does not matter 3 − − − − − − Solid-state // SSD (Web server) is likely to receive many requests a day (Web server) will likely need to store a lot of data and solid-state is high capacity Solid-state is more energy efficient Solid-state runs cooler so will not overheat Solid state has faster read/write speeds to handle volume of traffic 2(c) Any three from: − Data is flashed onto (silicon) chips − Uses NAND/NOR technology // can use flip-flops − Uses transistors/control gates/floating gates … − … to control the flow of electrons − It is a type of EEPROM technology − When data is stored the transistor is converted from 1 to 0 / 0 to 1 − Writes (and reads) sequentially 3 3(a) One mark for each correct logic gate with correct input. 6 © UCLES 2021 Page 5 of 8 Cambridge IGCSE – Mark Scheme May/June 2021 www.dynamicpapers.com PUBLISHED 0478/12 Question 3(b) Answer One mark per each correct row. − Row 2 − Row 3 − Row 7 − Row 8 4 Question 4(a) Marks Answer Marks One mark per each correct row. 6 Virus () Statement Denial of service () captures all data entered using a keyboard can be installed onto a web server Spyware () prevents access to a website is malicious code on a computer is self-replicating damages the files on a user’s hard drive 4(b) Any three from: − Phishing − Pharming − Hacking // cracking 3 4(c) Any three from: − Human error − Power failure/surge − Hardware failure − Software failure − Fire − Flood 3 5(a) − − 2 © UCLES 2021 Light sensor Motion sensor // infra-red sensor Page 6 of 8 Cambridge IGCSE – Mark Scheme May/June 2021 www.dynamicpapers.com PUBLISHED 0478/12 Question Answer Marks 5(b) Eight from: − Sensors send data to microprocessor − Data is converted to digital (using ADC) − Microprocessor compares data to stored value(s) … − … if one value or neither values are within range/out of range/match no action is taken − … If both values are out of range/in range/match microprocessor sends signal to switch light on … − … 1-minute timer is started − Actuator used to switch on/off light − When timer reaches 1 minute, microprocessor sends signal to switch light off − Whole process is continuous 8 6(a) Any three from: − Webserver sends (cookie) file to user’s browser − User’s payment details stored in encrypted text file // data is encrypted to be stored − Cookie file is stored by browser/on user’s HDD/SSD − When user revisits website, webserver requests cookie file // webserver can access the data stored in the cookie file (to automatically enter details) − … and browser sends cookie file back to webserver (to automatically enter the details) 3 6(b) Four from: − User does not see what information is stored // might collect data that user does not know about … − … so, user may feel their privacy is affected 4 − − A profile could be built about the user … … that could expose a user’s identity // lead to identity theft − Sensitive information stored in cookies could be intercepted in transmission … Other websites could gain access to the cookies stored on a user’s computer … Computer could be hacked to obtain data stored in cookies … … so, payment information could be stolen and used by a third party − − − Question 7(a)(i) Answer Any one from: − Placement of text/image − Margins − Line break − Padding 1 NOTE: Any relevant example of structure can be awarded © UCLES 2021 Marks Page 7 of 8 0478/12 Cambridge IGCSE – Mark Scheme May/June 2021 www.dynamicpapers.com PUBLISHED Question 7(a)(ii) Answer Any two from: − Font colour − Font style − Font size − Background colour − Image size − Border properties Marks 2 NOTE: Any relevant example of presentation can be awarded 7(b) 8 © UCLES 2021 Any two from: − Can easily change/edit the style of the webpage − So, CSS can be used to create a template/style sheet − Can add new content and apply the same style easily − Can re-use the presentation/style for other websites 2 One mark for each correct term in the correct order − Switch − Circuit − Current − Calculated − Character − Binary 6 Page 8 of 8 www.dynamicpapers.com Cambridge IGCSE™ * 3 0 8 8 7 7 7 2 2 4 * COMPUTER SCIENCE 0478/13 May/June 2021 Paper 1 Theory 1 hour 45 minutes You must answer on the question paper. No additional materials are needed. INSTRUCTIONS ● Answer all questions. ● Use a black or dark blue pen. You may use an HB pencil for any diagrams or graphs. ● Write your name, centre number and candidate number in the boxes at the top of the page. ● Write your answer to each question in the space provided. ● Do not use an erasable pen or correction fluid. ● Do not write on any bar codes. ● Calculators must not be used in this paper. INFORMATION ● The total mark for this paper is 75. ● The number of marks for each question or part question is shown in brackets [ ]. ● No marks will be awarded for using brand names of software packages or hardware. This document has 16 pages. Any blank pages are indicated. DC (DH/SG) 202681/5 © UCLES 2021 [Turn over 2 1 www.dynamicpapers.com Greta has a computer that she uses for schoolwork and leisure. (a) The computer has the Media Access Control (MAC) address: 00:A0:C9:14:C8:29 (i) Tick (3) to show whether the MAC address is initially assigned to the computer by the network, the manufacturer or the user. Tick (3) Network Manufacturer User [1] (ii) The values in the MAC address are hexadecimal values. Convert the three given hexadecimal values into 8-bit binary. 14 ...................................................................................................................................... A0 ...................................................................................................................................... C9 ...................................................................................................................................... [3] Working space ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... (iii) Convert the two given hexadecimal values into denary. 29 ...................................................................................................................................... C8 ...................................................................................................................................... [2] Working space ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... © UCLES 2021 0478/13/M/J/21 3 www.dynamicpapers.com (b) Greta stores data on several off-line storage devices, including an external hard disk drive (HDD), a USB flash memory drive and a compact disc (CD). (i) Identify the type of storage for each device. External HDD .................................................................................................................... USB flash memory drive ................................................................................................... CD ..................................................................................................................................... [3] (ii) Describe the operation of a HDD and how it stores data. ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... ..................................................................................................................................... [4] © UCLES 2021 0478/13/M/J/21 [Turn over 4 2 www.dynamicpapers.com Jolene displays videos on her website. She uses lossy compression to reduce the file size of the videos. (a) Describe how lossy compression reduces the file size of the videos. ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ............................................................................................................................................. [3] (b) State two reasons why Jolene would use lossy rather than lossless compression for the videos. Reason 1 .................................................................................................................................. ................................................................................................................................................... Reason 2 .................................................................................................................................. ................................................................................................................................................... [2] © UCLES 2021 0478/13/M/J/21 5 3 www.dynamicpapers.com An optical mouse is a type of input device that can be used to input data into a computer system. (a) Complete the paragraph about the operation of an optical mouse, using the most appropriate terms from the given list. Not all terms need to be used. • • • • • • • • • • • • Ball Battery LCD LED Lens Magnifies Matrix Microswitch Photoelectric Photographic Reduces USB An optical mouse shines an ............................................ from the bottom of the mouse onto a surface. Light bounces straight back from the surface into a ............................................ cell. This has a ............................................ that ............................................ the reflected light to allow detection of smaller movements. When a button on the mouse is clicked, a ............................................ is pressed. A ............................................ connection is used to carry the data to the computer. [6] (b) Identify two other input devices that can be used to enter data into a computer. 1 ................................................................................................................................................ 2 ................................................................................................................................................ [2] © UCLES 2021 0478/13/M/J/21 [Turn over 6 4 www.dynamicpapers.com Spencer finds out that his online music account has been accessed by an unauthorised person. He believes his personal details for the account were obtained using phishing. (a) Explain how the personal details could have been obtained using phishing. ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ............................................................................................................................................. [3] (b) Give two other Internet security risks that could have been used to obtain the personal details. 1 ................................................................................................................................................ 2 ................................................................................................................................................ [2] © UCLES 2021 0478/13/M/J/21 www.dynamicpapers.com 7 5 Six statements are given about programming languages. Tick (3) to show whether each statement applies to high-level language, assembly language or machine code. Some statements may apply to more than one type of programming language. High-level language (3) Statement Assembly language (3) Machine code (3) it requires a translator to be processed by a computer it is an example of low-level language it uses mnemonics it uses English-like statements it can be used to directly manipulate hardware in the computer it is portable [6] © UCLES 2021 0478/13/M/J/21 [Turn over www.dynamicpapers.com 8 6 Four 7-bit binary values are transmitted from one computer to another. A parity bit is added to each binary value creating 8-bit binary values. All the binary values are transmitted and received correctly. (a) Identify whether each 8-bit binary value has been sent using odd or even parity by writing odd or even in the type of parity column. 8-bit binary value Type of parity 01111100 10010000 10011001 00101001 [4] (b) The 8-bit binary value 10110001 is transmitted and received as 10110010 A parity check does not identify any errors in the binary value received. State why the parity check does not identify any errors. ................................................................................................................................................... ............................................................................................................................................. [1] (c) The data is sent using serial duplex data transmission. (i) Describe how data is sent using serial duplex data transmission. ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... ..................................................................................................................................... [4] (ii) State one drawback of using serial data transmission, rather than parallel data transmission. ........................................................................................................................................... ..................................................................................................................................... [1] © UCLES 2021 0478/13/M/J/21 9 7 www.dynamicpapers.com Marco uses his computer for work. The data he uses on a daily basis is valuable to his business. Marco is concerned about his data being accidentally damaged. Human error, such as incorrectly removing external storage devices, is one way that the data can be accidentally damaged. (a) Identify two other ways that data can be accidentally damaged. 1 ................................................................................................................................................ 2 ................................................................................................................................................ [2] (b) Removing storage devices correctly from the computer can help prevent data being accidentally damaged. Give two other ways that accidental damage to data can be prevented. 1 ................................................................................................................................................ ................................................................................................................................................... 2 ................................................................................................................................................ ................................................................................................................................................... [2] © UCLES 2021 0478/13/M/J/21 [Turn over 10 8 www.dynamicpapers.com Consider the following logic circuit: A X B C (a) Two NOT gates are used in the given logic circuit. Identify three other logic gates that are used in the given logic circuit. 1 ................................................................................................................................................ 2 ................................................................................................................................................ 3 ................................................................................................................................................ [3] © UCLES 2021 0478/13/M/J/21 11 www.dynamicpapers.com (b) Consider the completed truth table for the given logic circuit. Row number A B C 1 0 0 0 0 2 0 0 1 1 3 0 1 0 0 4 0 1 1 0 5 1 0 0 1 6 1 0 1 1 7 1 1 0 0 8 1 1 1 1 Working space X There are four errors in the truth table in the output (X) column. Identify the four incorrect outputs. Write the row number to identify each incorrect output. Row ....................... Row ....................... Row ....................... Row ....................... © UCLES 2021 [4] 0478/13/M/J/21 [Turn over 12 9 www.dynamicpapers.com An underground car park has a system that checks the height of vehicles. A vehicle can be no higher than 1.8 metres to enter the car park. The system also counts the number of vehicles that have entered the car park, so that it can display how many parking spaces are still available. Each parking space has a red and a green light above it. If a car is parked in the parking space only the red light is on, otherwise only the green light is on. Sensors and a microprocessor are used to control the system. (a) Complete the table to identify a suitable sensor for each part of the system. Task Sensor check if a vehicle is too high count the vehicles entering the car park check if a vehicle is parked in a parking space [3] (b) Describe how the sensor and the microprocessor are used to display the red or green light above the parking space. ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ............................................................................................................................................. [6] © UCLES 2021 0478/13/M/J/21 13 www.dynamicpapers.com 10 Several components are involved in processing an instruction in a Von Neumann model for a computer system. Three of these components are the arithmetic logic unit (ALU), control unit (CU) and random access memory (RAM). (a) Six statements are given about the components. Tick (3) to show if each statement applies to the ALU, CU or the RAM. Some statements may apply to more than one component. ALU (3) Statement CU (3) RAM (3) stores data and instructions before they enter the central processing unit (CPU) contains a register called the accumulator manages the transmission of data and instructions to the correct components contained within the CPU uses the data bus to send data into or out of the CPU carries out calculations on data [6] (b) The accumulator is a register that is part of the Von Neumann model. Give two other registers that are part of the Von Neumann model. 1 ................................................................................................................................................ 2 ................................................................................................................................................ [2] © UCLES 2021 0478/13/M/J/21 14 BLANK PAGE © UCLES 2021 0478/13/M/J/21 www.dynamicpapers.com 15 BLANK PAGE © UCLES 2021 0478/13/M/J/21 www.dynamicpapers.com 16 www.dynamicpapers.com BLANK PAGE Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will be pleased to make amends at the earliest possible opportunity. To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cambridgeinternational.org after the live examination series. Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge. © UCLES 2021 0478/13/M/J/21 www.dynamicpapers.com Cambridge IGCSE™ COMPUTER SCIENCE 0478/13 Paper 1 May/June 2021 MARK SCHEME Maximum Mark: 75 Published This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the details of the discussions that took place at an Examiners’ meeting before marking began, which would have considered the acceptability of alternative answers. Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for Teachers. Cambridge International will not enter into discussions about these mark schemes. Cambridge International is publishing the mark schemes for the May/June 2021 series for most Cambridge IGCSE™, Cambridge International A and AS Level components and some Cambridge O Level components. This document consists of 8 printed pages. © UCLES 2021 [Turn over 0478/13 Cambridge IGCSE – Mark Scheme May/June 2021 www.dynamicpapers.com PUBLISHED Generic Marking Principles These general marking principles must be applied by all examiners when marking candidate answers. They should be applied alongside the specific content of the mark scheme or generic level descriptors for a question. Each question paper and mark scheme will also comply with these marking principles. GENERIC MARKING PRINCIPLE 1: Marks must be awarded in line with: • • • the specific content of the mark scheme or the generic level descriptors for the question the specific skills defined in the mark scheme or in the generic level descriptors for the question the standard of response required by a candidate as exemplified by the standardisation scripts. GENERIC MARKING PRINCIPLE 2: Marks awarded are always whole marks (not half marks, or other fractions). GENERIC MARKING PRINCIPLE 3: Marks must be awarded positively: • • • • • marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit is given for valid answers which go beyond the scope of the syllabus and mark scheme, referring to your Team Leader as appropriate marks are awarded when candidates clearly demonstrate what they know and can do marks are not deducted for errors marks are not deducted for omissions answers should only be judged on the quality of spelling, punctuation and grammar when these features are specifically assessed by the question as indicated by the mark scheme. The meaning, however, should be unambiguous. GENERIC MARKING PRINCIPLE 4: Rules must be applied consistently, e.g. in situations where candidates have not followed instructions or in the application of generic level descriptors. GENERIC MARKING PRINCIPLE 5: Marks should be awarded using the full range of marks defined in the mark scheme for the question (however; the use of the full mark range may be limited according to the quality of the candidate responses seen). GENERIC MARKING PRINCIPLE 6: Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should not be awarded with grade thresholds or grade descriptors in mind. © UCLES 2021 Page 2 of 8 0478/13 Cambridge IGCSE – Mark Scheme May/June 2021 www.dynamicpapers.com PUBLISHED Please note the following further points: The words in bold in the mark scheme are important text that needs to be present, or some notion of it needs to be present. It does not have to be the exact word, but something close to the meaning. If a word is underlined, this exact word must be present. A single forward slash means this is an alternative word. A double forward slash means that this is an alternative mark point. Ellipsis (…) on the end of one-mark point and the start of the next means that the candidate cannot get the second mark point without being awarded the first one. If a MP has ellipsis at the beginning, but there is no ellipsis on the MP before it, then this is just a follow-on sentence and can be awarded without the previous mark point. © UCLES 2021 Page 3 of 8 Cambridge IGCSE – Mark Scheme May/June 2021 www.dynamicpapers.com PUBLISHED 0478/13 Question Answer 1(a)(i) − 1(a)(ii) One mark per each correct binary value. − − − 1a(iii) 1 manufacturer 3 00010100 10100000 11001001 One mark per each correct denary value. − − 41 200 1(b)(i) − − − Magnetic Solid state Optical 1(b)(ii) Any four from: − It has platters − Platters/disk divided into tracks − Platter/disk is spun − Has a read/write arm that moves across storage media − Read/writes data using electromagnets − Uses magnetic fields to control magnetic dots of data − Magnetic field determines binary value Question Marks 2 3 Answer 4 Marks 2(a) Any three from: − A compression algorithm is used − Redundant data is removed − Reduce colour depth − Reduce image resolution − Reduce sample rate − Reduce sample resolution − Reduce frame rate − Use perceptual music shaping − Data is permanently removed 3 2(b) Any two from: − Lossy decreases the file size more − Take up less storage space on webserver/users' computer − Quicker to upload/download − May not need to be high quality − Website will load faster for users − Less lag/buffering when watching − Takes up less bandwidth to download/upload − Uses less data allowance 2 © UCLES 2021 Page 4 of 8 Cambridge IGCSE – Mark Scheme May/June 2021 www.dynamicpapers.com PUBLISHED 0478/13 Question Answer Marks 3(a) One mark per each correct term, in the correct place. − LED − Photoelectric − Lens − Magnifies − Microswitch − USB 6 3(b) Any two from: − Keyboard − Microphone − 2D/3D Scanner − Sensor − Touchscreen − Keypad − Webcam − Joystick 2 Question Answer 4(a) − − − 4(b) Any two from: − Pharming − Spyware − Hacking/cracking © UCLES 2021 Marks Legitimate looking/fake email sent to user … that contains a link to a fake website User clicks link and enters personal details (into fake website) 3 2 Page 5 of 8 Cambridge IGCSE – Mark Scheme May/June 2021 www.dynamicpapers.com PUBLISHED 0478/13 Question 5 Answer Marks One mark per each correct row Statement 6 High-level language () Assembly language () It requires a translator to be processed by a computer It is an example of low-level language It uses mnemonics It uses English-like statements It can be used to directly manipulate hardware in the computer It is portable Question Machine code () Answer Marks 6(a) − − − − 6(b) Any one from: − There is a transposition of bits − Bits still add up to correct parity 1 6(c)(i) − − − − 4 6(c)(ii) Any one from: − Data transmission can be slower (than parallel) − Additional data may need to be sent © UCLES 2021 4 Odd Even Even Odd Data is sent one bit at a time Data is sent using a single wire Data is sent in both direction … … at the same time Page 6 of 8 1 Cambridge IGCSE – Mark Scheme May/June 2021 www.dynamicpapers.com PUBLISHED 0478/13 Question Answer Marks 7(a) Any two from: − Hardware failure − Software failure − Power failure/surge − Fire − Flood − Natural disaster 2 7(b) Any two from: − Use verification methods before deleting files − Keep data in a fireproof box − Do not drink liquids near a computer − Use surge protection // UPS − Correct shutdown procedures − Access rights − Back data up 2 Question Answer Marks 8(a) − − − AND NOR XOR 3 8(b) − − − − Row 1 Row 4 Row 7 Row 8 4 Question 9(a) Answer One mark per each correct sensor Task © UCLES 2021 Marks 3 Sensor Check if a vehicle is too high Infrared/light Count the vehicles entering the car park Magnetic field // pressure Check if a vehicle is parked in a parking space Pressure // magnetic field // infrared/light Page 7 of 8 Cambridge IGCSE – Mark Scheme May/June 2021 www.dynamicpapers.com PUBLISHED 0478/13 Question 9(b) Answer Six from: − Sensor sends data to microprocessor − Data is converted from analogue to digital (using ADC) − Data is compared to stored value … − … If data is greater than stored value microprocessor sends signal to turn red light on and the green light off − … If data is less than stored value microprocessor sends signal to turn green light on the red light off − … If data still within range, no action taken/existing light remains on − Lights turned on/off using actuator − Process is continuous Question 10(a) Marks Answer Marks One mark per each correct row 6 ALU () Statement CU () Stores data and instructions before they enter the central processing unit (CPU) Contains a register called the accumulator Contained within the CPU Uses the data bus to send data into or out of the CPU Carries out calculations on data © UCLES 2021 RAM () Manages the transmission of data and instructions to the correct components 10(b) 6 Any two from: − MAR − MDR // MBR − PC − CIR // IR () 2 Page 8 of 8 Cambridge IGCSE™ * 0 0 6 3 3 2 5 4 1 2 * COMPUTER SCIENCE 0478/11 October/November 2021 Paper 1 Theory 1 hour 45 minutes You must answer on the question paper. No additional materials are needed. INSTRUCTIONS ● Answer all questions. ● Use a black or dark blue pen. You may use an HB pencil for any diagrams or graphs. ● Write your name, centre number and candidate number in the boxes at the top of the page. ● Write your answer to each question in the space provided. ● Do not use an erasable pen or correction fluid. ● Do not write on any bar codes. ● Calculators must not be used in this paper. INFORMATION ● The total mark for this paper is 75. ● The number of marks for each question or part question is shown in brackets [ ]. ● No marks will be awarded for using brand names of software packages or hardware. This document has 12 pages. Any blank pages are indicated. DC (LEG/AR) 202712/4 © UCLES 2021 [Turn over 2 1 Binary is a number system that is used by computers. (a) Tick (3) one box to show whether binary is a base-2, base-10 or base-16 number system. Tick (3) Base-2 Base-10 Base-16 [1] (b) Hexadecimal and denary are number systems that can be used by programmers. Convert these four hexadecimal values into denary values. 09 ........................................... 10 ........................................... 28 ........................................... A1 ........................................... [4] Working space ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... © UCLES 2021 0478/11/O/N/21 3 2 Magda has a mobile telephone. She uses the touch screen on her telephone to send emails to her customers. The touch screen breaks, stopping Magda from using it to type her emails. (a) Identify one other input device that would be built into the mobile telephone that Magda could use to send an email to her customers. ............................................................................................................................................. [1] (b) The touch screen operates by using the conductive properties of the object that is used to touch the screen. State whether the touch screen is a resistive, capacitive or infra-red touch screen. ............................................................................................................................................. [1] (c) Magda is listening to music on her mobile telephone when she receives a telephone call. A signal is sent within the telephone to stop the music and output that a call has been received. Give the name of this type of signal. ............................................................................................................................................. [1] © UCLES 2021 0478/11/O/N/21 [Tu